Posted by: psilva | April 4, 2019

TLS 1.3 Enterprise Adoption

With the new TLS 1.3 specification published by the IETF in August 2018, many organizations are adopting plans for the new specification. F5, together with Enterprise Management Associates, conducted research to better understand how enterprises are impacted by the growing use of encryption.

Get your copy today at:


Posted by: psilva | March 26, 2019

How Malware Evades Detection

Malware loves encryption since it can sneak around undetected. F5Labs 2018 Phishing & Fraud Report explains how malware tricks users and evades detection.

Let’s light up how evasion happens & get your F5 Labs 2018 Phishing & Fraud Report today.


Posted by: psilva | February 26, 2019

F5 at RSA 2019

A Preview of F5 activities at #RSAC19. You can visit F5 March 4-8 in Booth S643 and for more details. See you in San Francisco!

Posted by: psilva | January 3, 2019

SSL Visibility with SSL Orchestrator

Are You Equipped to Decrypt?

Over 80% of page loads are encrypted with SSL/TLS and Attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organization vulnerable. I light up how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.




Posted by: psilva | December 13, 2018

F5 Labs 2018 Phishing & Fraud Report

The F5 Labs 2018 Phishing & Fraud Report is out!

In this report, the F5 Labs team specifically investigated the rise of phishing and fraud during the ‘holiday shopping season,’ beginning in October and continuing through January. Fraud and phishing attempts increase 50% right now, from October to January and phishing was the root cause of 48% of the data breaches that F5Labs investigated. It’s important to check out the report because it explains how phishing works, how to defend yourself against phishing attacks and the importance of training employees to recognize malicious emails.

Some of the crazy stats they found include 93% of phishing domains offered a secure (https) version of the site to appear more legitimate and 68% of malware sites used encryption certificates (https), meaning 68% of Command & Control servers use port 443. The crooks are going through the trouble of getting SSL certificates for their fake, but real looking sites.

Take a look at some of these. Do any of these web logins look familiar?

fake logons

How about this one?


Or maybe this one?

paypal fake

If so then you need to check out the 2018 Phishing and Fraud report from F5 Labs because they were all fake. Attackers are getting so good at creating fake websites that impersonate the real thing, most people can’t tell the difference. One thing is for certain, employee click-through rates on phishing emails drop from 33% to 13% with security awareness training:

  • 33% — 1-5 training events
  • 28% — 6-10 training events
  • 13% — 11 or more training events

You can check out the Preview Video here and get your report at



Posted by: psilva | September 21, 2018


(Or, How I Mandela’d Myself Back into a Job)

psilva picAlmost every week for over a decade, I’d tap some words out on a keyboard and push the story out for folks to read. And much to my glee, you did engage, share, comment and seemed to genuinely enjoy what I had to say. I wrote about technology topics like information security, IoT, mobile, access, high availability, application delivery and many others tied to my job at F5. I shared my life experiences like my daughter’s rare genetic disorder (HI/HA GDH), getting lost in Italy or certain milestones in my existence. I’ve also reported on societal topics like identity theft, regulations, social engineering and the still popular, ‘Does Social Media Reflect Society?’ I also produced and published hundreds of videos covering some of the same technology topics since I really enjoy that medium.

A time where I could share my areas of interest and you would return for more every week. It was a wonderful relationship and I was very grateful for the opportunity to expand my creative energy. As the audience grew, I felt even more compelled to keep the consistent cadence of material since it was readily consumed.

That exchange abruptly ended two months ago in the last week of July and I’m sorry to have recently disappeared.

But there is a happy ending.

I happened to get caught up in a ‘reduction of workforce’ situation but had the opportunity to potentially secure another open position. I figured I’d at least give that a go since I truly enjoyed the company, people and believed in the services we offer. Plus, I was dreading having to make a potential two-hour commute in each direction, each day to get to an office. I’ve been a remote employee for almost a decade, but I would have of course, if it came down to that. However, I wanted to avoid that nightmare.

And, I believed and visualized in my mind that it would work out. This is important.

That Wednesday night my wife and I went through the typical shock mumbling things like, ‘What are we gonna do,’ ‘Are we going to be fine,’ and ‘What about insurance,’ among many others. We also poured out, ‘We’re gonna be ok,’ ‘Things will work out,’ ‘Everything happens for a reason,’ and so forth.

I’m one of those people who believe in the Law of Attraction and the notion that if you visualize, feel the good energy and put it out there, it happens. Whether through prayer, meditation, chanting, etc, you can make your future. There are many of those inspirational quotes about making it happen. Emerson said, ‘Once you make a decision, the universe conspires to make it happen.’ Michael Jordan noted, ‘Some people want it to happen, some wish it would happen, others make it happen.’ Eckhart Tolle said, ‘You are the universe becoming conscious of itself.’ Hiro Boga said, Immerse yourself in the energy of what you desire.’ And of course, Buddha taught, ‘The mind is everything. What you think, you become.’

I lamented that evening that since I believed in the ‘make it happen’ routine, that maybe, I had done it to myself. If I truly lived by that code, then I can’t just choose to accept the good things that occur…I must also concede to some of the bad stuff too. I admitted to my wife that recently I hadn’t really felt as secure as I should and had worried that something could happen. Not due to poor performance but more along the lines of, ‘Geeze, what would I do if I lost my job?’ Or, ‘Wow, I’m so fortunate to have what I have cuz I’d hate to be doing, whatever it was that I was looking at, at the time.’ Typical, normal human anxiety thoughts…or maybe I was receiving advanced notice. I’d even shoo those thoughts away when worrying saying, ‘Knock it off – if you keep thinking that, then it’ll happen!

I told my wife, ‘Well, I’ll just have to Mandela myself back into a job,’ and I fell asleep chanting, ‘I’m gonna make it back,’ with the logo visualization in my mind.

For those wondering what ‘Mandela’ myself means. There’s a phenomenon called the Mandela Effect. It’s when a large swath of the population seem to remember something being a certain way, often different than what history indicates. It got the moniker from researcher Fiona Broome about her false memory of the death of South African leader Nelson Mandela when, in fact, he was still alive. She says, ‘The Mandela Effect is evidence that you may have experienced events from a different reality. Finding others with similar memories can affirm that.’ There are many, many examples of this from food items to car logos to TV shows to geography.

So, the idea was to change my history and make my future, harnessing the universe’s power, to get me back to the place I desired.

The next day, Thursday, I got up like any other day going through my normal routine. I wasn’t going to sit around and wait for something…or take my time to see what’s out there…I was going to make something happen. My early morning walk which includes some chanting, mediation and praying allowed me to further send my intentions out. I envisioned myself back working with my colleagues and specifically thought about a certain Sr. Director that I might contact to see if he had any headcount. I’ve known and worked with this person for years but never side-by-side. And I will admit that we’ve had some philosophical differences over the years, but our discussions were always respectful, pleasant and we walked away with a better understanding of each other. I always knew it wasn’t personal and we were both coming from a place of passion for the good of all. During that morning walk, I really pushed my energies to be able to connect since my job that day, was to find a job.

Many folks who face and have faced this same dilemma talk about relaxing a bit, taking your time to find what’s out there, maybe even change careers completely or start their own business. That new doors open when others shut and most times, it’s for the better. I agree wholeheartedly with that yet my situation is a bit different and I really didn’t have the luxury to ‘find myself’ over the course of six months. You may be aware that my daughter has a rare genetic disorder and medical insurance is a critical part of her survival. Cobra is nuts expensive and I would have had to apply to keep her around. I would have done whatever was necessary to keep my family safe and had a little time to figure it out but for me personally, I needed to jump on finding something without delay.

I prepared my resume, which after working for the same company for 14 years was a bit daunting. Like, what do resumes look like these days? There had to have been some improvement or advances over the last decade. There’s that but also, how do I capture my accomplishments over that time? Honestly, I used my LinkedIn profile. I had updated it over the years as my positions changed and it included the info I needed.

That day I also started messaging/emailing/contacting many friends, both internal and external, to let them know I was seeking employment. We all make a lot of friends over the course of our career and studies suggest that those relationships can help with new opportunities. Plus, I’d like to think that they know my skills, knowledge and ability to help similar organizations.

And all the while that day I was chanting, ‘Like a fuckin’ phoenix rising from the ashes…’ I also started to put out there, ‘Wouldn’t be cool if I could secure something by the end of the week!’ Over and over.

That first day I applied to a couple internal positions and a few external. I used the entire day to see what’s out there, get the word out, prepare my resume and…keep the faith. I felt I had a productive day until later in the afternoon when I explained to my daughter the impact of this. ‘You know Daddy lost his job yesterday.’ With the innocence of a 12-year-old she asks, ‘So how are you gonna get it back?’ ‘I don’t know…I’ll try for something else with the same company or I’ll need to find something with another company, but we’ll be OK,’ I said hoping to dampen any anxiety on her part. She then told me that I needed to make sure I didn’t have to go to an office every day, so I could still drop her off at school, which I’ve been doing since pre-school. I replied that I hoped it would still be that way, but I’d needed to go where my work takes me.

The one thing I didn’t do that day is contact the Sr. Director I was thinking about earlier that morning, but I did feel, as mentioned earlier, that I had a productive day so let that percolate and see what happens.

The next day, Friday, we had to be in LA for some personal stuff related to our civil matter. Around 1:00 PM out of the blue, I get a text from that Sr. Director that I’d been thinking about. Holy Shit. He asks if I had some time to chat after 3:00p that day and I’m like, ‘Sure!’ I got nothing going on.

My phone rings around 2:00p and since we’re in the car heading home, I quickly find a place to park to take the call. He says he just heard what happened and that he has an open headcount but for first quarter. AND, he thinks I’m perfect for the role! There were still some departmental, procedural and other hurdles but that he was going to do whatever it takes to ensure it gets done within my grace period, so I can keep continuous employment…but to relax and know there something there for me.

I’m stunned.

With tears welling my eyes I tell him, ‘Dude, you’re gonna save my ass!’ He replies, ‘No, you’ve been a top performer for years and I can’t wait to have you on the team.’ I look at the clock in the car and say, ‘You know, it’s been almost exactly 48 hours since I got the call about the separation. You have no idea how thankful I am!’ We talk a bit more about the role and what needs to happen but by the end we had a verbal pinky shake. To my amazement, he even followed up with a summary text of what we discussed! I’m blown away both by the opportunity and the fact that he put it in writing. This guy is sticking his neck out to help me. I had to pull over again to read it and gather my excitement.

I turn to my daughter and say, ‘I got my job back!’ Didn’t matter that it was slightly different, but the fact that I was able to return to the company and people that I’ve loved for almost 15 years was incredible. In a position that is somewhat of a homecoming for me. Within 46 hours of being cut and before the week was over, it happened exactly as I asked, up to and including the specific Manager.

I was part of the original Security Business Unit at F5 back in 2004 as one of the original Security Solution Architects positioning F5 as a security company with FirePass (SSLVPN that became BIG-IP APM) & TrafficShield (WAF that became BIG-IP ASM). During this time, I was part of a handful of people sharing F5’s first security story. I was giddy that after all this time, I’d be able to return to my roots of evangelizing the benefits of our security solutions.

I couldn’t stop smiling on the way home and immersed in the notion that I set it motion, including the individual, just a couple days earlier. Speechless.

I slept better than I had in months that night. Security is also peace of mind.

Saturday rolls around and you know the routine, did that really happen? YES! It did. Of course, I thought that it could fall through but kept going back to that text he sent and pushed that out to make sure the events would follow.

Over the course of the next few weeks he kept in constant contact, even touching base just to see how things were and to make certain, insisting in fact, that I was taking the time to relax so I’m fresh when I start. I can’t say enough about him and he followed through – above and beyond – on everything.

A couple weeks after the initial contact I signed my offer letter and officially started up again, this time doing Security Marketing and am thrilled to join such an amazing team.

And too, this break was a blessing in disguise. I had the time to focus on some family matters and take care of some things that I probably wouldn’t have been able to; I got to relax on Tuesday mornings while the rest of you labored (Ha!); I got to spend more time with my wife and kid as summer vacation was winding down; I was secure knowing a job was waiting for me; and it reinforced, for me, that you really can change your path with your thoughts and energy. With a little help, of course.

So that’s what’s been going on. Sorry I’ve been away but soon I’ll be back to my regular cadence and hope you continue to follow. I delayed writing this and debated posting it but thought that probably 98% of us will go through something similar and if my experience helps, no shame. In fact, I’m quite proud and somewhat astonished that it happened like this.

Oh, and that Sr. Director who pulled me from the ashes? Preston Hogue. A person with a heart of gold, impressive security knowledge, great sense of humor and a man of his word. Thank you, Preston, for the warm welcome.

And for those who might be in the same situation: Seriously – see it, feel it, believe it.

It will happen.


Posted by: psilva | July 18, 2018

The DevCentral Chronicles July Edition 1(7)

dclogoniceJuly is my favorite month due to it being both the middle of summer and I was born in July. This month I’ll drip of perspiration and celebrate another twist in the odometer of life. It’s also time for our monthly Chronicles where we keep you updated on DevCentral happenings and highlight some of the cool content you may have missed since the last issue. You can always catch up with the links at the bottom. Welcome!

With #F5Agility18 right around the corner August 13-16, 2018, let’s kick off this edition with John Wagnon‘s Capture The Flag at Agility 2018. Happening Tuesday night Aug 14, block your calendar for our #Geekfest event, Hack to the Future! This year, for the first time ever during our Agility conference, we will host a Capture The Flag game.  The game is designed for eight teams (4 people per team) to compete against one another to see who can capture the most flags, earn the most virtual money, and keep their web application safe from attack.  The teams will be chosen prior to the event, so if you want to be included in one of the teams, make sure you reach out to your SE and get the invitation.  DevCentral MVP’s Kai, Stan, Leonardo & Nathan with Bart as Pit Boss will also participate. The entire evening will be themed with tons of cool 80s stuff related to the classic movie series.

Next, we’d like to recognize F5 Systems Engineer, Steve Lyons for his prowess over the last month. First, Steve is one of our most engaged SE’s amplifying our social channel at every tweet; he published three, in-depth articles Configuring the BIG-IP as an SSH Jump Server using Smart Card Authentication and WebSSH Client, Configuring Certificate Based Authentication and Kerberos Constrained Delegation in F5 Access Policy Manager (APM) and Configuring Endpoint Security (Client-Side) Using F5 Access Policy Manager (APM); in addition to answering 5 questions from members. He’s highly active and has the technical know-how to help. Follow Steve @SteveLyonsF5

vip_tweetJason Rahm and his infinite knowledge continued his python series with Getting started with the python SDK part 5: request parameters revisited and also replied to a twitter question from @CISCO_World with a full article about Duplicating BIG-IP Objects about how to copy a virtual server.

For the developer crowd, ENE Satoshi Toyosawa added his iControl REST Cookbook – Virtual Server Profile (LTM Virtual Profiles). For cloud folks, Chase Abbott shows off Application Auto Scaling Through BIG-IP Cloud Edition and for security, John lit up Introducing F5 DataSafe in his #LightboardLesson.

And in closing, Rhazi Youssef from e-xpert Solutions is our Featured Member for July and is the third engineer we’ve featured from e-Xpert Solutions SA.

We look forward to seeing you in Boston for Agility and as always, you can stay engaged with @DevCentral by following us on Twitter, joining our new LinkedIn Showcase page or subscribing to our YouTube Channel. Look forward to hearing about your BIG-IP adventures.

The Chronicles:

youssefOur Featured Member series is a way for us to show appreciation and highlight active contributors in our community. Communities thrive on interaction and our Featured Series gives you some insight on some of our most active folks.

Rhazi Youssef has been a very active DevCentral member since 2012 and the third engineer we’ve featured from e-Xpert Solutions SA. Initially Rhazi was a bit reluctant to participate as he’s a quiet, humble guy and we’re thrilled that he’s DevCentral’s Featured Member for July!

Let’s learn a bit more about Rhazi.

DevCentral: Please explain to the DevCentral community a little about yourself, what you do and why it’s important.

Rhazi: I’m a security engineer since 2009 working in Geneva (Switzerland), a region with several security projects involving F5 BIG-IP (GTM, LTM, ASM, APM). My interest began early when I started and installed several security equipment like Mail relay, FW, SIEM&SEM, web proxy…

But I admit that my job became more interesting when I started to approach the application part. I am talking about WAF (ASM), perimeter security (APM), LTM (LB, optimization,)…

I immediately bonded with this product since it is very rich, complete and scalable with its time. It is for this reason that I invested heavily on this product by passing for example all my certificates which gives me today the title of “Security Solution Expert” (401).

DC: You are a very active contributor in the DevCentral community. What keeps you involved?

RY: First off, like everyone else I admit that Devcentral has already allowed me to get out of trouble and not just once, and I thank the community for this. The DevCentral community is very much involved in sharing, helping and informing members. This work done by the community helped me a lot in my work (I upgraded my skills) so I think it is normal for me to give back to the community that helped me…and offer advice that will help with experience and knowledge the community to move forward.

My investment in the community is even easier since F5 is a product that is very important to me. Today I work primarily on F5 BIG-IP (APM, ASM, LTM, GTM, WebSafe) which allows me to have an important experience on the potential problems that one can meet during a deployment, so it’s the least of the things to help the community when I can.

DC: Tell us a little about the areas of BIG-IP expertise you have.

RY: These last 6 years I worked mainly on F5, I had the chance to work with some very great customers that I cannot mention :-). I deployed all types of hardware until VIPRION. And today I work on almost all of the BIG-IP modules (ASM, APM, LTM, GTM, VCMP, LC, WebSafe).

The advantage with F5 is that you cannot get tired of this product. It is rich, complete and scalable. For example the APM that allowed me to meet the needs of our customers by going from the identity federation (SAML) to Oauth&OpenID connect. But still it’s the same thing for ASM and other modules. We do not say it often enough but this product allows us to be up to date in terms of security; I’m talking about authentication protocols that the APM offers, different security methods carried by the ASM … all these aspects allow us to maintain our level and to learn …

DC: You are a Sr. Security Engineer with e-Xpert Solutions SA. Can you describe your typical workday, how you manage work/life balance and the strong support of F5 solutions?

e-xpertRY: As everyone knows the job of Security Engineer is not easy. We must manage several clients, several projects, manage customer support, communicate with clients (vulnerabilities, news), schedule management, project tracking,…

So every morning I spend quite some time to manage my emails, my calendar and answer to my customers. I am registered to F5 RSS feed, which keep me updated on CVE, I also follow many f5 webinars (I usually watch them later when they are online).

At e-Xpert solutions I am product manager of F5 solution, so I have to inform my colleagues about vulnerabilities or any new features, I must also regularly write news that we publish on our website. The other PMs do the same thing with their own products which also allows me to be informed about the other products of our portfolio.

During my working day I connect regularly to DevCentral when I have some time to help or learn about some interesting topics. For me, helping the community is not binding. On the contrary, certain questions allow us to update ourselves on certain subjects and to exchange on our different points of view.

I finished my work day in the evening by doing a small check of my mails and a pass on my usual information sites which included DevCentral. I almost forgot I work out every 3 days and I try to run at least every 2 days (no excuse for gym time!).

If you are interested, here is the website of the company in which I evolve:

DC: You have a number of F5 Certifications. Why are these important to you and how have they helped with your career?

RY: 8 months ago I had my last certification “Security Solution Expert” (401). Having all these certifications was very important to me. First of all in order to guarantee a high level of expertise to our customer. Moreover this certification process obliges us to study and consequently to update us on the different modules.

These certifications are like a quality label, our customers appreciate when the engineers who intervene has the higher level of certification.

Moreover with the experience that I have, I think that the passage of these certifications allow us to have a richer view of the product and consequently to propose to our customers the best possible alternatives according to their needs.

DC: Describe one of your biggest BIG-IP challenges and how DevCentral helped in that situation.

RY: DC allowed me several times to solve the different problems I encountered. Things that seem simple to me today but that was not at the time I posted them and caused me quite some problems (Kerberos delegation, Kerberos authentication, Sideband, DDOS using iRule with session table …).

I remember that I had to set up a perimeter of security to protect an application using the APM (I know it looks pretty simple). But I realized that the application was contextual (Web and JNLP) and that the APM session cookies were not propagated on to other contexts, so JNLP part could not connect.

I will not go into the technical details but I had to create an iRule that used a table of correspondence between the cookie APM and the JNLP JSessionID that I stocked in a table session. Later I made an SSO on the backend application using the sideband (SSO profiles APM was not suitable). DC allowed me to build my iRule and sincerely without DC I would have had a lot of trouble and it would have taken me took a lot of time. And lastly DC allowed me to set up a fakeadfs using iRulesLX (and without DC, I do not think I could have done it alone).

DC: Finally, if you weren’t an IT admin – what would be your dream job? Or better, when you were a kid – what did you want to be when you grew up?

RY: When I was little and did not have school I spent my whole day on the football fields. I could play for 6 hours of suites without stopping. I loved football and I still do. So as you guessed I wanted to become a professional. But reality has taken over the dreams. Growing up I discovered computer science I started to build/dismantle my pc to add ram, change the hard drive, buy new graphics card for games… and little by little, I ended up in IT and I really do not regret it, but I admit that if I could have had the career of Ronaldo and also his salary I would not have mind either.

Thanks Rhazi!

Check out all of Rhazi’s DevCentral contributions, connect on LinkedIn and follow e-xpert Solutions on LinkedIn.

If there is a DevCentral member you think should be featured, let us know in the comments section!

Posted by: psilva | June 19, 2018

The DevCentral Chronicles June Edition 1(6)

dclogoniceHeading into the summer months is always a nice time of year – school is out, warmer weather, BBQs, beaches, baseball and maybe some vacation time. And hopefully all the Dads had a nice Father’s Day as we dive into our 6th installment of the DC Chronicles. The Chronicles are intended to keep you updated on DevCentral happenings and highlight some of the cool content you may have missed since the last issue and you can always catch up with the links at the bottom. Welcome!

We had 20 new articles published since Volume 1, Issue 5, including 5 new Lightboard Lessons! We really enjoy making these and you, the audience, certainly express your enjoyment in watching. John Wagnon lit some cool security related topics like, Explaining TLS 1.3, What Are AEAD Ciphers? and The TLS 1.3 Handshake while Jason Rahm drew up the F5 software lifecycle and BIG-IP Cloud Edition Overview. Since we’re on Cloud, Chris Zhang also wrote up how to Achieve firewall high-availability in Azure with F5.

bigip ce1We also published a bunch of materials about our new BIG-IP Cloud Edition. BIG-IP Cloud Edition is designed to enable easy to use and fast self-serve deployments of application services in private and public clouds and is composed of BIG-IP Per-App VEs and BIG-IQ CM 6.0. To get the scoop, you can check out the BIG-IP Cloud Edition FAQ, Building Applications For The Rest Of Us With BIG-IQ 6 and Skies Never Looked So Good With BIG-IP Cloud Edition. DevCentral’s Chase Abbott lays out the details.

Moving from Cloud to Security, several vulnerability mitigations from our SIRT team dropped recently. You got coverage for Remote Code Execution with Spring OAuth Extension (CVE-2018-1260), a New BIG-IP ASM v13 Drupal v8 Ready Template, and a New BIG-IP ASM v13 WordPress v4.9 Ready Template. Also filed under Security, Steve Lyons showed how to Configure Smart Card Authentication to BIG-IP Management Interface.

Other highlights include Lori MacVittie’s Three HTTP Routing Patterns You Should Know with Eric Chen’s follow on, SNI Routing with BIG-IP. Chen also gives us Clone Pool Across L3 explaining how you can use the “clone pool” feature to copy traffic to an IDS and/or network monitoring device. Jason continues his Getting started with the Python SDK series covering Working with Statistics and Working with Request Parameters and finally, Jie Gao was DevCentral’s Featured Member for June.

As always, You can stay engaged with @DevCentral by following us on Twitter, joining our LinkedIn Group or subscribing to our YouTube Channel. Look forward to hearing about your BIG-IP adventures.

The Chronicles:

Posted by: psilva | June 1, 2018

DevCentral’s Featured Member for June – Jie Gao

jieOur Featured Member series is a way for us to show appreciation and highlight active contributors in our community. Communities thrive on interaction and our Featured Series gives you some insight on some of our most active folks.

Jie Gao is a very active contributor on DevCentral since 2012 and has been on a roll recently answering questions about monitoring, URI redirects, SSL and many others. We’re excited to name Jie as our Featured Member for June!

Let’s learn a bit more about Jai.

DevCentral: please explain to the DC community a little about yourself, what you do and why it’s important.

Jie Gao: I am a system administrator in the University of Sydney and have been in the IT profession for over 20 years. I became an F5 administrator from “the other side” with a background in the open source, *nix system administration, system integration, Web application development, etc., some 7 years ago. I wanted to help bridge the great divide between networking and application through the use of F5. Upon reflection, I’m not sure I made much of a difference. 😦  Off work, I immerse myself listening to music on my Hi-Fi.

DC: You are very active contributor in the DevCentral community. What keeps you involved?

JG: Like many others here, I got on DevCentral initially to find a solution to a specific problem. I stayed on to learn more, to find out what more I can do and do better in my work. It is beneficial to know what issues other people are encountering, issues that might potentially affect my work later as well. If there is a software issue, then I could learn about it here early before it hits us, saving us from pulling our hairs out trying to figure out the puzzle. There are also solutions there that we could be asked to provide at work at the drop of a hat.

It feels good to be able to help people out. Sometimes it is even easier and more satisfying to help a total stranger than someone you already know. At the same time, it is also a good opportunity to learn how to answer a question properly – there are great minds and hands on DevCentral and I have learnt a great deal from them. I hope I have not provided too many incorrect/half-cooked answers! F5 staff tend to provide a complete, authoritative answer citing official documentation. Sometimes it might also be better to help people help themselves if they are not in a great hurry. Through answering questions, I have also learnt how to ask questions properly as well.

All said, DevCentral is an invaluable site of knowledge, solutions, and advice (and silly questions – including mine), where F5 administrators and solution designers, or really anyone, can find a quick answer to an F5-related issue in hand, or a pointer to a resource for further exploration. Great resource.

DC: Tell us a little about the areas of BIG-IP expertise you have.

JG: The University has been using the BIG-IP LTM/APM/GTM/ASM modules for various application services for many years, and I have been with it all along. However, I prefer to regard myself a generalist, although I spent most of my time on F5 at work. I like programming and code in a few languages, and I did my first Ruby script while answering a question about iControlREST on DevCentral. 🙂

DC: You are a Senior Network Designer at University of Sydney. Can you describe your typical workday and how you manage work/life balance?

univ sydneyJG: My typical workday starts with e-mail processing, browsing F5 Support’s New Updates, and checking into DevCentral for a look, in that order. Home is wherever I am. All my hobbies/activities are suitably for a single soul. So I have got the balance holistically right. 😉

DC: Describe one of your biggest BIG-IP challenges and how DevCentral helped in that situation.

JG: A few years ago I had a challenge, probably not the biggest but nonetheless an interesting one, to host a DNS split-view for a part of the organization as a matter of emergency. I found some useful code examples as well as relevant documentation on DevCentral and did it all in an iRule!

DC: Lastly, if you weren’t an IT admin – what would be your dream job? Or better, when you were a kid – what did you want to be when you grew up?

JG: The very first dream I recall I had as a toddler was to be a proud driver of a red-milky colored bus that thrummed through the center of Beijing. I have since had many other dreams, but I never did realize my first one.

Thanks Jie! Check out all of Jie’s DevCentral contributions and follow The University of Sydney on Twitter.

If there is a DevCentral member you think should be featured, let us know in the comments section!

Older Posts »