Manual Chapter :
Applying AFM Network Firewall Policies
Applies To:
Show VersionsBIG-IP AFM
- 14.1.2, 14.1.0
Applying AFM Network Firewall Policies
Applying a policy globally
You can apply an AFM Network Firewall policy to the global context, enforcing the policy on all traffic processed by the AFM system.
The policy rules you selected are enforced at the global level. If you chose to stage policy rules, the results of those
rules are logged, but not enforced.
Applying a policy to a virtual server
You must have created at least one virtual server.
You can apply an AFM Network Firewall policy to a specific virtual server, also known as a protected object, enforcing the policy only on traffic processed by that protected object.
- On the Main tab, click
- Click the name of the virtual server to assign the firewall policy.
- On the menu bar at the top of the page, click
- To enforce rules from a firewall policy on the virtual server, in the Network Firewall area, from the Enforcement list, select Enabled, then select the firewall policy to enforce from the Policy list.
- To stage rules from a firewall policy on the virtual server, in the Network Firewall area, from the Staging list, select Enabled, then select the firewall policy to stage from the Policy list.
- Click Update to save the changes.
The policy you selected is enforced on the virtual server. If you chose to stage the policy, the results of a policy match is logged, but not enforced.
Applying a policy to a Self IP
You must have created at least one self IP address.
You can apply an AFM Network Firewall policy to the self IP context, enforcing the policy on all traffic passing through that self IP.
- On the Main tab, click .
- Click on the self IP address to which you want to add a network firewall policy.
- Click the Security tab.
- To enforce rules from a firewall policy on the self IP: In the Network Firewall area, from the Enforcement list, select Enabled, and then from the Policy list, select the firewall policy to enforce.
- To stage rules from a firewall policy on the self IP: In the Network Firewall area, from the Staging list, select Enabled, and then from the Policy list, select the firewall policy to stage.
- Click Update to save the changes to the self IP.
The policy you selected is enforced at the self IP level. If you chose to stage the policy, the results of a policy match is logged, but not enforced.
Applying a policy to a route domain
You must have created at least one route domain.
You can apply an AFM Network Firewall policy to a route domain, enforcing the policy only on all traffic in that route domain.
The policy you selected is enforced at the route domain level. If you chose to stage the policy, the results of a policy match is logged, but not enforced.
Applying a rule to the management port
You cannot apply an AFM Network Firewall policy to the management port context. Instead, you must create and apply one or more AFM Network Firewall rules directly to the management port context.
Important: You can only add management port
rules as inline rules. For all other contexts, you should add rule lists to policies.
The new firewall policy is being enforced on the BIG-IP AFM system management port.