Abstract: A method, non-transitory computer readable medium, and network traffic management apparatus that receives a request for content from a client computing device. A length of the content is determined. A plurality of requests for a portion of the length of the content is sent to a plurality of server computing devices, wherein the portion of the length of the content is specified as a byte range in a range header of each of the plurality of requests. A plurality of responses to the plurality of requests is received. At least a subset of the plurality of responses is output to the client computing device.
Abstract: Methods, systems, and devices are described for managing network communications. A traffic manager module may receive a script over a management plane of a packet core, interpret the script to identify a traffic management policy; and dynamically modify at least one aspect of a proxy connection over a bearer plane of the packet core at the traffic manager module based on the identified traffic management policy.
Type:
Grant
Filed:
August 19, 2013
Date of Patent:
October 2, 2018
Assignee:
F5 Networks, Inc.
Inventors:
John Giacomoni, Manish Vachharajani, Mark Terrel
Abstract: Embodiments are directed towards upgrading hypervisors operating in hardware clusters that may be hosting one or more virtual clusters of virtual traffic managers. Virtual clusters may be arranged to span multiple computing devices in the hardware cluster. Spanning the virtual clusters across multiple hardware nodes the virtual cluster may enable the virtual clusters to remain operative while one or more hardware nodes may be upgraded. Hypervisor may include a management control plane for virtual clusters of virtual traffic managers. Hypervisors running on hardware nodes may manage the lower level networking traffic topology while the virtual traffic managers may manage the higher level network processing.
Abstract: Methods, systems, and devices are described for managing network communications. A traffic manager module configured to serve as a proxy between a plurality of client devices and a network service may receive a plurality of messages for the network service. Each message may be associated with at least one QoS parameter. The traffic manager module may transmit the plurality of messages to the network service over a connection between the traffic manager module and the network service. The QoS of the connection between the traffic manager module and the network service may be dynamically altered during the transmission of a first message of the plurality of messages based on the at least one QoS parameter associated with the first message.
Type:
Grant
Filed:
August 19, 2013
Date of Patent:
August 7, 2018
Assignee:
F5 Networks, Inc.
Inventors:
Manish Vachharajani, John Giacomoni, Mark Terrel, Leonard Maiorani
Abstract: A system, medium and method of performing dictionary compression is disclosed. A first data segment received at a receiver device (RD) from a transmiter device (TD) is selected A global bloom filter of the TD is queried to determine if the RD has a stored copy of a first plurality of content data bytes and corresponding first identifier and data length information for the first data segment. A first encoded data packet is prepared and sent which includes the first identifier and data length information without the first plurality of content data bytes. The RD utilizes the received first identifier and data length information to retrieve the first plurality of content data bytes associated with the first data segment from the RD's data store and decodes the first data segment to include the first plurality of content data bytes.
Abstract: Methods, non-transitory computer readable media and application management apparatuses, and application management systems that secure one or more entitlement grants includes transmitting a registration license request encrypted with a first public key to a license server. The registration license request comprises a registration identifier and a second public key. A registration license response is received from the license server. The registration license response comprises one or more license entitlement grants, the second public key, and a first secure signature encrypted with a first private key. The one or more license entitlement grants are authenticated when the first decrypted secure signature matches the first check signature.
Abstract: A system and method to establish and maintain access between a secured network and a remote client device communicating with different security protocols. Once the system and method verify that the remote client device had the requisite credentials to access the secured network domain, the system and method are delegated to fetch a service ticket to one or more dedicated servers on behalf of remote client device. The system and method receives a service ticket from the dedicated server and forwards the service ticket to the remote client device to use the service.
Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
Type:
Grant
Filed:
February 1, 2016
Date of Patent:
May 29, 2018
Assignee:
F5 Networks, Inc.
Inventors:
Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
Abstract: A method for maintaining server persistency, including: (a) receiving, by an intermediate entity, a first session request from client to receive a service from a server out of a plurality of servers that are connected to the intermediate entity; (b) selecting a server out of the plurality of servers and directing to the selected server information indicative of the first session request; (c) receiving a response of the selected server to the information indicative of the first session request; (d) analyzing the response of the selected server, to provide an analysis result indicative whether the response includes code to be executed by the client and includes at least one instruction that facilitates sending, by the client, another request, to receive a service from a server out of the plurality of servers; (e) modifying, based on the analysis result, the code by adding information that will cause the client to send a selected server identifier in association to the sending of the other request; and (f) sendi
Abstract: Embodiments are directed towards employing a traffic management system (TMS) that is enabled to deploy component virtual machines (CVM) to the cloud to perform tasks of the TMS. In some embodiments, a TMS may be employed with one or more CVMs. In at least one embodiment, the TMS may maintain an image of each CVM. Each CVM may be configured to perform one or more tasks, to operate in specific cloud infrastructures, or the like. The TMS may deploy one or more CVMs locally and/or to one or more public and/or private clouds. In some embodiments, deployment of the CVMs may be based on a type of task to be performed, anticipated resource utilization, customer policies, or the like. The deployment of the CVMs may be dynamically updated based on monitored usage patterns, task completions, customer policies, or the like.
Type:
Grant
Filed:
December 27, 2016
Date of Patent:
April 24, 2018
Assignee:
F5 Networks, Inc.
Inventors:
Richard Roderick Masters, Brent Wayne Blood, Paul Imre Szabo, Benn Sapin Bollay
Abstract: A traffic management device (TMD), system, and processor-readable storage medium directed towards automatically configuring an AAA proxy device (also referred to herein as “the proxy”) to load-balance AAA request messages across a plurality of AAA server devices. In one embodiment the proxy receives an AAA handshake message from an AAA client device. The proxy forwards the handshake message to each of the plurality of server devices and, in reply, receives an AAA handshake response message from each of the plurality of server devices. The proxy extracts attributes from each of the handshake response messages and automatically configures itself based on the extracted attributes. The proxy then load-balances, modifies and/or routes subsequently received AAA request messages based on the extracted attributes.
Abstract: A method, computer readable medium, and application delivery controller apparatus for content inlining includes obtaining content from one or more servers as requested by one or more clients, obtaining external content from the one or more servers as referenced by one or more external references included in the requested content, modifying the requested content to include at least one of the external content, and servicing the client request by communicating the modified requested content.
Abstract: Embodiments are directed towards managing communication over a network assist application classification using predicted subscriber behavior. Subscriber information associated with a network flow may be determined. Prediction information that includes application identifiers may be generated based on the subscriber information. A classification engine may determine the applications associated with the network flow based on the prediction information and the network flow using a plurality of application classifiers that correspond to the applications. If an application identifier included in the prediction information is correspondent to an application classifier, the application may be determined based on the correspondent application classifier; otherwise the application is determined based on the remainder of the application classifiers. A policy for managing the network flow may be determined based on the determined application.
Type:
Grant
Filed:
May 29, 2014
Date of Patent:
February 27, 2018
Assignee:
F5 Networks, Inc.
Inventors:
Gennady Dosovitsky, Dmitry Rovniaguin, Amir Harush, Ron Talmor, Dan Eliezer Karpati, Assaf Jacob Mendelson
Abstract: A method, non-transitory computer readable medium and device that assists obfuscating JavaScript includes obtaining a webpage requested by a client computing device. A determination of when javascript code is in the source code of the obtained webpage is made. A stored obfuscated javascript code is obtained when the javascript code is determined to be in the source code of the obtained webpage. The obtained obfuscated javascript code is embedded into the obtained webpage and the obtained webpage with the embedded obfuscated javascript code is sent to the requesting client computing device.
Abstract: Embodiments are directed towards dynamically generating a plugin module based on a customizable catalog. A plurality of application features may be determined based on a catalog of available application features of a visitor computer. One or more templates may be generated that lists application features. A plugin client and a corresponding plugin core that include application features listed in the one or more templates may be generated. The plugin client may then be provided to the host computer and the corresponding plugin core may be installed on the visitor computer. Information that may be associated with actions performed by users of the plugin client may be obtained from the host computer. Application features included in the plugin core may be determined based on the information obtained from the host computer. And, operations may be performed on the visitor computer based on the obtained information and the plugin core.
Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.
Type:
Grant
Filed:
July 11, 2014
Date of Patent:
January 9, 2018
Assignee:
F5 Networks, Inc.
Inventors:
Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
Abstract: A method, computer readable medium, and device for providing authenticated domain name service includes forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
Type:
Grant
Filed:
October 5, 2016
Date of Patent:
August 28, 2018
Assignee:
F5 Networks, Inc.
Inventors:
Peter M. Thornewell, Christopher R. Baker