Manual Chapter : CE for FPS

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 7.1.0
Manual Chapter

CE for FPS

  1. On the left, click
    EVENTS
    Fraud Protection Service
    Configuration
    .
  2. On the left, click
    EVENTS
    Fraud Protection Service
    , and then click
    Alerts
    .
  3. On the left, click
    EVENTS
    Fraud Protection Service
    Configuration
    , and then click
    WebService Configuration
    .
  4. On the left, click
    EVENTS
    Fraud Protection Service
    Configuration
    , and then click
    Transform Rule Import Schedule
    .
  5. On the left, click
    EVENTS
    Fraud Protection Service
    Configuration
    , and then click
    Alert Transform Rules
    .
  6. On the left, click
    EVENTS
    Fraud Protection Service
    Configuration
    , and then click
    Alert Forwarding Rules
    .
  7. On the left, click
    BIG-IQ Devices
    .
  8. On the left, click
    BIG-IQ HA
    .
  9. Click the name of the web service you want to configure.
  10. At the bottom of the screen, click the
    Save & Close
    button.
  11. To remove a filter, click the
    X
    icon next to the filtered object in a panel or click
    Clear All
    to clear all of the filters.
  12. To search for a specific object, in the
    Filter
    field at the top right of the screen, type all or part of an object's name and click the filter icon.
  13. To modify the filter to include or exclude certain objects, click the gear icon next to the
    Filter
    field and deselect or select objects.
  14. To remove the filter object, click
    Clear
    next to the
    Filter
    field.
  15. On the left, click
    SECURITY
    Threat Intelligence
    Fraud Protection Service
    .
    The SIGNATURE FILES and ENGINE FILES menus appear.
  16. In the SIGNATURE FILES menu, click
    Signature File List
    .
  17. In the ENGINE FILES menu, click
    Engine File List
    .
  18. On the left, click
    SECURITY
    Fraud Protection Services
    DataSafe Profiles
    .
    The DataSafe Profiles list screen opens.
  19. Click
    Download
    .
    The Choose download and install option screen opens.
  20. Choose one of the following download options:
    • Download latest files
      : Choose this option to download the most up-to-date file but not install it at this time.
    • Download latest files and install on All devices:
      Choose this option to download the most up-to-date file and install it immediately after download on all BIG-IP devices in the cluster.
    • Download latest files and install on Active devices:
      Choose this option to download the most up-to-date file and install it immediately after download on the primary BIG-IP devices in the cluster.
  21. Click
    OK
    .
  22. For the
    Install to Devices
    setting, select the BIG-IP device(s) where you want to install the file.
  23. Click
    Install
    .
    The BIG-IQ system pushes the file to the BIG-IP devices that you selected and the file is installed on those devices.
  24. Click
    Settings
    .
    The Settings screen opens.
  25. For
    Remote Updates
    , select the
    Enabled
    check box.
  26. For
    Interval
    , select a time interval for the automatic update.
    1. If you choose
      Custom
      , select a time interval from the Custom list.
  27. For
    Starting At
    , choose a date and time for when the automatic update should start.
  28. If you are using a proxy, select it from the
    Proxy
    list.
  29. From the
    Install To
    list, choose whether to install the file on all BIG-IP devices in the cluster or on just the active (primary) devices in the cluster.
    Once a file is deployed to an active clustered BIG-IP device, a synchronization task will run on the BIG-IP device cluster.
  30. In the list of profiles, click the relevant profile.
    The DataSafe Profile Properties screen opens.
  31. Click the
    Add
    button.
    The Add Parameter popup screen opens.
  32. In the
    Type
    field, choose one of the following parameter types:
    • Explicit
      : Choose this if you want to assign a specific parameter name.
    • Wildcard
      : Choose this if you want to assign a wildcard expression for the parameter name. Any parameter name that matches the wildcard expression is considered legal and receives protection. For example, typing the wildcard expression
      *
      specifies that any parameter name is allowed.
    Wildcard parameters are supported in BIG-IP versions 14.0 and later. If you are using a BIG-IP version 13.x or earlier, use only explicit parameters.
  33. In the
    Name
    field, type a name for the parameter as follows:
    1. For an
      Explicit
      parameter type, type the exact name.
    2. For a
      Wildcard
      parameter type, type the wildcard expression.
      The syntax for wildcard entities is based on shell-style wildcard characters. This table lists the wildcard characters that you can use so that the entity name matches multiple objects.
      Wildcard character
      Matches
      *
      All characters
      ?
      Any single character
      [abcde]
      Exactly one of the characters listed
      [!abcde]
      Any character not listed
      [a-e]
      Exactly one character in the range
      [!a-e]
      Any character not in the range
      If a wildcard character is actually used a part of a real parameter name and you don't want it to be treated a wildcard character, use
      \
      and then the character to indicate that it should not be used as a wildcard character.
      Regular expressions should not be used as wildcards.
  34. Click the
    Clone
    button in the Clone URL popup screen.
    • The new URL inherits the configuration settings of the source URL
    • Once the new URL is created, there is no further dependency on the source URL and any future changes made to the source URL are not inherited by the new URL.
  35. On the left, click
    URLS
    .
    The URLs list screen opens.
  36. Click
    Actions
    Clone
    .
    The Clone URL screen opens.
  37. On the left, click
    APPLICATION LAYER ENCRYPTION
    .
    The Application Layer Encryption settings are displayed.
  38. On the left, click
    PARAMETERS
    .
  39. In the
    Name
    field, type a name for the parameter as follows:
    • Explicit
      : Assign a specific parameter name.
    • Wildcard
      : Assign a wildcard expression for the parameter name. Any parameter name that matches the wildcard expression is considered legal and receives protection. For example, typing the wildcard expression
      *
      specifies that any parameter name is allowed.
  40. In the
    Name
    field, type a name for the parameter.
  41. Click the
    Import
    button.
    A popup screen opens.