Stress Alternate Access Mappings …  If you are a SharePoint Administrator I am certain you have heard of these.  Articles about Alternate Access Mappings (AAM’s for short) abound on the Internet, Microsoft even has a three part blog article titled “What every SharePoint Administrator needs to know about AAM”.  Why a three part blog article?  Well, mainly because AAM’s can be very confusing to configure and they vary from deployment to deployment.

I have yet to find an article on the web about configuring the AAM’s of a MOSS 2007 farm when an F5 BIG-IP is being used, so I thought I would write one up.  The awesome folks over at F5 have an excellent Deployment Guide that walks you through setting up your BIG-IP to deliver SharePoint 2007, but the guide does not cover Alternate Access Mappings.  It simply refers you to the aforementioned Microsoft article.  I do recommend using their deployment guide for your deployment, because it covers a lot and is good for most environments.  For the Alternate access mappings part though, I hope this article can help steer you in the right direction.

Read More >>

Share

A few weeks ago while deep diving into the BIG-IP ASM 4100 and what it can do, I began looking around for some documentation on the processes associated with the ASM module.  In particular I wanted to find out what those processes were and exactly what each of them did.  I thought it would make a decent reference article for folks just getting involved with the ASM.

After looking around on the F5 website and through a few reams of paper searching for that information, I discovered that it didn’t exist in the public domain.  Therefore I opened up a ticket with the kind folks over at F5 regarding the matter.  Below is the end result of their hard work:

Read More >>

Share

I was in the iTunes App Store the other day purchasing a copy of “Wolfenstein 3-D” and I stumbled upon the WordPress for iPhone application. Now that I have had time to play through a few of the levels offered up by Wolfenstein, I decided to finally take a look at the WordPress application. So far, I like what I have found.

Read More >>

Share

Protecting web applications hosted by your company and ensuring their availability is essential to the success of your business.  If your network is breached and your customers data is exposed not only is it bad for you and bad for your company. It’s also very bad for priority number 1… Your Customers.  With today’s economy the negative publicity associated with a breach could spell doom for your company.  With hackers rapidly exploiting Zero Day attacks,  SQL Injection attacks and XSS attacks through vast armies of online bot networks it is only a matter of time until they start attacking your network.  If they aren’t already….

OK, I will step down off my soap/sales pitch box now.  It is just hard to have any kind of a discussion in the realm of network security without mentioning the consequences of NOT implementing a solution to address those concerns.  In this post I am going to discuss some information on an implementation that I have been working on over the last few weeks.  Of course the normal disclaimers do apply. The solution I am going to discuss is just an example of one implementation.  There are a number of ways roll out one of these devices into your existing infrastructure.  And last but not least I recommend that you seek further guidance from a Certified F5 Product Consultant if you are planning on adding one these devices to your network.

Read More >>

Share

This last weekend I decided to P2V or Physical to Virtual a Ubuntu x64 machine and wanted to share a little bit of information about that experience.  I found a lot of  tutorials online about cloning Ubuntu machines, but they all seemed a little to involved for what I was trying to do.  After a bit of searching I reached the conclusion that I just wanted some software that would handle most of the process for me.  Having previous experience with Norton Ghost and Symantec Backup Exec, I began searching for the Linux equivalent to those programs.

Read More >>

Share