Applies To:

Show Versions Show Versions

Manual Chapter: Managing Virtual Servers
Manual Chapter
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

About the Virtual Servers panel

Through the Virtual Servers panel, BIG-IQ Web Application Security displays the virtual servers on each discovered BIG-IP device, and enables you to view the properties for these virtual servers.

For each device discovered, the BIG-IQ system creates an extra virtual server to hold all security policies not related to any virtual server in the discovered device.

Displaying virtual server properties

With BIG-IQ Web Application Security, you can easily view virtual server properties.
  1. To display properties for an individual virtual server, hover over the name for that virtual server (in the Virtual Servers panel).
  2. Click the gear icon to expand the panel and display the screen containing virtual server properties. Properties are read-only. The only actions you can take in the expanded screen concern the attached policies.
    Option Description
    Name Name of the virtual server.
    Full Path Path, including partition, to the virtual server.
    IP Address Self IP address of the BIG-IP device.
    Is Inactive Policies Holder Yes/No.
    Device FQDN of the BIG-IP device.
    Attached Policies Remove/Change.

Virtual server properties

Virtual server properties are read-only and displayed for informational purposes only.

Property Description
Name Name of the virtual server.
Full Path Full path, including partition, to the virtual server on the BIG-IP device.
Description Optional description of the virtual server.
IP Address Self IP address of the BIG-IP device.
Is Inactive Policies Holder Yes/No.
Device FQDN of the BIG-IP device.
Attached Policies Remove/Change/Add attached policies.

Changing security policy attachment to virtual servers

You can use the BIG-IQ Web Application Security Virtual Server screen to add policies to a virtual server, or remove policies from the virtual server they are attached to. You can change the virtual server a given policy is attached to.
Note: You can add to, but not remove from nor change security policies on an inactive virtual server. You can add security policies (instead of replace them) to an active virtual server only if it does not have a security policy already.
  1. Navigate to Security > Web Application Security > Overview.
  2. In the Virtual Servers panel, hover over the name of the virtual server to change and click the gear icon to display its Properties screen.
  3. On the screen, to the right of Attached Policies, click Change. The Select Policy popup screen opens with a list of available policies.
  4. Select the policies you want to add to the current virtual server and click Add. The popup screen closes and the selected policy is listed to the right of Attached Policies.
  5. At the top of the Virtual Server screen, click Save. A popup screen requests confirmation of the change.
  6. Click Change to accept the virtual server change. The Virtual Server details screen closes. If an error message displays, the virtual server on the BIG-IP device may not be configured to support ASM policies. In this case, restart this task with another virtual server.
The selected policies are added to or changed from the current virtual server. On the next deployment operation, the policies will be deployed to the virtual server's BIG-IP host.

Removing links between virtual servers and security policies

You can use BIG-IQ Web Application Security to remove the link between a virtual server and a security policy.

  1. To begin the process, navigate to the Virtual Servers panel.
  2. In the Virtual Servers panel, hover over the name of the virtual server to change and click the gear icon to display its Properties screen.
  3. In the expanded Properties screen, click Remove.
The link between the policy and the virtual server is deleted. This means that if the policy is attached to the virtual server on the remote BIG-IP device, the link between them is deleted during the deployment process.
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)