Manual Chapter : Additional Information

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 6.0.1
Manual Chapter

Additional Information

BIG-IQ navigation and customization

F5®BIG-IQ® Centralized Management includes navigation, search tools, and a customizable user interface to help you complete your tasks efficiently and find objects easily.

  • Access product documentation, F5 modules for Ansible, and online help

    To access BIG-IP, API, Ansible documentation, and F5 modules for Ansible, click the book icon in the upper-right corner of the screen. To view the context-sensitive online help, click the question mark in the upper-right corner.

  • Customized log in screen

    To customize your log in screen for users (for example, if you want to provide special guidance or make sure all users see a certain message), you can navigate to System > THIS DEVICE > General Properties , click the Edit button and type your message (up to 8,192 characters) in the Custom Login Message field.

  • Customized interactions with System and Network Security views

    There are a few customizable viewing options for the System and Network Security views. You can specify the amount of time that passes before BIG-IQ logs you out when the system is idle and what screen displays when you log back in. If you're using the Network Security service, you can specify what types of firewalls are displayed in the menu, have rule lists in policies auto expand, treat terms you search for as a filter, and specify default values for columns.

  • Global search, related content, and preview pane

    BIG-IQ has a robust and interactive global search feature that allows you to easily find a specific content and related content. From any screen, you can click the magnifying glass icon in the upper-right corner of the screen and type a search string. Search results are grouped by content type. From the results, you can click an object to go directly to that object's properties screen in BIG-IQ.

  • Flexible access to objects and configuration options

    For some objects, you can view and edit settings that are located in other places in the user interface, without having to stop what you're doing and navigate to another part of BIG-IQ. For example, you could be editing a firewall policy and find an address list in the toolbox that you want to look at. Right there, you can click the address to access the details, and then view or edit it as you want.

    You can also configure some types of objects from different places in BIG-IQ, depending on what your user role is or what work flow you're in. For example, you can create an access group from the Configuration area of BIG-IQ, as well as from the Devices area. This makes it convenient for you to access during other tasks you're doing in different areas of BIG-IQ.

  • Filters

    For each screen that contains a list, you can use a context-sensitive filter to search on a term, and then narrow your search further to view only those items that are relevant to you at the moment. For example, say you wanted to see local traffic and network audit logs. You can use the search on local traffic, and further refine what is displayed by filtering again on network audit logs.

  • Customization and sorting columns

    You can customize the columns that display in each screen that has a list, hiding any information that isn't important to you, as well as rearrange the order the columns display, and sort objects in the list. This helps you to focus on only those attributes that are relevant to you.

BIG-IQ Centralized Management documentation set

BIG-IQ Centralized Management documentation set is located on AskF5 at https://support.f5.com. Click the Product Manuals link under Resources, and select BIG-IQ Centralized Management from the product list, and select the appropriate version.

Title Use to:
F5 BIG-IQ Centralized Management Virtual Editions Setup guides Set up BIG-IQ Virtual Edition (VE) as a guest in a virtual environment using supported hypervisors.
Planning and Implementing an F5 BIG-IQ Centralized Management Deployment Plan deployment, license, and set up the BIG-IQ system in your network.
F5 BIG-IQ Centralized Management: Core Concepts Find out more about the concepts about the core functionality included with BIG-IQ Centralized Management.
F5 BIG-IQ Centralized Management DCD Sizing Guide Determine the resources that are required to handle the data generated by the BIG-IP® devices you manage. Requirements vary according to the type and amount of data you generate.
F5 BIG-IQ Centralized Management: Authentication, Roles, and User Management
  • Configure authentication through a 3rd-party provider (LDAP, RADIUS or TACAS+) .
  • Use built-in and custom roles to manage user access.
F5 BIG-IQ Centralized Management: Monitoring and Reports
  • Set up health monitoring and alerts and statistics collections
  • Manage audit logs, run reports, and analyze statistics.
  • Troubleshoot Access reports.
F5 BIG-IQ Centralized Management: Device
  • Discover BIG-IP devices and import F5 services.
  • Deploy software images, licenses, SSL certificates, backup files, and configurations.
F5 BIG-IQ Local Traffic & Network Implementations Manage:
  • Local Traffic profiles
  • Virtual servers
  • Network objects
  • iRules
  • Applications and application templates
As well as configuring an IPsec tunnel and event viewing.
F5 BIG-IQ Centralized Management: Security

Manage:

  • Object pinning
  • Firewall contexts
  • Address and port lists
  • Rules, rule lists, policies, and rule reports
  • Service, timer, and port misuse policies
  • NAT policies and translations
  • FQDN resolvers
  • Change verifications
  • External logging devices
  • Shared security for virtual servers, DoS profiles, device DoS configurations, network whitelists, logging profiles, and SSH profiles
  • Bot signatures and bot signature categories
  • IP intelligence settings
  • External redirection settings
  • Application Securities Policies
  • Signature files, custom attack signatures and sets
  • Web Application Security event logs
F5 BIG-IQ Centralized Management: Access
  • Configure an Access group, HA pair, and cluster.
  • Manage access groups.
  • View and edit access configurations.
  • Configure authentication for Active Directory, SecuID, HTTP, Oracle Access Manager, OCSP responder, CRLDP, and Kerberos.
  • Manage audit logs
F5 BIG-IQ Centralized Management: Fraud Protection Service Set up, manage, and monitor alerts for fraud protection.
F5 Platform Guide: BIG-IQ 7000 Series Set up and manage the BIG-IQ 7000 hardware platform.
F5 BIG-IQ Centralized Management Use Case: Provide Role-Based User Access to an Application Give role-based user access to a SharePoint application.
F5 BIG-IQ Centralized Management: Auto-Scale in a VMware Cloud Start auto-scaling BIG-IP VE devices in a VMware cloud to manage applications.
F5 BIG-IQ Centralized Management: Auto-Scale in a AWS Cloud Start auto-scaling BIG-IP VE devices in an AWS cloud to manage applications.
BIG-IQ Centralized Management: Monitoring and Managing Application Services Monitor the health and statistics for your application services.
F5 BIG-IQ Centralized Management upgrade guides Upgrade BIG-IQ Centralized Management and BIG-IQ Logging Node to the most recent software version.
Release notes Find information about the current software release, including a list of associated documentation, a summary of new features, enhancements, fixes, known issues, and available workarounds.
AskF5 Articles and Tech Notes Read responses and resolutions to known issues. Tech Notes provide additional configuration instructions and how-to information.