ios7
4 TopicsBIG-IP Edge Client v1.0.6 for iOS 7
With all your other iOS 7 updates (if you've made the plunge), if you are running the BIG-IP Edge Client on your iPhone, iPod or iPad, you may have gotten an AppStore alert for an update. If not, I just wanted to let you know that version 1.0.6 of the iOS Edge Client is available at the AppStore with iOS 7 support. Customers who use UDID in their access policies should have users update to this version. The BIG-IP Edge Client application from F5 Networks secures and accelerates mobile device access to enterprise networks and applications using SSL VPN and optimization technologies. Access is provided as part of an enterprise deployment of F5 BIG-IP Access Policy Manager, Edge Gateway, or FirePass SSL-VPN solutions. BIG-IP Edge Client for iOS Features: Provides accelerated mobile access when used with F5 BIG-IP Edge Gateway. Automatically roams between networks to stay connected on the go. Full Layer 3 network access to all your enterprise applications and files. ps Related: Manual: BIG-IP Edge Apps Client Compatibility Matrix BIG-IP Edge Client and BIG-IP Edge Portal for Apple iOS and Android software support policy Release Note: BIG-IP Edge Client for iOS 1.0.6 Advanced Edge Client Installation for Windows–The Mysteries of Windows Installer Revealed F5 BIG-IP Edge Client F5 BIG-IP Edge Portal F5 BIG-IP Edge Client for Android Technorati Tags: f5,big-ip,edge client,ssl-vpn,mobile,smartphone,ios7,apple,iphone,ipad,silva,remote access,security,secure access,apm Connect with Peter: Connect with F5:602Views0likes1CommentPer-App VPN support
Hi I found that upcoming EDEG client (1.0.7) will support Per-App VPN capability, in previous post(2 weeks ago). And learned it will be released on 2-3 week. Now I can not find 1.0.7 on AppStore yet. When will it be released? And I have one question regarding Per-App VPN. Does each App-Developer have to implement F5 module (or something) into their own apps?, or there is nothing to do for App-Developer?324Views0likes2CommentsKerberos & NTLMv2 via SSL VPN virtual server (mobile devices SSL VPN via APM)
Once again I'll start off here stating I'm quite green with F5. I can manage a lot of the basics, but this one I'm not sure on. We are using F5 APM for Mobile Device and VPN on demand to internal web services (mainly Sharepoint). This connection is a single Virtual Server (mobile_ssl_vpn). Currently, we only use Sharepoint servers with Kerberos SSO authentication and all works well. Now a requirement for a non IIS server (that can't have kerberos enabled) has come up to be available from mobile devices. The way the vendor has set up our current SSO is: an Access Profile for Kerberos Single Sign on. Inside this, a Kerberos SSO configuration is attached. The Access Policy for this Access Profile is a straight allow pass through. No iRules attached either. a Virtual Server (source and destination is 0.0.0.0/0) with the above access profile attached. The kerberos and ntlm SSO configurations are configured and working for our domain (single Windows AD domain). Essentially from what it looks like is that any traffic from any source to any destination the Kerberos SSO is applied (by a very roundabout method). The iOS devices have a user certificate and the F5 extracts the username and password and passes this to the server for a Kerberos challenge. I can't work out how to apply a NTLM_v2 SSO policy to the mobile_ssl_vpn Virtual Server or traffic. I attempted to replicate the Kerberos configuration by create another 0.0.0.0/0 source and destination, but that obivously won't work. My other thought here was to attach another access profile (with the NTLM config attached), which obviously can't be done. I'd like to not have to keep giving the answer that internal services need to be configured with kerberos otherwise they can't be accessed.179Views0likes3Comments