Anda di halaman 1dari 15

AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Print

Manual: BIG-IP Application Security Manager: Applies To:


Hide Versions
Implementations BIG-IP ASM
11.6.0

Original Publication Date: 12/10/2014

Preventing DoS Attacks on Applications


What is a DoS attack?
About recognizing DoS attacks

When to use different DoS protections

About configuring TPS-based DoS protection

About configuring latency-based DoS protection

About DoS prevention policy

About geolocation mitigation

About heavy URL protection

About proactive bot defense

About cross-domain requests

About site-wide DoS mitigation

About DoS protection and HTTP caching

Overview: Preventing DoS attacks on applications


Configuring DoS protection for applications

Configuring TPS-based DoS protection

Configuring latency-based DoS protection

Configuring heavy URL protection

Configuring CAPTCHA for DoS protection

Recording traffic during DoS attacks

Configuring proactive bot defense

Associating a DoS profile with a virtual server

Implementation Result

Viewing DoS reports, statistics, and logs


Overview: Viewing DoS reports, statistics, and logs
Investigating DoS attacks and mitigation

1 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Sample DoS Overview Summary

Viewing DoS application statistics


Traffic distribution in DoS application statistics

Sample DoS Statistics reports

Displaying DoS event logs


Sample DoS event logs

Viewing URL Latencies reports


Sample URL Latencies report

Creating customized DoS reports

Configuring DoS Policy Switching


About DoS protection and local traffic policies

Overview: Configuring DoS policy switching


Creating a DoS profile for Layer 7 traffic

Modifying the default DoS profile

Creating a local traffic policy for DoS policy switching

Creating policy rules for DoS policy switching

Associating a DoS profile with a virtual server

Associating a local traffic policy with a virtual server

Implementation results

Mitigating Brute Force Attacks


About mitigation of brute force attacks

Overview: Mitigating brute force attacks


Creating login pages

Configuring brute force protection

Viewing brute force attack reports

Displaying brute force event logs

Detecting and Preventing Web Scraping


Overview: Detecting and preventing web scraping
Prerequisites for configuring web scraping

Adding allowed search engines


Allowed search engines

Detecting web scraping based on bot detection

Detecting web scraping based on session opening

2 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Detecting web scraping based on session transactions

Using fingerprinting to detect web scraping

Displaying web scraping event logs


Web scraping attack examples

Web scraping attack types

Viewing web scraping statistics


Web scraping statistics chart

Implementation Result

Setting Up IP Address Intelligence Blocking


Overview: Setting up IP address intelligence blocking
Enabling IP address intelligence

Setting up IP address intelligence blocking

Reviewing IP address intelligence statistics

Creating an iRule to log IP address intelligence information

Creating an iRule to reject requests with questionable IP addresses

IP address intelligence categories

Managing IP Address Exceptions


Overview: Managing IP address exceptions
Creating IP address exceptions

Deleting IP address exceptions

Updating IP address exceptions

Enforcing Application Use at Specific Geolocations


Overview: Enforcing application use in certain geolocations

Enforcing application use in certain geolocations

Setting up geolocation enforcement from a request

Creating Login Pages for Secure Application Access


About creating login pages
Creating login pages

Login page access validation criteria

Enforcing login pages

Protecting Sensitive Data with Data Guard


About protecting sensitive data with Data Guard

Response headers that Data Guard inspects

3 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Protecting sensitive data

Masking Credit Card Numbers in Logs


Overview: Masking credit card numbers in logs
Masking credit card numbers in request logs

Displaying Reports and Monitoring ASM


ASM Reporting Tools

Displaying an application security overview report

Analyzing requests with violations


Ways to analyze a request

Creating a report containing selected requests

Generating PCI Compliance reports


Sample PCI Compliance report

Configuring Application Security Event Logging


About logging profiles

Creating a logging profile

Setting up remote logging

Associating a logging profile with a security policy

About logging responses

About ArcSight log message format

Filtering logging information

Viewing application security logs

Configuring Application Security Session Tracking


Overview: Tracking application security sessions using login pages
Creating login pages

Enforcing login pages

Setting up session tracking

Monitoring user and session information

Tracking specific user and session information

Tracking Application Security Sessions with APM


Overview: Tracking application security sessions using APM

Prerequisites for setting up session tracking with APM


Creating a VLAN

Creating a self IP address for a VLAN

Creating a local traffic pool for application security

4 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Creating a virtual server to manage HTTPS traffic

Creating a security policy automatically

Creating an access profile

Configuring an access policy

Adding the access profile to the virtual server

Setting up ASM session tracking with APM

Monitoring user and session information

Mitigating Open Redirects


Overview: Mitigating open redirects
Mitigating open redirects

Configuring how open redirects are learned

Enforcing redirection domains

Implementation results

Setting Up Cross-Domain Request Enforcement


About cross-domain request enforcement
Setting up cross-domain request enforcement

How cross-domain request enforcement works

Implementing Web Services Security


Overview: Implementing web services security
About client and server certificates

Adding client and server certificates

Enabling encryption, decryption, signing, and verification of SOAP messages

Writing XPath queries


Syntax for XPath expressions

XPath query examples

Configuring blocking actions for web services security

Fine-tuning Advanced XML Security Policy Settings


Fine-tuning XML defense configuration

Advanced XML defense configuration settings

Masking sensitive XML data

Overriding meta characters based on content

Managing SOAP methods

Adding JSON Support to an Existing Security Policy

5 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Overview: Adding JSON support to existing security policies


Creating a JSON profile

Associating a JSON profile with a URL

Associating a JSON profile with a parameter

Implementation result

Automatically Creating Security Policies for AJAX Applications


Application security for applications that use AJAX

Overview: Creating a security policy for applications that use AJAX


Creating a security policy automatically

Reviewing security policy status

Implementation result

Adding AJAX Blocking Response Behavior to a Security Policy


Overview: Adding AJAX blocking and login response behavior

Configuring the blocking response for AJAX applications

Securing Web Applications Created with Google Web Toolkit


Overview: Securing Java web applications created with Google Web Toolkit elements
Creating a Google Web Toolkit profile

Associating a Google Web Toolkit profile with a URL

Implementation result

Refining Security Policies with Learning


About learning

Learning resources

About learning suggestions

What requests are unlearnable?

Fine-tuning a security policy

Configuring explicit entities learning

Viewing requests that caused learning suggestions

Accepting learning suggestions

Clearing learning suggestions

Viewing ignored entities

About enforcement readiness

Enforcing entities

Disabling learning on violations

6 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Configuring Security Policy Blocking


About security policy blocking
Changing security policy enforcement

Configuring blocking actions for violations

About blocking actions

Configuring HTTP protocol compliance validation

Configuring blocking actions for web services security

Configuring What Happens if a Response is Blocked


Overview: Configuring what happens if a response is blocked
Configuring responses to blocked requests

Configuring responses to blocked logins

Customizing responses to blocked XML requests

Configuring General Security Policy Building Settings


About general security policy building settings

Changing the policy type


Security policy elements included in each policy type

Configuring explicit entities learning

Adjusting the parameter level

Configuring Manual Security Policy Settings


Editing an existing security policy

Changing security policy enforcement

Adjusting the enforcement readiness period

Viewing whether a security policy is case-sensitive

Differentiating between HTTP and HTTPS URLs

Specifying the response codes that are allowed

Activating iRule events


Application security iRule events

Configuring trusted XFF headers

Adding host names


About adding multiple host names

Protecting against CSRF

Adding File Types to a Security Policy


About adding file types

Adding allowed file types

7 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Wildcard syntax

Adding disallowed file types

Adding Parameters to a Security Policy


About adding parameters to a security policy
Creating global parameters

Creating URL parameters

Creating flow parameters

Creating sensitive parameters

Creating navigation parameters

Creating parameters with dynamic content

Creating parameters with dynamic names

Changing character sets for parameter values

Changing character sets for parameter names

Adjusting the parameter level

Parameter Value Types

How the system processes parameters

About path parameters

Enforcing path parameter security

Securing Base64-Encoded Parameters


Overview: Securing Base64-Encoded Parameters

Adding base64 decoding to a new user-input parameter

Adding base64 decoding to an existing user-input parameter

Adding URLs to a Security Policy


About adding URLs

About referrer URLs

Adding allowed URLs


Wildcard syntax

Allowed URL properties

Adding disallowed URLs

Enforcing requests for URLs based on header content

Specifying characters legal in URLs

Configuring flows to URLs

Creating flow parameters

8 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Configuring dynamic flows to URLs

Configuring dynamic session IDs in URLs

Adding Cookies
About cookies
About pure wildcard cookies

Wildcard syntax

About cookies and learning

About adding cookies


Adding allowed cookies

Adding enforced cookies

Changing the order in which wildcard cookies are enforced

Editing cookies

Deleting cookies

Specifying when to add explicit cookies

Configuring the maximum cookie header length

Configuring Advanced Cookie Protection


Overview: Configuring advanced cookie protection
Reconfiguring cookie protection

Importing cookie protection configuration

Exporting cookie protection configuration

Adding Allowed Methods to a Security Policy


Adding allowed methods

Configuring HTTP Headers


About mandatory headers

About header normalization

About default HTTP headers

Overview: Configuring HTTP headers


Configuring HTTP headers

Configuring the maximum HTTP header length

Implementation Result

Configuring How a Security Policy is Automatically Built


Overview: Configuring automatic policy build settings
Configuring automatic policy building settings

About security policy elements

9 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Modifying security policy elements

About automatic policy building rules

About automatic policy building stages

Modifying security policy rules

Adding trusted IP addresses to a security policy

Learning from responses

Specifying when to add dynamic parameters

Collapsing entities in a security policy

Learning based on response codes

Limiting the maximum number of policy elements

Specifying the file types for wildcard URLs

Restoring default values for automatic policy building

Stopping and starting automatic policy building

Configuring General ASM System Options


Adjusting system preferences

Incorporating external antivirus protection

Creating user accounts for application security

Validating regular expressions

Working with Violations


About violations
Viewing descriptions of violations

Changing severity levels of violations

Types of violations

About violation rating

Investigating potential attacks

Overview: Creating user-defined violations


Creating user-defined violations

Enabling user-defined violations

Sample iRules for user-defined violations

Deleting user-defined violations

Exporting and importing user-defined violations

Working with Attack Signatures


About attack signatures

10 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

About attack signature staging

Types of attacks that attack signatures detect

Attack signature properties

Overview: Creating and assigning attack signature sets


About attack signature sets

List of attack signature sets

Creating a set of attack signatures

Assigning signature sets to a security policy

Viewing the signature sets in a security policy

Viewing the attack signatures in a security policy

Enabling or disabling a specific attack signature

Enabling or disabling staging for attack signatures

Overriding attack signatures based on content

Overview: Managing the attack signature pool


Updating the attack signature pool

Getting email about signature updates

Viewing the attack signature pool and signature details

Overview: Creating user-defined attack signatures


Creating a user-defined attack signature

Importing user-defined attack signatures

Exporting user-defined attack signatures

About attack signatures in XML format

Maintaining Security Policies


Overview: Activating and deactivating security policies
Deactivating security policies

Activating security policies

Deleting security policies

Overview: Importing and exporting security policies


About security policy export formats

Exporting security policies

Importing security policies

Overview: Comparing security policies


Comparing security policies

11 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Overview: Merging security policies


Merging security policies

Configuring ASM with Local Traffic Policies


About application security and local traffic policies

About application security and manually adding local traffic policies

Overview: Configuring ASM with local traffic policies


Creating a security policy automatically

Creating local traffic policy rules for ASM

Implementation results

Automatically Synchronizing Application Security Configurations


Overview: Automatically synchronizing ASM systems
About device management and synchronizing application security configurations

Considerations for application security synchronization

Performing basic network configuration for synchronization

Specifying an IP address for config sync

Establishing device trust

Creating a Sync-Failover device group

Syncing the BIG-IP configuration to the device group

Specifying IP addresses for failover communication

Creating a Sync-Only device group

Enabling ASM synchronization on a device group

Synchronizing an ASM-enabled device group

Implementation result

Manually Synchronizing Application Security Configurations


Overview: Manually synchronizing ASM systems
About device management and synchronizing application security configurations

Considerations for application security synchronization

Performing basic network configuration for synchronization

Specifying an IP address for config sync

Establishing device trust

Creating a Sync-Failover device group

Syncing the BIG-IP configuration to the device group

Specifying IP addresses for failover communication

Enabling ASM synchronization on a device group

12 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Synchronizing an ASM-enabled device group

Implementation result

Synchronizing Application Security Configurations Across LANs


Overview: Synchronizing ASM systems across LANs
About device management and synchronizing application security configurations

Considerations for application security synchronization

Performing basic network configuration for synchronization

Specifying an IP address for config sync

Establishing device trust

Creating a Sync-Failover device group

Syncing the BIG-IP configuration to the device group

Specifying IP addresses for failover communication

Creating a Sync-Only device group

Enabling ASM synchronization on a Sync-Only device group

Synchronizing an ASM-enabled device group

Implementation result

Integrating ASM with Database Security Products


Overview: Integrating ASM with database security products
Creating a security policy automatically

Creating login pages

Enforcing login pages

Configuring a database security server

Enabling database security integration in a security policy

Implementation result

Integrating ASM and APM with Database Security Products


Overview: Integrating ASM and APM with database security products

Prerequisites for integrating ASM and APM with database security


Creating a VLAN

Creating a self IP address for a VLAN

Creating a local traffic pool for application security

Creating a virtual server to manage HTTPS traffic

Creating a security policy automatically

Creating an access profile

13 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Configuring an access policy

Adding the access profile to the virtual server

Configuring a database security server

Enabling database security integration with ASM and APM

Implementation result

Securing FTP Traffic Using the Default Configuration


Overview: Securing FTP traffic using default values
Creating an FTP service profile with security enabled

Enabling protocol security for an FTP virtual server

Reviewing violation statistics for security profiles

Securing FTP Traffic Using a Custom Configuration


Overview: Securing FTP traffic using a custom configuration
Creating a custom FTP profile for protocol security

Creating a security profile for FTP traffic

Modifying associations between service profiles and security profiles

Configuring an FTP virtual server with a server pool

Reviewing violation statistics for security profiles

Securing SMTP Traffic Using the Default Configuration


Overview: Securing SMTP traffic using system defaults
Creating an SMTP service profile with security enabled

Creating an SMTP virtual server with protocol security

Reviewing violation statistics for security profiles

Securing SMTP Traffic Using a Custom Configuration


Overview: Creating a custom SMTP security profile
Creating a custom SMTP service profile

Creating a security profile for SMTP traffic

Enabling anti-virus protection for email

Modifying associations between service profiles and security profiles

Creating and securing an SMTP virtual server and pool

Reviewing violation statistics for security profiles

Configuring Remote High-Speed Logging of Protocol Security Events


Overview: Configuring Remote Protocol Security Event Logging
Creating a pool of remote logging servers

14 de 15 29/10/15 10:40
AskF5 | Manual: BIG-IP Application Security Ma... https://support.f5.com/kb/en-us/products/big-ip_a...

Creating a remote high-speed log destination

Creating a formatted remote high-speed log destination

Creating a publisher

Creating a custom Protocol Security Logging profile

Configuring a virtual server for Protocol Security event logging

Disabling logging

Implementation result

15 de 15 29/10/15 10:40

Anda mungkin juga menyukai