Applies To:

Show Versions Show Versions

Manual Chapter: Deploying an Application-Ready Security Policy
Manual Chapter
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

The Application Security Manager provides several application-ready security policies. These security policies are preconfigured with the relevant entities for the following enterprise applications:
Lotus® Domino® 6.5
Microsoft® Outlook Web Access® Exchange 2003
Oracle® Applications 10g
Oracle® Applications 11i
PeopleSoft® Portal Solutions 9
SAP® NetWeaver® 7
In this implementation, we describe using the Deployment Wizard to deploy an application-ready security policy. For more information on the individual application-ready security policies, refer to the Security Policy Templates appendix, in the Configuration Guide for BIG-IP® Application Security Management.
Important: This implementation assumes that you have already configured the network settings that are appropriate for your environment. Refer to Chapter 2, Reviewing Basic Configuration Tasks, if you have not yet configured network connectivity.
Once you have completed the local area network configuration (described in Chapter 2, Reviewing Basic Configuration Tasks), you are ready to start the Deployment Wizard. The Deployment Wizard automates several essential configuration tasks for the security policy, to expedite the initial configuration.
When you start the Deployment Wizard, you select a deployment scenario. Each deployment scenario includes preset configuration options. The configuration options are tailored to address the needs of the environment or application for which you are creating a security policy.
Note: If you have not yet configured the basic local traffic settings, refer to Chapter 2, Reviewing Basic Configuration Tasks, and perform those tasks. Once you have completed the tasks outlined in that chapter, you can proceed with this implementation.
1.
On the Main tab of the navigation pane, in the Application Security section, click Web Applications.
The Web Applications screen opens in a new browser session.
2.
In the Name column, click the web application name that matches the application security class name.
The Select Deployment Scenario screen opens.
3.
Below the Deployment Wizard area, click the Run Deployment Wizard button.
The Select Deployment Scenario screen opns.
5.
Click the Next button.
The Configure Security Policy Properties screen opens.
In this step of the wizard, you configure the properties of the security policy, including the security policy name and the application language. You also select the application-ready security policy. For additional information on web application configuration, see the Working with Web Applications chapter in the Configuration Guide for BIG-IP® Application Security Management.
1.
On the Configure Security Policy Properties screen, in the Security Policy Name box, type a unique name for the new security policy that you are creating with the Security Policy Setup Wizard.
2.
For the Web Application setting, from the list select the web application to which this security policy applies.
3.
For the Application Language setting, select the specific language encoding from the list that corresponds to the web application encoding.
4.
For the Security PolicyTemplate setting, select the security policy template that applies to your enterprise application.
5.
For more information about application-ready security policy templates, refer to Appendix B, Working with the Application-Ready Security Policies in the Configuration Guide for BIG-IP® Application Security Management.
6.
Click Next.
The Policy Configuration Summary screen opens, where you can verify the configuration.
7.
Click Finish.
The system populates the security policy with the preconfigured entities, and activates the security policy.
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)