Manual Chapter : Modify Web Application Security Policy

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 7.1.0
Manual Chapter

Modify Web Application Security Policy

Modifying a Web Application Security policy to improve application protection

Web Application Security imports BIG-IP Application Security Manager (ASM) application security policies from discovered BIG-IP devices, and lists them with the attached protected object (application or virtual server). The Web Application Security policy helps you to define both bad traffic and how this traffic is handled so that it doesn't affect the performance of your application's web server. Changes in traffic or an application's protection needs might reduce the effectiveness of your policy. You can change the policy's configuration to ensure that your protected objects can withstand a Layer 7 attack.

Edit web application security policies

You modify application security policies to customize how they protect your applications and virtual servers. Application security policies can be created in Web Application Security. But more often, they are created on BIG-IP devices and come into the Web Application Security configuration when you discover the devices.
To view a list of all your Web Application Security policies, go to
Configuration
SECURITY
Web Application Security
Policies
.
  1. Go to
    Monitoring
    DASHBOARDS
    L7 Dashboard
    The screen displays your protected objects, and provides summary data, based on the selected time settings. To change the scope of the time settings, use the control to the top left of the screen.
  2. Click the Web Application Security Policy column header to sort objects by policy.
  3. Click the name of a policy you want to edit.
  4. Edit the properties of the policy as needed.
    Consult the documentation for each policy object to edit it individually. For more information on the policy editing process, refer to the
    Edit application security policies
    topic
    in F5 BIG-IQ Centralized Management: Security
    in
    support.f5.com
    .
  5. Click
    Save
    to save the modifications to each object and unlock the policy.
The system saves changes to the policy object in the working configuration of BIG-IQ Centralized Management. If the policy is assigned to a virtual server, the next deployment sends the new configuration to one or more BIG-IP devices.