F5® BIG-IQ® Centralized Management is a tool that helps you manage BIG-IP devices, and all of their services (such as LTM, AFM, ASM and so forth), from one location. That means you and your co-workers don't have to log in to individual BIG-IP systems to get your job done. From BIG-IQ, you can manage a variety of tasks from licensing to health monitoring and traffic to security. And because access to each area of BIG-IQ is role based, you can limit access to users to maximize work flows while minimizing errors and potential security issues.
BIG-IQ has a robust and interactive global search feature that allows you to easily find a specific content and related content. From any screen, you can click the magnifying glass icon in the upper-right corner of the screen and type a search string. Search results are grouped by content type. From the results, you can click an object's row and a preview displays in a panel. Clicking a link takes you directly to the content's properties screen in BIG-IQ.Flexible access to objects and configuration options
For some objects, you can view and edit settings that are located in other places in the user interface, without having to stop what you're doing and navigate to another part of BIG-IQ. For example, you could be editing a firewall policy and find an address list in the toolbox that you want to look at. Right there, you can click the address to access the details, and then view or edit it as you want.
You can also configure some types of objects from different places in BIG-IQ, depending on what your user role is or what work flow you're in. For example, you can create an access group from the Configuration area of BIG-IQ, as well as from the Devices area. This makes it convenient for you to access during other tasks you're doing in different areas of BIG-IQ.
For each screen that contains a list, you can use a context-sensitive filter to search on a term, and then narrow your search further to view only those items that are relevant to you at the moment. For example, say you wanted to see local traffic and network audit logs. You can use the search on local traffic, and further refine what is displayed by filtering again on network audit logs.
You can customize the columns that display in each screen that has a list, hiding any information that isn't important to you, as well as rearrange the order the columns display. This helps you to focus on only those attributes that are relevant to you. You can also sort on most columns in the list.
It's important to note that the content BIG-IQ returns for a search is specific to your user role privileges. For example, if your user role doesn't have privileges for content associated with security, content specific only to security does not display.
|Contains||Opens the search up to any content that contains the search term.|
|Include ranges (IP Address & Port)||Returns a wider range of IP addresses and port numbers that match formats representing numeric ranges.|
|Exact Match||Returns only content that exactly matches the search term.|
|Search only||Narrows the content returned to include only a specific kind of object.|