Manual Chapter : CE file - BIG-IQ Top-Level Navigation and Common Buttons

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 7.0.0
Manual Chapter

CE file - BIG-IQ Top-Level Navigation and Common Buttons

  1. Log in to F5 BIG-IQ Centralized Management with your user name and password.
  2. At the top left of the screen, select
    Change Management
    from the BIG-IQ menu.
  3. At the top of the screen, click
    Devices
    .
  4. At the top of the screen, click
    Deployment
    .
  5. At the top of the screen, click
    Configuration
    .
  6. At the top of the screen, click
    Applications
    .
  7. At the top of the screen, click
    Traffic & Network
  8. In the
    Name
    and
    Description
    fields, type a name and an optional description to identify this task.
  9. At the top of the screen, click
    System Management
    .
  10. At the top of the screen, click
    Inventory
    .
  11. At the top of the screen, click
    System
    .
  12. At the top of the screen, click
    Monitoring
    .
  13. Near the top of the screen, click the
    Create
    button.
  14. Near the top of the screen, click the
    Add
    button.
  15. Near the top of the screen, click the
    Remove
    button.
  16. Near the top of the screen, click the
    Import
    button.
  17. Near the top of the screen, click the
    Export
    button.
  18. Near the top of the screen, click the
    Delete
    button.
  19. Near the top of the screen, click the
    Clone
    button.
  20. Near the top of the screen, click the
    Deploy
    button.
  21. Near the top of the screen, click the
    Cancel
    button.
  22. Near the top of the screen, click the
    Compare
    button.
  23. Near the top of the screen, click the
    Restore
    button.
  24. Near the top of the screen, click the
    Edit
    button.
  25. Click the
    Add
    button at the bottom of the screen.
  26. Click the
    Save & Close
    button.
  27. Click the
    Create
    button at the bottom of the screen.
  28. In the
    Name
    field, type a name to help you label this task.
  29. In the
    Description
    field, type an optional description to further identify this task.
  30. Click
    Configuration
    SECURITY
    Threat Intelligence
    Web Application Security
    .
    The SIGNATURE FILES, SERVER TECHNOLOGIES FILES, and BROWSER CHALLENGES FILES menus appear.
  31. In the relevant menu, click the Files List.