These are some local networking configuration terms that you should know before you start configuring the BIG-IP® system and using Application Security Manager™.
For initial installation, the BIG-IP® hardware includes a hardware setup guide for your platform that you can refer to for details about how to install the hardware in a rack, connect the cables, and run the setup utility.
Next, you must configure the BIG-IP system on your network before you can run the Application Security Manager™ (ASM™) Deployment wizard to create a security policy. Which specific tasks you need to perform depend on your company's networking configuration. These are some of the suggested configuration tasks that you may need to perform.
Depending on your network environment, you may need to configure the following additional networking features on the BIG-IP® system before you start creating security policies.
Several application security features require that the DNS server is on the DNS lookup server list (). For example, integrating vulnerability assessment tools, web scraping mitigation, and external anti-virus protection may require you to configure DNS servers on the BIG-IP system.