Applies To:
Show Versions
BIG-IQ Security
- 4.5.0
About logging profiles
The Logging Profiles panel in Shared Security lists logging profiles, scaled so that a subset of profiles is visible in the panel at any given time.
A logging profile records requests to the virtual server. A logging profile determines where events are logged, and which items (such as which parts of requests, or which type of errors) are logged. Events can be logged either locally by the system and viewed in the Event Logs screens, or remotely by the client’s server. The system forwards the log messages to the client’s server using the Syslog service.
The logging profile can be associated with multiple virtual servers from multiple devices. Multiple logging profiles can be associated with a virtual server, but the multiple logging profiles cannot have an overlap subset configured. For example, two logging profiles with application security configured and enabled cannot be associated with the same virtual server.The application security and protocol security cannot be configured on the same logging profile or associated with the same virtual server. BIG-IQ Security supports importing logging profiles with spaces in the name. An imported logging profile with spaces in the name can be modified on the BIG-IQ Security system and deployed back to a BIG-IP device. However, the BIG-IQ system does not support creating logging profiles with spaces in the name.
The logging publisher cannot be created or modified by the BIG-IQ Security system. The logging publisher specified by the BIG-IQ logging profile should be the same as that configured on the BIG-IP device.
To close the New Logging Profile properties panel without saving, click Cancel.
To get help on any panel, click the (?) icon in the upper right corner.
Adding logging profiles
Hover over the Logging Profiles header, click the + icon when it appears, and click New Logging Profile. The panel expands to display the New Logging Profile properties.
Editing logging profiles
Hover over the header of the logging profile you want to edit and when the gear icon appears, click it and select Properties to expand the panel.
Adding logging profiles
Use the New Logging Profile screen to configure a new logging profile.
Adding logging profiles
- Hover over the Logging Profiles header, click the + icon when it appears, and click New Logging Profile. The panel expands to display the New Logging Profile properties.
- In the New Logging Profiles screen, review and add or modify the properties as appropriate.
Property Description Name Specify a unique user-provided name for the logging profile. Required. Description Specify the optional description for the logging profile. Partition Specify the partition to which the logging profile belongs. Only users with access to a partition can view the objects (such as the logging profile) that it contains. If the logging profile resides in the Common partition, all users can access it. Although this field is pre-populated with Common (default), you can set the partition when creating logging profiles by typing a unique name for the partition. Note: The partition with that name must already exist on the BIG-IP device. No whitespace is allowed in the partition name. - Select Enabled to the right of one or more logging types to enable
those types. A configuration tab is added dynamically when a logging type is selected. Click
the tab to configure the logging type.
- Configure the logging types by clicking the matching logging type tab and supplying any
necessary property values. (Properties are grouped by logging type and screen area in the
following tables.)
In the Application Security Configuration section, you configure settings determining where to log traffic and which traffic to log.
In the Application Security Storage Filter section, you configure settings for the type of requests the system, or server logs.
In the Protocol Security HTTP, FTP, and SMTP Security area, you configure where the system logs requests using the HTTP, FTP, and SMTP protocols.
Protocol Security - HTTP, FTP, and SMTP Security Description Publisher Specifies where the system sends log messages. Select a publisher from the list, or accept the default of None. In the Protocol Security DNS Security area, you configure where the system logs any dropped, malformed, rejected, and malicious DNS requests.
In the Protocol Security SIP Security section, you configure where the system logs any dropped and malformed malicious SIP requests, global and request failures, redirected responses, and server errors.
In the Network Firewall section, you configure which network firewall events the system logs, and where they are logged.
In the Network Firewall Security IP Intelligence section, you configure where IP intelligence events are logged. If the IP intelligence feature is enabled and licensed, you can configure the system to log source IP addresses that match an IP intelligence blacklist or whitelist category, as determined by the database of preconfigured categories, or as determined from an IP intelligence feed list.
Network Firewall Security - IP Intelligence Description Publisher Specifies the name of the log publisher used for logging IP address intelligence events. Select a log publisher configured in your system. Aggregate Rate Limit Defines a rate limit for all combined IP intelligence log messages per second. Beyond this rate limit, log messages are not logged until the threshold drops below the specified rate. You can select a Rate Limit value of Indefinite which means the rate limit is set to the maximum of 4294967295, or you can select Specify and specify an integer between 0 and 4294967295 that represents the number of messages per second. Log Translation Fields Specifies, when enabled, that translation values are logged if and when a network firewall event is logged. In the Network Firewall Security Traffic Statistics section, you configure logging of traffic statistics.
In the DoS Protection sections, you configure where DoS events are logged.
DoS Protection - DoS Application Protection Description Local Publisher Specifies, when enabled, that the system logs DoS events to the local database. Remote Publisher Specifies the name of the log publisher used for logging DoS events. Select a log publisher configured in your system. DoS Protection - DNS DoS Protection Description Publisher Specifies the name of the log publisher used for logging DNS DoS events. Select a log publisher configured in your system. - When finished, click Add.
Editing logging profiles
Use the expanded Logging Profile panel to edit logging profiles.
Editing logging profile properties
Click Properties to edit the logging profile description and change which security levels are enabled.
- Click Properties to ensure that it is selected.
- Click Edit to establish the lock and make it possible to edit the properties.
- In the Logging Profiles screen, review and add or modify the properties as appropriate.
Property Description Name Specify a unique user-provided name for the logging profile. Required. Description Specify the optional description for the logging profile. Partition Specify the partition to which the logging profile belongs. Only users with access to a partition can view the objects (such as the logging profile) that it contains. If the logging profile resides in the Common partition, all users can access it. Although this field is pre-populated with Common (default), you can set the partition when creating logging profiles by typing a unique name for the partition. Note: The partition with that name must already exist on the BIG-IP device. No whitespace is allowed in the partition name. - Select Enabled to the right of one or more logging types to enable
those types. A configuration tab is added dynamically when a logging type is selected. Click
the tab to configure the logging type.
- Configure the logging types by clicking the matching logging type tab and supplying any
necessary property values. (Properties are grouped by logging type and screen area in the
following tables.)
In the Application Security Configuration section, you configure settings determining where to log traffic and which traffic to log.
In the Application Security Storage Filter section, you configure settings for the type of requests the system, or server logs.
In the Protocol Security HTTP, FTP, and SMTP Security area, you configure where the system logs requests using the HTTP, FTP, and SMTP protocols.
Protocol Security - HTTP, FTP, and SMTP Security Description Publisher Specifies where the system sends log messages. Select a publisher from the list, or accept the default of None. In the Protocol Security DNS Security area, you configure where the system logs any dropped, malformed, rejected, and malicious DNS requests.
In the Protocol Security SIP Security section, you configure where the system logs any dropped and malformed malicious SIP requests, global and request failures, redirected responses, and server errors.
In the Network Firewall section, you configure which network firewall events the system logs, and where they are logged.
In the Network Firewall Security IP Intelligence section, you configure where IP intelligence events are logged. If the IP intelligence feature is enabled and licensed, you can configure the system to log source IP addresses that match an IP intelligence blacklist or whitelist category, as determined by the database of preconfigured categories, or as determined from an IP intelligence feed list.
Network Firewall Security - IP Intelligence Description Publisher Specifies the name of the log publisher used for logging IP address intelligence events. Select a log publisher configured in your system. Aggregate Rate Limit Defines a rate limit for all combined IP intelligence log messages per second. Beyond this rate limit, log messages are not logged until the threshold drops below the specified rate. You can select a Rate Limit value of Indefinite which means the rate limit is set to the maximum of 4294967295, or you can select Specify and specify an integer between 0 and 4294967295 that represents the number of messages per second. Log Translation Fields Specifies, when enabled, that translation values are logged if and when a network firewall event is logged. In the Network Firewall Security Traffic Statistics section, you configure logging of traffic statistics.
In the DoS Protection sections, you configure where DoS events are logged.
DoS Protection - DoS Application Protection Description Local Publisher Specifies, when enabled, that the system logs DoS events to the local database. Remote Publisher Specifies the name of the log publisher used for logging DoS events. Select a log publisher configured in your system. DoS Protection - DNS DoS Protection Description Publisher Specifies the name of the log publisher used for logging DNS DoS events. Select a log publisher configured in your system. - Click Save to save your changes.
- When you are finished, click Save and Close to save your changes, clear the lock, and exit the panel.