Manual :
BIG-IP Policy Enforcement Manager: Implementations
Applies To:
Show VersionsBIG-IP PEM
- 14.0.1, 14.0.0, 13.1.5, 13.1.4, 13.1.3, 13.1.1, 13.1.0
Original Publication Date: 03/05/2019
- Overview
- Setting Up Application Visibility
-
Configuring Intelligent Traffic Steering
-
Overview: Configuring intelligent traffic steering
- What is traffic steering?
- Creating a pool
- Creating forwarding endpoints
- Creating an enforcement policy
- Creating custom action policies
- Adding rules to an enforcement policy
- Creating a rule using classification criteria
- Creating a rule using URL categorization
- Modifying iRule event for URL categories
- Creating a rule using flow conditions
- Creating a rule for forwarding traffic
- Creating a rule for QoS
- Creating a data plane virtual group
- Configuring TCP optimization as a PEM policy action
- Enabling TCP Analytics
-
Overview: Configuring intelligent traffic steering
- Inserting Content in to HTML Pages
- Configuring Quota Management using Rating Groups
- About Logging Policy Enforcement Events to IPFIX Collectors
-
Reporting Usage Data to an External Analytics Server
-
Overview: Reporting usage data to an external analytics server
- Creating a publisher
- Creating a rule for high-speed logging for session reporting
- Creating a rule for high-speed logging for flow reporting
- Creating a high-speed logging rule for transactional reporting
- Creating a high-speed logging rule for device detection and tethering
- Session-based reporting format
- Flow-based reporting format
- Transaction-based reporting format
- Device Type and OS-based reporting format
- Tethering-based reporting format
-
Overview: Reporting usage data to an external analytics server
- Using Fast L4 for Performance Optimization
- Reporting Quality of Experience and Video Usage
- Performing Radius Authentication and Accounting
- Configuring Subscriber Discovery based on DHCP
- Configuring DHCP Lease Query in Subscriber Management
- Usage Monitoring Over a Gx Interface
- Configuring Global Application Policies with Bandwidth Control
- Managaing Traffic with Bandwidth Controllers
- Enforcing Bandwidth Control Provisioned by PCRF
- Configuring Tiered Services with Bandwidth Control
-
Configuring Service Chains
-
Overview: Configuring service chains
- About services profiles
- About service chain processing
- Creating a ICAP profile for policy enforcement
- Creating a Request Adapt profile
- Creating a Response Adapt profile
- Creating an internal virtual server for ICAP server
- Creating a pool
- Creating endpoints for service chains
- Creating dynamic service chains
- Creating an enforcement policy
- Configuring steering action policy
- Adding rules to an enforcement policy
- Creating a rule for forwarding traffic
- Creating a data plane virtual group
-
Overview: Configuring service chains
- Provisioning Dynamic Subscribers
- Provisioning Static Subscribers
- Configuring PEM Sessions
- About Subscriber and Policy Provisioning
- Updating Signatures for Application Recognition
- Creating Custom Classifications
-
Configuring PEM with Local Traffic Policies
-
Overview: Creating local traffic policy rules for PEM
- About strategies for local traffic policy matching
- About creating custom local traffic policy rules for CE profile
- Creating custom local traffic policy for PEM
- Creating custom local traffic policy rules for PEM
- Creating a virtual server for SSL traffic policy enforcement
- Associating a published local traffic policy with a virtual server
- Creating custom local traffic policy for PEM
-
Overview: Creating local traffic policy rules for PEM
- Configuring Policy and RADIUS Updates
- Creating Custom TAC DB
- Enforcing Policy and Classification on IP Protocols
- Detecting Tethering, Device Operation System and Type
- Troubleshooting
- IPFIX Templates for PEM Events
- Legal Notices