This list summarizes some basic networking configuration terms that you should know before you start configuring the BIG-IP system and using Application Security Manager (ASM).
For initial installation, the BIG-IP hardware includes a hardware setup guide for your platform that you can refer to for details about how to install the hardware in a rack, connect the cables, and run the setup utility.
Next, you must configure the BIG-IP system on your network before you can run the Application Security Manager (ASM) Deployment wizard to create a security policy. The specific tasks you need to perform depend on your company's networking configuration, and which of the other BIG-IP system features are in use.
For using ASM, the minimum networking configuration tasks that you need to perform are creating a VLAN and a self-IP address for the system. During the process of creating a security policy, the system helps you complete other necessary configuration tasks, such as creating a virtual server and pool. The tasks are included here in case you want to create them first. For complex networking configurations that also use other BIG-IP features, you need to perform additional tasks described in the respective documentation.
For example, you can type ffff:ffff:ffff:ffff:0000:0000:0000:0000 or ffff:ffff:ffff:ffff::.
Depending on your network environment, you may need to configure the following additional networking features on the BIG-IP system before you start creating security policies.
Several Application Security features require that the DNS server is on the DNS lookup server list (). For example, integrating vulnerability assessment tools, web scraping mitigation, and external anti-virus protection usually require you to configure DNS servers on the BIG-IP system.