Applies To:

Show Versions Show Versions

Manual Chapter: Introducing Application Security Management
Manual Chapter
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

The BIG-IP® Application Security Manager is designed to protect mission-critical enterprise Web infrastructure against application-layer attacks, and to monitor the protected web applications. The Application Security Manager can prevent a variety of web application attacks, such as:
Malicious exploitations of the application memory buffer to stop services, to get shell access, and to propagate worms
The BIG-IP Application Security Manager is one of several products that constitute the BIG-IP product family. All products in the BIG-IP family run on the powerful Traffic Management Operating System, commonly referred to as TMOS. For an overview of the complete BIG-IP product offering, see the introductory chapter of the TMOS Management Guide for BIG-IP® Systems.
Integrated platform guaranteeing the delivery of secure application traffic
Built on F5 Networks award-winning TMOS architecture, the ICSA-certified, positive-security Application Security Manager is fully integrated with the BIG-IP Local Traffic Manager.
Full support in the iControl SDK
The iControl SDK includes full support for the application security functionality.
Attack Signatures protection
The Attack Signatures in the Application Security Manager offer protection from generalized and known application attacks such as known worms, vulnerabilities, and requests for restricted files and URLs. The Attack Signatures Update feature provides current, up-to-date signatures, so that your applications are always protected from new attacks and threats.
Positive security model
The Application Security Manager creates a robust positive security policy to completely protect web applications from targeted web application layer threats, such as buffer overflows, SQL injection, cross-site scripting, parameter tampering, cookie poisoning, and others, by allowing only valid application transactions. The positive security model is based on a combination of valid user session context and valid user input, as well as a valid application response.
Integrated, simplified management
The browser-based Configuration utility provides network device configuration, centralized visual security policy management, and easy-to-read audit reports. Additional tools provide a highly automated and visual security policy building mechanism, based on a proprietary Policy Builder that automatically builds a map of all the valid application transactions and drastically simplifies the security policy management.
Role-based administration
The BIG-IP system supports role-based administration, which you can use to restrict access to various components of the product. For example, users with the Application Security Policy Editor role can audit and maintain application security policies but have no access to the network or general system administration.
Configurable security levels
The Application Security Manager offers varying levels of security, from general protection of web site elements such as file types and character sets, to tailored, highly granular, application-specific security policies. This flexibility provides enterprises the ability to choose the level of security they need, and reduce management costs based on the level of protection and risks acceptable to their business environment.
The Configuration Guide for BIG-IP® Application Security Management contains configuration information for the all of the application security components, including:
This configuration guide also contains information on configuring a local traffic virtual server to use an application security class to protect the web application resources. The application security class is the bridge between the local traffic components and the application security components.
Important: For detailed information on configuring the local traffic objects, refer to the Configuration Guide for BIG-IP® Local Traffic Management. For information on the protocol security objects, refer to the Configuration Guide for BIG-IP® Protocol Security Module. Both of these guides are available in the AskF5SM Knowledge Base, https://support.f5.com.
The Configuration utility is the browser-based graphical user interface for the BIG-IP system. In the Configuration utility, the Main tab provides access to the application security configuration objects, the system overview, templates and wizards, and to network, system, and local traffic configuration objects. The Help tab contains context-sensitive online help for each screen.
Figure 1.1 shows the Welcome screen of the Configuration utility.
The identification and messages area
The identification and messages area of the Configuration utility is the screen region that is above the navigation pane, the menu bar, and the body. In this area, you find the system identification, including the host name, and management IP address. This area is also where certain system messages display, for example Activation Successful, which appears after a successful licensing process.
The navigation pane
The navigation pane, on the left side of the screen, contains the Main tab, the Help tab, and, the Search tab. The Main tab provides links to the major configuration objects. The Help tab provides context-sensitive help for each screen in the Configuration utility. The Search tab provides a quick way to locate local traffic objects.
The menu bar
The menu bar, which is below the identification and messages area, and above the body, provides links to the additional configuration objects within each major object.
The body
The body is the screen area where the configuration settings display.
In the Application Security section of the navigation pane, the first time you click an object with the link icon (), the Configuration utility opens a second screen that contains only application security configuration objects. To differentiate between the two instances, next to the F5 logo in the identification and messages area, you see either a status message (for example, State: ACTIVE) or Application Security. In this document, we refer to the navigation pane of the BIG-IP Configuration utility as simply the navigation pane. We refer to the navigation pane for the application security Configuration utility as the Application Security navigation pane.
In the Configuration utility for application security, blue URLs indicate non-referrer URLs, while gold URLs indicate referrer URLs. Referrers are web pages that can request other URLs. For example, an HTML page can request a GIF, JPG, or PNG image file. The HTML page is a referrer, and the GIF, JPG, and PNG files are non-referrers.
Note: The Application Security Managers referrer is similar to the HTTP Referer header. We recommend that you configure referrers for complex objects, such as HTML pages, but not for embedded objects, such as GIF files.
Figure 1.2 illustrates a referrer URL (/register.php) and several non-referrer URLs.
For the most current list of the supported browsers for the Configuration utility, refer to the current release note on the AskF5SM Knowledge Base web site, https://support.f5.com.
To help you easily identify and understand certain types of information, this documentation uses the following stylistic conventions.
All examples in this documentation use only private IP addresses. When you set up the configurations we describe, you must use IP addresses suitable to your own network in place of our sample IP addresses.
When we first define a new term, the term is shown in bold italic text. For example, a referrer is a web page that calls other URLs, such as image files.
We refer to all products in the BIG-IP product family as BIG-IP systems. We refer to the software modules by their name; for example, we refer to the Local Traffic Manager module as simply the Local Traffic Manager. If configuration information relates to a specific hardware platform, we note the platform.
We apply bold text to a variety of items to help you easily pick them out of a block of text. These items include web addresses, IP addresses, utility names, most controls in the Configuration utility, and portions of commands, such as variables and keywords. For example, click the Apply Policy button to make the security policy active.
We use italic text to denote a reference to another document or section of a document. We use bold, italic text to denote a reference to a book title. For example, you can find information about local traffic virtual servers in the Configuring Virtual Servers chapter, in the Configuration Guide for BIG-IP® Local Traffic Management.
We show actual, complete commands in bold Courier text. Note that we do not include the corresponding screen prompt, unless the command is shown in a figure that depicts an entire command line screen. Table 1.1 explains additional special conventions used in command line syntax.
Online help for Application Security components
The Configuration utility has online help for each screen. The online help contains descriptions of each control and setting on the screen. Click the Help tab in the left navigation pane to view the online help for a screen.
Welcome screen in the Configuration utility
The Welcome screen in the Configuration utility contains links to many useful web sites and resources, including the AskF5SM Knowledge Base, the F5 Solution Center, the F5 DevCentral web site, plug-ins, SNMP MIBs, and SSH clients.
F5 Networks Technical Support web site
The F5 Networks Technical Support web site, https://support.f5.com, provides the latest documentation for the product, including:
Release notes for the Application Security Manager, Local Traffic Manager, and Protocol Security module, current and past
BIG-IP® Application Security Manager: Getting Started Guide
BIG-IP® Systems: Getting Started Guide
Configuration Guide for BIG-IP® Local Traffic Management
Configuration Guide for BIG-IP® Protocol Security Module
The AskF5SM Knowledge Base
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)