This list summarizes some basic networking configuration terms that you should know before you start configuring the BIG-IP® system and using Application Security Manager™.
You must configure the BIG-IP system on your network before you can run the Application Security Manager™ (ASM™) Deployment wizard to create a security policy. Which specific tasks you need to perform depend on your company's networking configuration, and which of the other BIG-IP system features are in use.
For using ASM, the minimum networking configuration tasks that you need to perform are creating a VLAN and a self-IP for the system. During the process of creating a security policy, the system can help you complete other necessary configuration tasks, such as automatically creating an HTTP class with Application Security enabled, and creating a new virtual server and pool. For complex networking configurations that also use other BIG-IP features, you need to perform additional tasks described in the respective documentation.
Depending on your network environment, you may need to configure the following additional networking features on the BIG-IP® system before you start creating security policies.
Several Application Security features require that the DNS server is on the DNS lookup server list (). For example, integrating vulnerability assessment tools, web scraping mitigation, and external anti-virus protection usually require you to configure DNS servers on the BIG-IP system.