Manual Chapter : Configuring Virtual Servers for Portal Access

Applies To:

Show Versions Show Versions

BIG-IP APM

  • 15.0.1, 15.0.0, 14.1.2, 14.1.0, 14.0.1, 14.0.0
Manual Chapter

Configuring Virtual Servers for Portal Access

Defining a virtual server for portal access

You associate an access policy and a rewrite profile with the virtual server, to allow portal access in an access policy.
For portal access, a virtual server for an access policy, specify an IP address for a single host as the destination address.
  1. On the Main tab, click
    Local Traffic
    Virtual Servers
    .
    The Virtual Server List screen opens.
  2. Click the name of the virtual server you want to modify.
  3. In the
    Destination Address/Mask
    field, type the IP address for a host virtual server.
    This field accepts an address in CIDR format (IP address/prefix). However, when you type the complete IP address for a host, you do not need to type a prefix after the address.
  4. From the
    HTTP Profile
    list, select
    http
    .
  5. In the Access Policy area, from the
    Access Profile
    list, select the access profile that you configured earlier.
  6. To use GZIP compression with a portal access resource, from the
    HTTP Compression Profile
    list, select
    httpcompression
    .
  7. If you are using a connectivity profile, from the
    Connectivity Profile
    list, select the connectivity profile.
  8. If you are creating a virtual server to use with portal access resources in addition to remote desktops, from the
    Rewrite Profile
    list, select the default
    rewrite
    profile, or another rewrite profile you created.
  9. If you use client SSL for this profile, from the
    SSL Profile (Client)
    list, select a client SSL profile.
  10. If you are using HTTPS with any portal access pages, from the
    SSL Profile (Server)
    list, select
    serverssl-apm
    .
  11. If you want to provide connections to Java RDP clients for application access, allow Java rewriting for portal access, or support a per-app VPN connection that is configured on a mobile device, select the
    Application Tunnels (Java & Per-App VPN)
    check box.
    You must enable this setting to make socket connections from a patched Java applet. If your applet does not require socket connections, or only uses HTTP to request resources, this setting is not required.
  12. If you want to provide native integration with an OAM server for authentication and authorization, select the
    OAM Support
    check box.
    You must have an OAM server configured in order to enable OAM support.
  13. Click
    Update
    .
Your access policy is now associated with the virtual server.