F5's Flexible iRules Help Safeguard Customers' Valuable IT Assets
F5's Flexible iRules Help Safeguard Customers' Valuable IT Assets
F5's dynamic security solutions and iRules®protect organizations from unpredictable threats
SEATTLE--(BUSINESS WIRE)-- F5 Networks, Inc. (NASDAQ:FFIV) highlights the most useful and compelling security-focused iRules that help organizations enhance attack protection and provide secure access to IT resources. To coincide with the close of National Cyber Security Awareness Month, the iRules listed in this announcement have been compiled from the many F5, customer, and partner-contributed solutions on DevCentral™, F5's collaborative online community that helps address the industry's most pressing application delivery challenges.
"Today's security threats move fast and can be difficult to predict," said Zeus Kerravala, Principal Analyst at ZK Research. "With iRules, customers can quickly react to changing conditions and deploy solutions that protect against attacks aimed at applications—currently among the most attractive targets. F5's ability to swiftly address security issues that are unforeseen or unique to a customer's environment is a key factor in its success. DevCentral and iRules continue to be significant differentiators for F5, giving customers a valuable ecosystem where they can contribute solutions and leverage the combined expertise of their peers."
iRules is a customizable feature of F5®BIG-IP® solutions, designed to add intelligence to networks and give customers enhanced control over how their traffic is managed, optimized, and secured. F5's DevCentral site features iRules, technical documentation, discussion forums, blogs, media, wikis, and other resources supported by a community of more than 110,000 IT, network, and application professionals.
The iRules featured in this announcement represent collaborative efforts between F5 customers, employees, and other community members. Detailed information on each solution can be found using the links listed with each iRule below (free DevCentral registration required).
Enhance Protection from Targeted Attacks
- HashDoS Defender - This iRule guards against hash collision "HashDoS" attacks through HTTP POST parameters. By enabling F5's BIG-IP solutions to limit the post size and post variables, the attack is stopped before it reaches the backend servers, preventing servers from getting overwhelmed and thereby protecting the application. See this blog post for more information.
- SSL Renegotiation DoS Countermeasure - This simple iRule enables BIG-IP solutions to mitigate SSL renegotiation DOS attacks. Without it, all web servers that support SSL are potentially susceptible to an asymmetric attack in which a small number of malicious clients can take down a server. See this blog post for more information.
- Phishing Protection - This iRule helps mitigate phishing and scraping attempts by identifying suspicious requests from an unknown referrer and either blocking them outright or injecting code into the HTTP response to restrict their ability to duplicate an organization's site content.
Control Access to Valuable IT Resources
- Controlling Bots - If left unchecked, bots can generate a critical mass of requests and support a number of attack types that target an organization's website. This iRule can be used to assign bots to a specific pool, throttle bot requests, introduce an artificial delay for bot requests, or simply block them completely.
- HTTP Request Throttling - By design, web servers have limited CPU and memory resources. Servicing all requests on a first-come, first-served basis can open the door for attackers seeking to occupy all available system resources with specially crafted requests. By detecting the nature of specific requests, this iRule enables an IT administrator to slow the processing of particular request types and identify malicious actors.
- Client Blocking Using IP Intelligence - With this iRule, BIG-IP solutions can automatically connect to an IP reputation database to regularly update a reference list of bad IP addresses, helping keep the latest known offenders at bay.
Safeguard Sensitive Information
- Credit Card Tokenization - Many organizations employ a tokenization process to protect confidential information such as credit card details. This iRule is used on a BIG-IP device that sits in front of a secure web application server and uses sideband connections to a second virtual server that processes requests to and from the tokenization service.
- Data Loss Prevention - This iRule helps organizations limit the chance of data leakage by configuring a "Regular Expression" matching technique that can recognize and remove certain types of information (credit card numbers, etc.) from server responses.
Improve DNS Security
- DNS Blackholing - These iRules can be used to (1) protect outgoing web browsers from harmful sites, (2) protect network resources from certain DNS users or subnets, and (3) protect DNS infrastructures from certain source addresses. These capabilities can be used to prevent internal users from accessing harmful sites, direct users requesting certain hostnames to alternate servers for access control, and implement other provisions to enhance DNS security.
"F5's iRules technology gives customers the flexibility to tailor how IT resources are accessed and secured, meaning that organizations can customize systems to best support their business needs," said Mark Vondemkamp, VP of Security Product Management and Marketing at F5. "DevCentral is all about group-driven innovation. By combining the pooled expertise of customers with the intelligence and flexibility F5 products bring to the network, we provide a uniquely powerful offering that competitors simply can't match."
- F5's Sexiest Security iRules - DevCentral Blog Post
- DevCentral Security Topics Page
- F5 Security Solutions Page
About F5 Networks
F5 Networks, Inc., the global leader in Application Delivery Networking (ADN), helps the world's largest enterprises and service providers realize the full value of virtualization, cloud computing, and on-demand IT. F5® solutions help integrate disparate technologies to provide greater control of the infrastructure, improve application delivery and data management, and give users seamless, secure, and accelerated access to applications from their corporate desktops and smart devices. An open architectural framework enables F5 customers to apply business policies at "strategic points of control" across the IT infrastructure and into the public cloud. F5 products give customers the agility they need to align IT with changing business conditions, deploy scalable solutions on demand, and manage mobile access to data and services. Enterprises, service and cloud providers, and leading online companies worldwide rely on F5 to optimize their IT investments and drive business forward. For more information, go to www.f5.com.
You can also follow @f5networks on Twitter or visit us on Facebook for more information about F5, its partners, and technology. For a complete listing of F5 community sites, please visit www.f5.com/news-press-events/web-media/community.html.
F5, iRules, DevCentral, and BIG-IP are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.
This press release may contain forward-looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions, and actual results could differ materially from those anticipated in these statements based upon a number of factors, including those identified in the company's filings with the SEC.
F5 Networks, Inc.
Alane Moran, 206-272-6850
KEYWORDS: United States North America Washington
The article F5's Flexible iRules Help Safeguard Customers' Valuable IT Assets originally appeared on Fool.com.Try any of our Foolish newsletter services free for 30 days. We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy.
Copyright © 1995 - 2012 The Motley Fool, LLC. All rights reserved. The Motley Fool has a disclosure policy.