United Security Products 10-4 Specifications

Browse online or download Specifications for Telephones United Security Products 10-4. United Security Products 10-4 Specifications User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 430
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - MAN-0283-02

Configuration Guide forBIG-IP® Application Security Manager™version 10.2MAN-0283-02

Page 2

Table of Contentsviii5Building a Security Policy AutomaticallyOverview of automatic policy building ...

Page 3 - Legal Notices

Chapter 66 - 20Disallowing specific file typesFor some web applications, you may want to deny requests for certain file types. In this case, you can c

Page 4 - Acknowledgments

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 21Configuring URLsYou can add three types of UR

Page 5

Chapter 66 - 22Perform Tightening Specifies, when checked, that tightening is enabled. As a result:-When Policy Builder runs, it adds explicit URLs th

Page 6

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 23Overview of URL parameters and extractionsURL

Page 7

Chapter 66 - 24Creating an explicit URLYou can build the list of URLs in the security policy in these ways:• You can run the Policy Builder. See Chapt

Page 8

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 25Removing a URLWeb applications can change ove

Page 9

Chapter 66 - 26Identifying referrer URLs In lists of URLs, non-referrer URLs appear in blue and referrer URLs appear in gold. Referrer URLs are web pa

Page 10 - Table of Contents

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 276. Click the Create button.7. To put the secu

Page 11 - Maintaining Security Policies

Chapter 66 - 28Configuring AMF security checksYou configure AMF security on a per-URL basis. You can configure AMF security for both wildcard URLs and

Page 12 - Working with Parameters

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 29To view or modify the character set for URLs1

Page 13 - Protecting XML Applications

Table of ContentsConfiguration Guide for BIG-IP® Application Security Manager™ixConfiguring a dynamic flow from a URL ...

Page 14 - Displaying Reports

Chapter 66 - 30Configuring flowsThe application flow defines the access path leading from one URL to another URL within the web application. For examp

Page 15 - Security Policy Violations

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 31Adding a flow to a URLYou can manually create

Page 16

Chapter 66 - 32Configuring a dynamic flow from a URLSome web applications contain URLs with dynamic names, for example, the links to a server location

Page 17

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 33Configuring login URLs to prevent forceful br

Page 18

Chapter 66 - 34To configure login page settings1. In the navigation pane, expand Application Security, point to Flows, point to Login Pages, and click

Page 19 - ◆ Attack Signature protection

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 35Masking sensitive dataDepending on the web ap

Page 20 - ◆ Role-based administration

Chapter 66 - 366. To specify patterns in the data not to be considered sensitive:a) Check the Enable Exception Patterns box.b) In the New Pattern box,

Page 21 - ◆ The body

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 374. From the Cookie Name Type list, select whe

Page 22

Chapter 66 - 38Deleting an allowed modified cookieYou can delete an allowed modified cookies, as required by changes in the web application.To delete

Page 23

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 39Configuring mandatory headersIf your applicat

Page 24

Table of ContentsxSorting wildcard file types ...9-8C

Page 25 - ◆ Run the Deployment wizard

Chapter 66 - 40Configuring allowed methodsAll security policies accept standard HTTP methods by default. The default allowed methods are GET, HEAD, an

Page 26 - Defining a local traffic pool

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 41Configuring security policy blockingYou can c

Page 27

Chapter 66 - 42Click the information icon ( ) by a violation, or refer to Appendix A, Security Policy Violations, for descriptions of the violations.

Page 28

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 43Configuring the blocking actionsOn the Blocki

Page 29 - Running the Deployment wizard

Chapter 66 - 44Configuring blocking properties for evasion techniquesFor every HTTP request, Application Security Manager examines the request for eva

Page 30 - To view the monitoring tools

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 45Configuring blocking properties for web servi

Page 31

Chapter 66 - 46Configuring the response pagesThe Application Security Manager has a default blocking response page that it returns to the client when

Page 32

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 475. If you selected the Redirect URL option in

Page 33

Chapter 66 - 48Configuring CSRF protectionCross-site request forgery (CSRF) is an attack that forces a user to execute unwanted actions on a web appli

Page 34

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 495. For URLs List, select the option that indi

Page 35

Table of ContentsConfiguration Guide for BIG-IP® Application Security Manager™xi11Working with Attack SignaturesOverview of attack signatures ...

Page 36

Chapter 66 - 50

Page 37 - Paths traffic classifier

7Configuring Anomaly Detection• What is anomaly detection?• Preventing DoS attacks for Layer 7 traffic• Mitigating brute force attacks• Configuring IP

Page 39

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 1What is anomaly detection?Anomaly detection is a way of

Page 40 - ◆ Send to pool

Chapter 77 - 2Preventing DoS attacks for Layer 7 trafficA denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable

Page 41 - To rewrite a URI

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 3If you choose latency-based, DoS attacks are detected b

Page 42 - Chapter 3

Chapter 77 - 44. For the Detection Mode, select the way you want the system to look for DoS attacks:• TPS-basedDetermines DoS attacks from the client

Page 43 - Working with Web Applications

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 5to the average rate prior to the attack, or lower than

Page 44

Chapter 77 - 69. For the Prevention Duration setting, specify the length of time for which the system mitigates DoS attacks:• Unlimited: Select if you

Page 45 - What is a web application?

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 7The system considers it to be a brute force attack if t

Page 46

Table of Contentsxii13Refining the Security Policy Using LearningOverview of the learning process ...

Page 47

Chapter 77 - 84. For the Password Parameter Name setting, type the password parameter written in the code of the HTML form. When the system detects th

Page 48

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 9To configure dynamic brute force protection, use the se

Page 49

Chapter 77 - 10• Source IP-Based Rate LimitingCheck to drop requests from suspicious IP addresses. Application Security Manager drops connections to l

Page 50

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 11To configure access validationContinue configuring the

Page 51

Chapter 77 - 12Configuring IP address enforcementYou can configure the IP Enforcer to perform enforcement based on IP address. When the IP Enforcer is

Page 52 - Re-enabling a web application

Configuring Anomaly DetectionConfiguration Guide for BIG-IP® Application Security Manager™7 - 137. To put the security policy changes into effect imme

Page 53

Chapter 77 - 14Preventing web scraping detection on certain addressesIf your environment uses legitimate automated tests, you can create a white list

Page 54

8Maintaining Security Policies • Maintaining a security policy• Reviewing a log of all security policy changes• Displaying security policies in a tree

Page 56

Maintaining Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™8 - 1Maintaining a security policySecurity policies can chan

Page 57

Table of ContentsConfiguration Guide for BIG-IP® Application Security Manager™xiiiViewing PCI Compliance reports ...

Page 58

Chapter 88 - 2Editing an existing security policyYou can access a security policy for editing from either the Policies List screen, or from the editin

Page 59

Maintaining Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™8 - 3Copying a security policyYou can copy a security policy

Page 60 - Changing the policy type

Chapter 88 - 4To export a security policy1. In the navigation pane, expand Application Security and click Policies List.The Policies List screen opens

Page 61 - To change the policy type

Maintaining Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™8 - 5Merging two security policiesYou can use the policy mer

Page 62 - Chapter 5

Chapter 88 - 67. Click the Download Full Report button to open or save the entire Merge Report.8. Click OK.The screen refreshes, and the merged securi

Page 63

Maintaining Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™8 - 7Restoring a deleted security policyIf you delete a secu

Page 64

Chapter 88 - 8Viewing and restoring an archived security policyThe Application Security Manager keeps an archive of security policies that have been s

Page 65

Maintaining Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™8 - 9Reviewing a log of all security policy changesThe Appli

Page 66

Chapter 88 - 10Displaying security policies in a tree viewYou can display a tree view of the security policy to quickly view its contents. The tree vi

Page 67

Maintaining Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™8 - 11Using the security policy audit toolsApplication Secur

Page 68

Table of ContentsxivUsing the WhiteHat Sentinel Baseline security policy ... B-13Overview of the

Page 70 - Configuration screen

9Working with Wildcard Entities• Overview of wildcard entities• Configuring wildcard file types• Configuring wildcard URLs• Configuring wildcard param

Page 72

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 1Overview of wildcard entitiesWildcard entities are web

Page 73

Chapter 99 - 2Understanding staging and tightening for wildcard entitiesWhen you create a wildcard entity, you have the option to enable staging and t

Page 74

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 3Understanding stagingYou can perform staging on wildca

Page 75

Chapter 99 - 45. Click OK.The screen refreshes; the system performs the following on selected entities:• Removes from staging entities whose staging p

Page 76

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 5Security Enforcer applies any applicable security chec

Page 77

Chapter 99 - 66. Modify the length settings as required.7. If you want the system to parse responses in addition to parsing requests, check the Check

Page 78

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 7Deleting wildcard file typesYou can delete wildcard fi

Page 79

1Introducing the Application Security Manager•Overview of the BIG-IP Application Security Manager• Getting started with the user interface• Finding he

Page 80

Chapter 99 - 8Sorting wildcard file typesWhen you have configured more than one wildcard file type, you can set the enforcement order, which is the se

Page 81 - Creating security policies

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 9Configuring wildcard URLsURLs represent the pages and

Page 82

Chapter 99 - 107. If you want the system to validate XML data in requests to this URL based on the settings configured in an XML profile, check the Ap

Page 83 - ◆ Blocking mode

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 11Modifying wildcard URLsAt times, you may want to modi

Page 84

Chapter 99 - 12Sorting wildcard URLsWhen you have configured more than one wildcard URL, you can set the enforcement order, which is the order in whic

Page 85

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 13Configuring wildcard parametersYou can specify wildca

Page 86

Chapter 99 - 145. For the Parameter Level setting, select the appropriate option for this wildcard parameter.• Global Parameter: For more information,

Page 87

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 15Modifying wildcard parametersYou may want to modify t

Page 88

Chapter 99 - 165. To put the security policy changes into effect immediately, click the Apply Policy button, then click OK to confirm.The system appli

Page 89

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 17Tip When adding wildcard URLs, you should arrange the

Page 91

Chapter 99 - 18Using wildcards for allowed modified cookie headersYou can use wildcards for allowed modified cookie headers to reduce the number of Mo

Page 92 - To activate a security policy

Working with Wildcard EntitiesConfiguration Guide for BIG-IP® Application Security Manager™9 - 19Checking the status of wildcard tightening for allowe

Page 93

Chapter 99 - 207. In the Tightening column of the allowed modified cookies list, point to the light bulb icon.The system displays information on the l

Page 94

10Working with Parameters• Understanding parameters• Working with global parameters• Working with URL parameters• Working with flow parameters• Config

Page 96 - Adding file types

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 1Understanding parametersParameters are an integral entity in

Page 97 - Creating allowed file types

Chapter 1010 - 2Working with global parameters Global parameters are those that do not have an association with a specific URL or application flow. Th

Page 98

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 37. If you are creating a wildcard parameter and you want the

Page 99 - Removing file types

Chapter 1010 - 4Editing the properties of a global parameterAt times, you may want to update the characteristics of a global parameter. This is easily

Page 100 - To disallow a file type

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 5Working with URL parametersYou define parameters in the cont

Page 101 - Configuring URLs

Introducing the Application Security ManagerConfiguration Guide for BIG-IP® Application Security Manager™1 - 1Overview of the BIG-IP Application Secur

Page 102 - Chapter 6

Chapter 1010 - 64. In the Create New Parameter area, for the Parameter Name setting, select an option:• If you select Explicit, then in the box, type

Page 103 - Overview of URL flows

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 713. To put the security policy changes into effect immediate

Page 104 - Creating an explicit URL

Chapter 1010 - 84. Click OK.The system deletes the parameter.5. To put the security policy changes into effect immediately, click the Apply Policy but

Page 105 - To view or modify a URL

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 94. In the Create New Parameter area, for the Parameter Name

Page 106 - To add disallowed URLs

Chapter 1010 - 1015. For the Parameter Value Type setting, select the format for the parameter value. Depending on the value type you select, the scre

Page 107 - Application Security Manager

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 11Deleting a flow parameterWeb applications can change over t

Page 108 - To configure AMF security

Chapter 1010 - 12Configuring parameter characteristicsParameter characteristics define the individual attributes of the parameter. The parameter chara

Page 109

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 13want to configure the parameter as a user-input parameter i

Page 110 - Configuring flows

Chapter 1010 - 14Configuring parameter characteristics for user-input parametersUser-input parameters are those for which the user can provide a value

Page 111 - Adding a flow to a URL

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 153. For the Data Type setting, use the default value, Alpha-

Page 113 - To configure login URLs

Chapter 11 - 2◆ Positive security modelThe Application Security Manager creates a robust positive security policy to completely protect web applicatio

Page 114

Chapter 1010 - 16• In the Overridden Security Policy Settings list, change the attack signature state as required. Note that the state that you select

Page 115 - Masking sensitive data

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 17Configuring a decimal user-input parameterThe decimal data

Page 116

Chapter 1010 - 18To configure an email user-input parameter1. Create a new parameter.• To create a global parameter, see Creating a global parameter,

Page 117

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 196. If you want the Security Enforcer to enforce a maximum l

Page 118 - To delete an allowed cookie

Chapter 1010 - 20Creating parameters without defined valuesThe Allow Empty Value setting specifies whether the system expects the parameter to have a

Page 119 - Configuring mandatory headers

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 21Allowing multiple occurrences of a parameter in a requestBy

Page 120 - Configuring allowed methods

Chapter 1010 - 22Making a flow parameter mandatoryThe Is Mandatory Parameter setting specifies whether a parameter must be present in a flow.NoteYou c

Page 121

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 23Configuring XML parametersXML parameters contain XML data i

Page 122

Chapter 1010 - 24Working with dynamic parameters and extractionsWhen you configure a dynamic parameter, you also configure the extraction properties f

Page 123

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 25To configure a dynamic content value parameter1. Create a n

Page 124

Introducing the Application Security ManagerConfiguration Guide for BIG-IP® Application Security Manager™1 - 3components. For detailed information on

Page 125

Chapter 1010 - 26Understanding the extracted items configurationWhen you create an extraction for a dynamic parameter, one aspect of the extraction is

Page 126

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 27Viewing the list of extractionsYou can review all of the pa

Page 127

Chapter 1010 - 283. In the Dynamic Parameter Properties area, for the Extract Parameter from URL setting, select the protocol to use and type the URL

Page 128 - Configuring CSRF protection

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 29Working with the parameter character setsEach security poli

Page 129

Chapter 1010 - 30Viewing and modifying the default parameter name character setThe parameter name character set controls the default characters and me

Page 130

Working with ParametersConfiguration Guide for BIG-IP® Application Security Manager™10 - 31Configuring sensitive parametersThe Application Security Ma

Page 131

Chapter 1010 - 32Configuring navigation parametersIf you want the security policy to differentiate between pages in the web application that are gener

Page 132

11Working with Attack Signatures• Overview of attack signatures• Types of attacks that attack signatures detect• Managing the attack signatures pool•

Page 134 - Recognizing DoS attacks

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 1Overview of attack signaturesAttack signatures are ru

Page 135

Chapter 11 - 4Finding help and technical support resourcesYou can find additional technical documentation and product information using the following

Page 136

Chapter 1111 - 2Overview of attack signature setsAn attack signature set is a group of individual attack signatures. Rather than applying individual a

Page 137

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 3Types of attacks that attack signatures detectTable 1

Page 138

Chapter 1111 - 4HTTP request smuggling attack HTTP request smuggling sends a specially formatted HTTP request that might be parsed differently by the

Page 139

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 5Session hijacking Web servers often send session toke

Page 140

Chapter 1111 - 6Managing the attack signatures poolThe attack signatures pool contains all of the attack signatures that are part of the configuration

Page 141

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 7To view the attack signatures pool with a built-in fi

Page 142

Chapter 1111 - 8Viewing attack signature detailsWhen you click the name of each attack signature, the system displays the properties listed in Table 1

Page 143

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 9To view attack signature details1. In the navigation

Page 144

Chapter 1111 - 10Updating the system-supplied attack signaturesYou can update the system-supplied attack signatures on a regular basis to ensure that

Page 145 - ◆ Grace interval

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 11Configuring automatic updates for system-supplied at

Page 146

2Performing Essential Configuration Tasks•Overview of the essential configuration tasks• Defining a local traffic pool• Defining an application securi

Page 147

Chapter 1111 - 125. Click the Save Settings to save your changes.6. Click the Update Signatures button to start the update process.Viewing information

Page 148

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 13Working with attack signature setsRather than assign

Page 149 - Maintaining a security policy

Chapter 1111 - 14Creating an attack signature setYou can create signature sets in two ways: by using a filter or by manually selecting the signatures

Page 150

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 15Manual signature sets are composed of attack signatu

Page 151 - To copy a security policy

Chapter 1111 - 16Editing used-defined attack signature setsYou can edit user-defined attack signature sets to add or remove signatures, or change the

Page 152 - To import a security policy

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 17Assigning attack signature sets to a security policy

Page 153 - Merging two security policies

Chapter 1111 - 18Viewing all attack signatures for a security policyWhen you assign an attack signature set to a security policy, the system builds a

Page 154

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 19To view all attack signatures for a security policy1

Page 155 - To restore a security policy

Chapter 1111 - 20Modifying the blocking policy for an attack signature setThe blocking policy defines how the Security Enforcer processes requests tha

Page 156

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 21Understanding attack signature stagingWhen you first

Page 158

Chapter 1111 - 22To view signatures in staging that generate learning suggestions1. In the navigation pane, expand Application Security and click Manu

Page 159

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 23Figure 11.3 Attack signatures in stagingEnabling or

Page 160 - Chapter 8

Chapter 1111 - 24To disable or enable an attack signature in staging1. In the navigation pane, expand Application Security and click Manual Policy Bui

Page 161

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 25Managing user-defined attack signaturesUser-defined

Page 162

Chapter 1111 - 26Creating a user-defined attack signatureYou can create a user-defined attack signature rule using the syntax that is explained in App

Page 163 - Overview of wildcard entities

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 27Modifying a user-defined attack signatureYou may nee

Page 164 - Understanding tightening

Chapter 1111 - 28Importing user-defined attack signaturesIf you have a large number of user-defined attack signatures that you want to add to the conf

Page 165 - Understanding staging

Working with Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™11 - 293. In the Choose File box, type the path to the XML

Page 167 - Creating wildcard file types

12Protecting XML Applications• Getting started with XML security• Configuring security for SOAP web services• Implementing web services security• Conf

Page 168 - Modifying wildcard file types

Performing Essential Configuration TasksConfiguration Guide for BIG-IP® Application Security Manager™2 - 1Overview of the essential configuration task

Page 170 - Sorting wildcard file types

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 1Getting started with XML securityBecause XML is used as

Page 171 - Configuring wildcard URLs

Chapter 1212 - 2How you proceed with configuring XML security depends on the type of application you want to protect:• For SOAP web services: refer to

Page 172

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 3Configuring security for SOAP web servicesTo configure s

Page 173 - To delete a wildcard URL

Chapter 1212 - 45. For the Configuration Files setting, if your web service uses a WSDL or XML schema file, perform steps a and b. Otherwise, skip to

Page 174 - Sorting wildcard URLs

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 511. To mask sensitive XML data, click Sensitive Data Con

Page 175 - Creating wildcard parameters

Chapter 1212 - 6Uploading certificatesTo use web services security for encryption, decryption, and digital signature signing and verification, you mus

Page 176

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 7Enabling encryption, decryption, signing, and verificati

Page 177 - Deleting wildcard parameters

Chapter 1212 - 8To configure web services security credentialsOn the XML Profile Properties screen, in the Credentials area of the Web Services Securi

Page 178 - Ordering wildcard parameters

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 93. Check the Enforce And Verify Defined Elements box to

Page 179

Chapter 22 - 2environment, refer to the BIG-IP® Application Security ManagerTM: Getting Started Guide, which is available in the Ask F5SM Knowledge Ba

Page 180

Chapter 1212 - 10• none: Insert, into the existing or created security header, the cryptography (for example, the algorithm, cipher, and keys) that de

Page 181 - ◆ Orange

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 113. Check Enforce Timestamp In Request to check that the

Page 182

Chapter 1212 - 12You have finished configuring web services security on the security policy using the default defense configuration settings. If you w

Page 183

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 13Table 12.2 shows examples of XPath queries.Managing SOA

Page 184

Chapter 1212 - 145. Below the Defense Configuration area, click the Update button.The screen refreshes, and displays the XML Profiles screen.6. To put

Page 185 - Understanding parameters

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 155. If you selected a referenced file type, in the Impor

Page 186 - To create a global parameter

Chapter 1212 - 16Fine-tuning XML defense configurationThe defense configuration provides formatting and attack pattern checks for the XML data. The de

Page 187

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 177. Adjust the defense configuration settings as require

Page 188 - To delete a global parameter

Chapter 1212 - 18Allow Processing InstructionsSpecifies, when enabled, that the system allows processing instructions in the XML request. If you uploa

Page 189 - Working with URL parameters

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 19Masking sensitive XML dataYou can mask sensitive XML da

Page 190 - /url_name.ext

Performing Essential Configuration TasksConfiguration Guide for BIG-IP® Application Security Manager™2 - 3Defining an application security classThe se

Page 191 - To delete a parameter

Chapter 1212 - 20Associating an XML profile with a URLYou can associate XML profiles with explicit URLs and wildcard URLs. The parameter or URL that t

Page 192 - Working with flow parameters

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 216. For the Check XML Content-Type Headers setting, spec

Page 193

Chapter 1212 - 22Associating an XML profile with a parameterYou can associate an XML profile with a parameter whose value is XML-encoded. When the sys

Page 194

Protecting XML ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™12 - 23Modifying XML security profilesWeb applications change

Page 195

Chapter 1212 - 24Deleting an XML profileIf you no longer need a specific XML profile, you can remove it entirely from the configuration. F5 Networks r

Page 196 - ◆ User-input value

13Refining the Security Policy Using Learning• Overview of the learning process• Working with learning suggestions• Accepting or clearing learning sug

Page 198

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 1Overview of the learning processYou can

Page 199

Chapter 1313 - 2Working with learning suggestionsThe Learning Manager generates learning suggestions when the Learn flag is enabled for the violations

Page 200

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 3NoteThe Traffic Learning screen displays

Page 201

Chapter 22 - 4Defining a local traffic virtual serverThe next essential configuration task is to define a virtual server on the local area network. Th

Page 202

Chapter 1313 - 4To view all of the requests that triggered a specific learning suggestion1. In the navigation pane, expand Application Security and cl

Page 203

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 5To view a request that triggered a learn

Page 204

Chapter 1313 - 6Figure 13.2 Example of the View Full Request Information screenViewing all requests for a specific web applicationIf you want to revi

Page 205

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 75. Click the Go button.The screen refres

Page 206

Chapter 1313 - 83. Click a violation hyperlink.The learning suggestions properties screen opens. Note that the screens vary depending on the violation

Page 207 - To create an XML parameter

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 9Working with entities in staging or with

Page 208

Chapter 1313 - 10Figure 13.4 File type learning suggestionsWhen you look at the learning suggestions, you can clear them or go back to the staging-ti

Page 209

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 11If the Policy Builder is active, and th

Page 210

Chapter 1313 - 12Reviewing staging and tightening statusIf a file type, URL, parameter, or cookie is in staging or has tightening enabled, the system

Page 211

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 13Adding new entities to the security pol

Page 212

Performing Essential Configuration TasksConfiguration Guide for BIG-IP® Application Security Manager™2 - 5Running the Deployment wizardAfter you have

Page 213

Chapter 1313 - 14To enforce all file types, URLs, parameters, and cookies that are ready to be enforced1. In the navigation pane, expand Application S

Page 214

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 15Processing learning suggestions that re

Page 215

Chapter 1313 - 16• Web scraping detected• Web Services Security failure• XML data does not comply with format settings• XML data does not comply with

Page 216

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 17To disable a violation1. In the navigat

Page 217

Chapter 1313 - 18Viewing ignored entitiesWhen you reject a learning suggestion for a URL, a file type, or a flow, the Application Security Manager add

Page 218

Refining the Security Policy Using LearningConfiguration Guide for BIG-IP® Application Security Manager™13 - 19Adding and deleting ignored IP addresse

Page 220

14Configuring General System Options• Overview of general system options•Configuring interface and system preferences•Configuring external anti-virus

Page 222 - Chapter 11

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 1Overview of general system optionsThe Application

Page 223

Configuration Guide for BIG-IP®Application Security Manager™iProduct VersionThis manual applies to product version 10.2 of the BIG-IP®Application Secu

Page 224

Chapter 22 - 6Maintaining and monitoring the security policyThe Application Security Manager provides many reporting and monitoring tools, so that you

Page 225

Chapter 1414 - 2Configuring interface and system preferencesYou can change the default user interface and system preferences for the Application Secur

Page 226

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 3Configuring external anti-virus protectionYou can

Page 227

Chapter 1414 - 4b) For the Virus Detected violation (near the bottom of the screen), enable either or both of the Alarm and Block check boxes. For det

Page 228 - Ensuring network access

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 56. If you selected Web Application Security Edito

Page 229

Chapter 1414 - 63. For the Configuration setting, select Advanced.4. In the Configuration area, for the Profile Name setting, type a unique name for t

Page 230

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 78. For the Server IP setting, type the IP address

Page 231

Chapter 1414 - 8Configuring a logging profile for a reporting serverIf your network uses a third party reporting server (for example, Splunk), you can

Page 232

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 913. In the Storage Filter area, make any changes

Page 233

Chapter 1414 - 1010. To ensure that the system logs requests for the web application, even when the logging utility is competing for system resources,

Page 234

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 116. For the Protocols setting, select whether log

Page 235

3Working with Application Security Classes• What is an application security class?• Understanding the traffic classifiers• Configuring actions for the

Page 236

Chapter 1414 - 12Viewing the application security logsLocally stored system logs for the Application Security Manager are accessible from the Configur

Page 237

Configuring General System OptionsConfiguration Guide for BIG-IP® Application Security Manager™14 - 13Validating regular expressionsThe RegExp Validat

Page 238

Chapter 1414 - 14Configuring an SMTP mail serverIf you want the system to send email to users, such as when configuring the system to send reports usi

Page 239

15Displaying Reports• Overview of the reporting tools• Displaying an application security overview• Reviewing details about requests•Viewing charts• S

Page 241

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 1Overview of the reporting toolsYou can use several reporting tool

Page 242 - To enforce all signatures

Chapter 1515 - 2Displaying an application security overviewYou can display an overview where you can quickly see what is happening on the Application

Page 243

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 3 Figure 15.1 Application Security overview statistics

Page 244

Chapter 1515 - 4Reviewing details about requestsFor each web application, the Application Security Manager logs requests according to the logging prof

Page 245

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 5When viewing details about an illegal request, if you decide that

Page 247

Chapter 1515 - 6Figure 15.3 Request detailsFigure 15.4 Details about Illegal header length violation

Page 248

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 7Exporting requestsYou can export selected requests in PDF or bina

Page 249

Chapter 1515 - 8Viewing chartsYou can display numerous graphical charts that illustrate the distribution of security alerts. You can filter the data b

Page 250

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 9You can use a filter to view the security incidents which are of

Page 251

Chapter 1515 - 10Interpreting graphical chartsYou can monitor graphical charts to determine how well your security policies are protecting your web ap

Page 252

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 11Scheduling and sending graphical charts using emailYou can confi

Page 253

Chapter 1515 - 125. In the Send To (E-Mails) box, type each email address where you want the system to send a copy of the chart, then click Add.6. Fro

Page 254

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 13Viewing Brute Force Attack reportsThe Brute Force Attack report

Page 255

Chapter 1515 - 14To release IP addresses blocked by the IP Enforcer1. In the navigation pane, expand Application Security, point to Reporting, Anomaly

Page 256 - To upload certificates

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 15Viewing PCI Compliance reportsThe PCI Compliance report displays

Page 257

Working with Application Security ClassesConfiguration Guide for BIG-IP® Application Security Manager™3 - 1What is an application security class?An ap

Page 258

Chapter 1515 - 16To view a PCI Compliance report1. In the navigation pane, expand Application Security and click Reporting.The Requests screen opens.2

Page 259

Displaying ReportsConfiguration Guide for BIG-IP® Application Security Manager™15 - 17Filtering reportsYou can use a filter to view the information of

Page 260

Chapter 1515 - 18Monitoring CPU usageYou can examine the amount of CPU resources that the Application Security Manager is using, and also check overal

Page 261

ASecurity Policy Violations• Introducing security policy violations• Viewing descriptions of violations•RFC violations• Access violations• Length viol

Page 263 - Managing SOAP methods

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 1Introducing security policy violationsSecurity policy viol

Page 264

Appendix AA - 2Figure A.1 Violations on Blocking Policy screenFigure A.2 Example violation descriptionMany violations are associated with an attack

Page 265

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 3RFC violationsThe Application Security ManagerTM reports R

Page 266

Appendix AA - 4Bad unescapeThe system detects illegal HEX encoding and reports unescaping errors (such as %RR).Detection evasionHTTP protocol complian

Page 267

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 5Access violationsAccess violations occur when an HTTP requ

Page 268 - Chapter 12

Chapter 33 - 2Creating a basic application security classA basic application security class simply routes all HTTP traffic through the Application Sec

Page 269 - Masking sensitive XML data

Appendix AA - 6Length violationsLength violations occur when an HTTP request contains an entity that exceeds the length setting that is defined in the

Page 270

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 7Illegal request length The incoming request length exceeds

Page 271

Appendix AA - 8Input violationsInput violations occur when an HTTP request includes a parameter or header that contains data or information that does

Page 272

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 9Illegal parameter data type The incoming request contains

Page 273 - To edit an XML profile

Appendix AA - 10NoteThe Application Security Manager does not distinguish between dynamic parameters that are defined incorrectly, and dynamic paramet

Page 274 - To delete an XML profile

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 11Cookie violationsCookie violations occur when the cookie

Page 275

Appendix AA - 12Negative security violationsNegative security violations occur when an incoming request contains a string pattern that matches an atta

Page 276

Security Policy ViolationsConfiguration Guide for BIG-IP® Application Security Manager™A - 13Determining the type of attack detected by an attack sign

Page 277

Appendix AA - 14

Page 278

BWorking with the Application-Ready Security Policies• Understanding application-ready security policies• Using the Rapid Deployment security policy•

Page 279 - To view learning suggestions

Working with Application Security ClassesConfiguration Guide for BIG-IP® Application Security Manager™3 - 3Understanding the traffic classifiersYou ca

Page 281

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 1Understanding application-ready

Page 282

Appendix BB - 2Using the Rapid Deployment security policyThe Rapid Deployment security policy is configured with a general set of security checks to m

Page 283

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 3Using the ActiveSync security po

Page 284 - To clear learning suggestions

Appendix BB - 4Using the OWA Exchange 2003 security policyThe OWA Exchange 2003 application-ready security policies protect servers running Microsoft®

Page 285

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 5Using the OWA Exchange 2007 secu

Page 286

Appendix BB - 6Using the SharePoint 2003 security policyThe SharePoint 2003 application-ready security policies protect servers running Microsoft® Sha

Page 287

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 7Using the SharePoint 2007 securi

Page 288

Appendix BB - 8Using the Lotus Domino 6.5 security policyThe Lotus Domino 6.5 application-ready security policies protect servers running Lotus® Domin

Page 289

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 9Using the Oracle Applications 10

Page 290

Chapter 33 - 4To configure an application security class using the Hosts traffic classifier1. In the navigation pane, expand Application Security and

Page 291

Appendix BB - 10Using the Oracle Applications 11i security policyThe Oracle Applications 11i application-ready security policies protect servers runni

Page 292 - Disabling violations

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 11Using the PeopleSoft Portal 9 s

Page 293 - To clear a violation

Appendix BB - 12Using the SAP NetWeaver security policyThe SAP NetWeaver application-ready security policies protect servers running the SAP NetWeaver

Page 294 - Viewing ignored entities

Working with the Application-Ready Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™B - 13Using the WhiteHat Sentinel Bas

Page 295

Appendix BB - 14Managing large file uploads when using the application-ready security policiesThe web applications for which you can use one of the ap

Page 296 - Chapter 13

CSyntax for Creating User-Defined Attack Signatures• Writing rules for user-defined attack signatures• Overview of rule option scopes• Syntax for atta

Page 298

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 1Writing rules for user-defined att

Page 299

Appendix CC - 2Using the pcre rule optionThe pcre rule option performs a regular expression match on different parts of the input, and is based on the

Page 300

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 3Overview of rule option scopes Sco

Page 301

Working with Application Security ClassesConfiguration Guide for BIG-IP® Application Security Manager™3 - 5Classifying traffic using URI pathsYou can

Page 302

Appendix CC - 4A note about normalization For the URI and parameter scopes, the system always applies a normalization process before applying the rule

Page 303

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 5Syntax for attack signature rulesT

Page 304

Appendix CC - 6Using the headercontent rule option The headercontent rule option matches when the specified string is found anywhere in the HTTP reque

Page 305

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 7at http://pcre.org. For details on

Page 306

Appendix CC - 8Using the reference rule optionUse the reference rule option in a rule to provide an external reference or link to information regardin

Page 307

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 9Using the offset modifierUse the o

Page 308

Appendix CC - 10For example, the content rule in Figure C.9 matches these requests: 12345678901234567890GET /67ABC ...GET /6ABC ...but not these reque

Page 309

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 11specified keyword, while the offs

Page 310

Appendix CC - 12but not these requests: xxxxxxxx12345678901234567890GET /ABC12345678XYZ ...GET /ABC123456789XYZ ...TipThe line of numbers above the re

Page 311

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 13SQL-Injection, and Command Execut

Page 312 - To configure SMTP

Chapter 33 - 6Classifying traffic using headersYou can use the Headers traffic classifier to specify one or more headers whose associated requests you

Page 313

Appendix CC - 14Note that for the pcre rule option, you use the \x escape sequence, and not the pipe symbols, to escape characters. See the PCRE docum

Page 314

Syntax for Creating User-Defined Attack SignaturesConfiguration Guide for BIG-IP® Application Security Manager™C - 15Rule combination exampleIt is imp

Page 315

Appendix CC - 16

Page 316

DInternal Parameters for Advanced Configuration• Overview of internal parameters• Viewing internal parameters• Restoring the default settings for inte

Page 318

Internal Parameters for Advanced ConfigurationConfiguration Guide for BIG-IP® Application Security Manager™D - 1Overview of internal parametersSeveral

Page 319

Appendix DD - 2ecard_regexp_email ^\s*([\w.-]+)@([\w.-]+)\s*$ (regular expression)Specifies the regular expression that defines a valid pattern for pa

Page 320 - Figure 15.3 Request details

Internal Parameters for Advanced ConfigurationConfiguration Guide for BIG-IP® Application Security Manager™D - 3ProtocolIndication -1 Specifies how th

Page 321 - To export requests

Appendix DD - 4Viewing internal parametersYou can review the settings for the internal parameters on the Advanced Configuration screen.To view interna

Page 322 - Viewing charts

Internal Parameters for Advanced ConfigurationConfiguration Guide for BIG-IP® Application Security Manager™D - 5Restoring the default settings for int

Page 323 - To view graphical charts

Working with Application Security ClassesConfiguration Guide for BIG-IP® Application Security Manager™3 - 7Classifying traffic using cookiesYou can us

Page 325

EUpgrading HTTP Security Profiles to Security Policies• Overview of the Migration wizard• Performing the migration

Page 327

Upgrading HTTP Security Profiles to Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™E - 1Overview of the Migration wizar

Page 328

Appendix EE - 2Performing the migrationThe Migration wizard guides you through the steps necessary to convert HTTP security profiles in Protocol Secur

Page 329

FRunning Application Security Manager on the VIPRION Chassis• Overview of running Application Security Manager on the VIPRION chassis• Viewing VIPRION

Page 331 - Filtering reports

Running Application Security Manager on the VIPRION ChassisConfiguration Guide for BIG-IP® Application Security Manager™F - 1Overview of running Appli

Page 332 - Monitoring CPU usage

Appendix FF - 2Viewing cluster statisticsYou can view statistics for all active blades running on the VIPRION chassis.To view statistics for all blade

Page 333

Running Application Security Manager on the VIPRION ChassisConfiguration Guide for BIG-IP® Application Security Manager™F - 3To view cluster member sy

Page 334

iiCanadian Regulatory ComplianceThis Class A digital apparatus complies with Canadian ICES-003.Standards ComplianceThis product conforms to the IEC, E

Page 335

Chapter 33 - 8Configuring actions for the application security classThe actions of the application security class designate what the system does with

Page 336

Appendix FF - 4

Page 339 - Access violations

GlossaryConfiguration Guide for BIG-IP® Application Security Manager™Glossary - 1access violationAn access violation is a security policy violation th

Page 340 - Length violations

GlossaryGlossary - 2blocking modeA security policy is in blocking mode when the enforcement mode is blocking, and one or more Block flags are enabled.

Page 341

GlossaryConfiguration Guide for BIG-IP® Application Security Manager™Glossary - 3cookie violationA cookie violation is a security policy violation tha

Page 342 - Input violations

GlossaryGlossary - 4dynamic valueSee dynamic parameter. enforcement modeThe enforcement mode determines what actions the Security Enforcer takes when

Page 343

GlossaryConfiguration Guide for BIG-IP® Application Security Manager™Glossary - 5headersSee HTTP headers.heuristicsHeuristics are the data collected a

Page 344

GlossaryGlossary - 6learning suggestionWhen a request triggers a violation, and the Learn flag is enabled for that violation, the Learning Manager gen

Page 345 - Cookie violations

GlossaryConfiguration Guide for BIG-IP® Application Security Manager™Glossary - 7parameter and value pairA parameter and value pair represents some el

Page 346 - Negative security violations

Working with Application Security ClassesConfiguration Guide for BIG-IP® Application Security Manager™3 - 9Rewriting a URIYou can use the Rewrite URI

Page 347

GlossaryGlossary - 8response scrubbingThe process of removing sensitive user information-such as credit card numbers, or social security numbers (U.S.

Page 348

GlossaryConfiguration Guide for BIG-IP® Application Security Manager™Glossary - 9session IDA session ID is a string of data that identifies a user to

Page 349 - Security Policies

GlossaryGlossary - 10system-supplied attack signaturesSystem-supplied attack signatures are shipped as part of the Application Security Manager softwa

Page 350

GlossaryConfiguration Guide for BIG-IP® Application Security Manager™Glossary - 11URL parameterAn URL parameter is a parameter that is defined and val

Page 351

GlossaryGlossary - 12

Page 354

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 1AAbout tab 1-3abuse of functionality attack 11-3Accept as Legitimate (L

Page 355

IndexIndex - 2attack signature updatesand network access 11-10and update failures 11-10receiving email notification 11-12viewing update activity

Page 356

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 3buffer overflow attacksand length violations A-6description 11-3prevent

Page 357

Chapter 33 - 10

Page 358

IndexIndex - 4denial-of-service attacksdefined 7-2, 11-3mitigating 7-3recognizing 7-2deployment scenarios 2-5Deployment wizardabout 2-5and a

Page 359

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 5Failure to convert character violation A-8false positivesand accuracy 1

Page 360

IndexIndex - 6Illegal meta character in header violation A-8Illegal meta character in parameter value violation A-8Illegal meta character in param

Page 361

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 7Lotus Domino 6.5 security policy B-8MMain tab, about 1-3Malformed XML d

Page 362

IndexIndex - 8parametersallowing empty value 10-20allowing repeated occurrences of flow 10-9allowing repeated occurrences of global 10-3allowing

Page 363

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 9requestsclearing from the Requests List 15-7configuring default number di

Page 364

IndexIndex - 10restoring 8-7restoring archived version 8-8setting active 4-4, 6-1, 6-12updating 13-2using application-ready security policies

Page 365 - Signatures

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 11support ID numbersand blocking mode 6-3for security policy violations

Page 366

IndexIndex - 12user rolesabout 14-4user-defined attack signaturesabout 11-1and failed attack signature updates 11-10creating 11-26, C-1deletin

Page 367

IndexConfiguration Guide for BIG-IP® Application Security Manager™Index - 13and logging profiles 14-5and negative security violations A-12and sens

Page 368 - , on page C-9, for syntax

4Working with Web Applications• What is a web application?• Configuring the properties of a web application• Working with web application groups• Work

Page 369

IndexIndex - 14XML securityconfiguring for web services 12-3configuring for XML content 12-14encrypting SOAP messages 12-5overview 12-1verifyi

Page 371 - Using the content rule option

Working with Web ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™4 - 1What is a web application?In Application Security Manag

Page 372 - Using the pcre rule option

Chapter 44 - 2Figure 4.1 shows an example of a web application list.Figure 4.1 Sample list of web applicationsTo view the list of web applications1.

Page 373 - Summary of pcre modifiers

Working with Web ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™4 - 3Configuring the properties of a web applicationIn the A

Page 374 - Using the nocase modifier

Chapter 44 - 4Configuring the active security policyThe active security policy is the security policy that the Application Security Manager uses to va

Page 375 - Using the depth modifier

Working with Web ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™4 - 5If none of these profiles meets your needs, refer to Co

Page 376 - Using the distance modifier

Configuration Guide for BIG-IP® Application Security Manager™iiiThis product includes software developed by the OpenSSL Project for use in the OpenSSL

Page 377 - Using the within modifier

Chapter 44 - 6To set a web application back to a new state1. In the navigation pane, expand Application Security and click Web Applications.The Web Ap

Page 378 - Using the norm modifier

Working with Web ApplicationsConfiguration Guide for BIG-IP® Application Security Manager™4 - 7Creating a web application groupWhen you create a web a

Page 379 - Using character escaping

Chapter 44 - 8Working with a disabled web applicationThe Application Security Manager automatically disables web applications when you:• Disable the A

Page 380 - Combining rule options

5Building a Security Policy Automatically• Overview of automatic policy building• Configuring automatic policy building• Viewing the automatic policy

Page 382 - Appendix C

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 1Overview of automatic policy buildingApplica

Page 383 - Configuration

Chapter 55 - 2Configuring automatic policy buildingApplication Security Manager completely configures the automated policy building settings according

Page 384

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 34. For Policy Type, select the type of secur

Page 385

Chapter 55 - 4Configuring advanced automatic policy building settingsIf you want to review the configuration details of the Policy Builder, you can us

Page 386 - Appendix D

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 5To configure advanced policy building settin

Page 388 - Viewing internal parameters

Chapter 55 - 6Changing the policy typeThe policy type determines which security policy elements are included in the security policy. When you create a

Page 389

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 7To change the policy type1. In the navigatio

Page 390

Chapter 55 - 8URLs Configures the security policy to add allowed URLs, based on legitimate traffic.XURLs–Meta Characters Configures the security polic

Page 391

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 9Note that the list in Table 5.1 includes the

Page 392

Chapter 55 - 10Figure 5.3 Security policy elements (Fundamental policy type selected)You can change the selected policy elements, in which case, the

Page 393 - Important

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 11Modifying automatic policy building options

Page 394 - Performing the migration

Chapter 55 - 12Figure 5.4 Options area on the Automatic Policy Building screenTo modify automatic policy building options1. In the navigation pane, e

Page 395

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 134. In the Options area, for Parameter Level

Page 396

Chapter 55 - 14Tip: Normally, the Policy Builder learns only from legitimate traffic, so you should add response codes that are returned under normal

Page 397

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 15Modifying automatic policy building rulesDu

Page 399

Chapter 55 - 16Figure 5.5 shows the Rules area of the Automatic Policy Building Configuration screen.Figure 5.5 Rules area of the Automatic Policy Bu

Page 400 - Appendix F

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 17Advanced users can view and change the cond

Page 401 - Glossary

Chapter 55 - 187. For the Track Site Changes rule:a) The Enable Track Site Changes check box is selected by default. This box must remain checked if y

Page 402

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 19Modifying the list of trusted IP addressesY

Page 403 - Glossary - 1

Chapter 55 - 204. In the Trusted IP Addresses area, for IP Addresses, specify which IP addresses to consider safe: • To trust all IP addresses (for in

Page 404 - Glossary - 2

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 21Viewing the automatic policy building statu

Page 405 - Glossary - 3

Chapter 55 - 22• In the learning details for Attack Signatures, you can see the list of signatures that the system detected, and which may be false po

Page 406 - Glossary - 4

Building a Security Policy AutomaticallyConfiguration Guide for BIG-IP® Application Security Manager™5 - 23Stopping and starting automatic policy buil

Page 407 - Glossary - 5

Chapter 55 - 24Viewing automatic policy building logsThe Application Security Manager creates a log file, called the policy log, for every security po

Page 408 - Glossary - 6

6Manually Configuring Security Policies • Understanding security policies• Configuring security policy properties• Setting the active security policy

Page 411 - Glossary - 9

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 1Understanding security policiesThe core of the

Page 412 - Glossary - 10

Chapter 66 - 2Configuring the security policy name and descriptionEach security policy that you configure has a unique name, which you assign as part

Page 413 - Glossary - 11

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 3Configuring the enforcement modeSecurity polic

Page 414

Chapter 66 - 4To configure the enforcement mode1. In the navigation pane, expand Application Security and click Policy.The Policy Properties screen op

Page 415

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 5Configuring the staging-tightening periodFor e

Page 416

Chapter 66 - 6Enabling or disabling staging for attack signaturesFor each security policy, you can enable or disable staging for attack signatures on

Page 417

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 74. For the Maximum HTTP Header Length setting,

Page 418

Chapter 66 - 8Configuring the allowed response status codesBy default, the Application Security Manager accepts all response codes from 1xx to 3xx as

Page 419

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 9responses, based on the pattern that you confi

Page 420

Table of ContentsConfiguration Guide for BIG-IP® Application Security Manager™vii1Introducing the Application Security ManagerOverview of the BIG-IP A

Page 421

Chapter 66 - 10Activating iRule eventsAn iRule is a script that lets you customize how you manage traffic on the BIG-IP system. You can write iRulesTM

Page 422

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 11Configuring trusted XFF headersYou can config

Page 423

Chapter 66 - 12Setting the active security policy for a web applicationAt any given time, the Application Security Manager enforces only one security

Page 424

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 13Determining when to set the active security p

Page 425

Chapter 66 - 14Validating HTTP protocol complianceThe first security checks that Application Security Manager performs are those for RFC compliance wi

Page 426

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 15Configuring HTTP protocol compliance validati

Page 427

Chapter 66 - 16Adding file typesUsing the Allowed File Types screen, you can specify the file types that are allowed (or disallowed) in the web applic

Page 428

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 17Creating allowed file typesFor allowed file t

Page 429

Chapter 66 - 18To manually create an allowed file type1. In the navigation pane, expand Application Security and click File Types.The Allowed File Typ

Page 430

Manually Configuring Security PoliciesConfiguration Guide for BIG-IP® Application Security Manager™6 - 19Modifying file typesYou can modify any of the

Comments to this Manuals

No comments