Applies To:
Show Versions
BIG-IQ Security
- 4.5.0
About device discovery
About device discovery: BIG-IQ Network Security
The process of importing a firewall device's configuration or designating a firewall device for central management by BIG-IQ Network Security is called discovery.
After discovery, BIG-IQ Network Security provides a way to view device properties and to perform device-specific and firewall-specific actions through a centralized management platform.
The BIG-IQ Security Devices panel displays user-defined and system-defined groups and imported BIG-IP devices.
Before discovering devices and importing firewalls, you must install specific components required by the BIG-IQ system on each BIG-IP device you want to manage. Installing these components results in a framework that supports the required Java-based management services.
To view all devices under management, in BIG-IQ Network Security, navigate to the Devices panel.
To display only those items related to the specific device, hover over the device and when the gear icon appears, click it. Then, you can select Properties to display properties or Show Only Related Items to filter by device.
About device discovery: BIG-IQ Web Application Security
The process of designating a device for central management by BIG-IQ Web Application Security is called discovery. Once a BIG-IP device is discovered, all security policies and virtual servers on the device come under management by the BIG-IQ system.
For each discovered device, the system creates an extra virtual server to hold all policies not related to any virtual server in the discovered device.
After discovery, BIG-IQ Web Application Security enables a view of devices and properties, policies, and virtual servers associated with those devices, and a way to perform device-specific and policy-specific actions.
To view all devices under management, in BIG-IQ Web Application Security, navigate to the Devices panel.
About declaring management authority
The process of bringing a device under central management is known as declaring management authority (DMA). The firewall administrator initiates DMA through device discovery and import (or reimport).
The DMA process is modal. Once the process starts, you are blocked from performing any other tasks or interacting with BIG-IQ Security in any way until the process is complete or canceled. Before starting a discovery or reimport process, it is important to understand how you will resolve any conflicts that arise.
Discovering devices on BIG-IQ Network Security
You can perform device discovery to bring a BIG-IP device under central management. Once a device is under central management, the device's configuration is stored in the BIG-IQ Security database, which is the authoritative source for all configuration objects. After that occurs, do not manage the firewall device locally unless there is an exceptional need. Otherwise, changes made locally could be overwritten on the next deployment task.
During discovery, a Remove Device button appears after the task has identified the device and started importing the firewall configuration. If you click Remove Device at this point, the import is canceled and management authority over the device is rescinded. Subsequently, the device is removed.
Discovering devices on BIG-IQ Web Application Security
You perform device discovery to bring a BIG-IP device under central management. Once a device is under central management, information about the device and objects stored on the device are located in the BIG-IQ database, which is the authoritative source for all configuration objects.
About conflict resolution
A conflict is found when two objects of the same type have the same name but contain different data. Thus, an address list named list1 and a port list named list1 would not be in conflict.
Conflicts prevent processes from running to completion.
If conflicts are found, BIG-IQ Security displays the Resolve Conflicts dialog box, which lists all conflicts found, displays detailed differences for conflicting shared objects, and provides for conflict resolution. The Resolve Conflicts dialog box may be displayed two times: once for Network Security objects, and once for Shared Security objects.
Although conflict resolution often results in changes to either the BIG-IP configuration or the BIG-IQ configuration, no changes are applied until they are deployed. You can deploy changes when a deployment task displays a status of READY TO DEPLOY.
Resolving conflicts
About BIG-IQ Security configuration sets
BIG-IQ Security systems use the following terminology to refer to firewall configuration sets for a centrally-managed device:
- Current configuration set
- The configuration of the BIG-IP device as discovered by BIG-IQ Security. The current configuration is updated during a reimport/rediscovery and before calculating differences during the deployment process. After deployment (and after the resolution of any conflicting shared objects), BIG-IQ Security overwrites the BIG-IP current configuration (if the option Keep BIG-IQ Version is chosen).
- Working configuration set
- The configuration as maintained by the BIG-IQ Security system. Initially, the working configuration is created when the firewall manager elects to manage the device from BIG-IQ Security (DMA). It is the configuration that is edited on BIG-IQ Security and deployed back to BIG-IP devices.
Configuring devices to accept traffic
When using the BIG-IP device's self IP address during discovery, you must configure that device to accept traffic from a BIG-IQ Security system. Specifically, if the BIG-IP device has the Virtual Server & Self IP Contexts option set to Reject or Drop, the BIG-IP device will not accept traffic from the BIG-IQ system. Use the following procedure to set this option to Accept.
Alternately, you can add a rule to handle traffic between the self IP addresses of the BIG-IQ Security system and the self IP addresses of the specific BIG-IP device being discovered. In this scenario, you can leave the Virtual Server & Self IP Contexts option set to Reject or Drop.
In this case, ensure the following ports remain open:
- 22 (SSH, TCP protocol)
- 443 (HTTPS, TCP protocol)
- 4353 (iQuery, TCP protocol)
- On the BIG-IP device, on the Main tab, click .
- From the Virtual Server & Self IP Contexts list, select Accept.
- Click Update.
Displaying device properties
-
In the Devices panel, hover over the name of the device you want to examine
until the gear icon appears, then display the properties in one of these
ways:
- Select Show Properties from the sub-menu.
- Click the gear icon to expand the panel.
- Review the statistics in the properties screen for that device.
Device properties
Device properties are displayed for informational purposes mostly, and are read-only, except for the check boxes.
Device Property | Description |
---|---|
Device Address | IP address for the BIG-IP device entered at time of discovery and used for communication between the device and the BIG-IQ system. |
Host Name | Fully-qualified domain name (FQDN), identified at discovery time. |
Cluster Name | BIG-IP device cluster name, provided at discovery time. |
IP Address / Management Address | IP address for the communication route to the BIG-IQ system internal self IP address.Each managed device must be configured with a communication route from its internal self IP or management IP address to a BIG-IQ system internal self IP address on a configured BIG-IP VLAN. Otherwise, discovery fails. F5 recommends that you use a self IP address (on the BIG-IP device) to gain access to additional functionality that is not provided through the management port. |
Username | User's login name. For example: admin. |
Password | User's password. |
Product | Identifies the product. |
Version | Identifies the version and hotfix level of the device under management. |
Status | (BIG-IQ Web Application Security) Status of the device under management (Active or Standby). |
Snapshot | Check box used to invoke a snapshot prior to reimporting the BIG-IP device's working configuration. |
Update Framework | Check box used to update the REST framework on the BIG-IP device on discovery or on save. |
Check to overwrite the source of imported policies that already exist | Check box used to determine whether the discovery process overwrites the source of imported policies already on the BIG-IQ system. |
Signature file Version | Identifies the BIG-IP version that the Attack Signature Database is packaged with. |
Root Username | If the framework on the target BIG-IP device must be updated, you must specify the root user name as part of the discovery process. Enter the root user name which is root, by default. |
Root Password | If the framework on the target BIG-IP device must be updated, you must specify the root password as part of the discovery process. |
Displaying the device inventory
- Navigate to the Devices panel.
- Hover over the name of the device for which you want to view an inventory.
-
When the right-pointing arrow appears, click it to read inventory
details.
Option Description Name Fully-qualified domain name (FQDN) for the BIG-IP device. Marketing Name BIG-IP Virtual Edition. Product Product identity. For example, BIG-IP. Version Version and hotfix level of the device under management. Build Build level of the device under management. Mgmt IP Address Management IP address for the BIG-IP device, used to manage the device. License License end date and end time, registration key, and a list of active modules. Slots For each slot, a listing of volume label, product occupying the slot, version, build, cluster status (active, standby). Network Interfaces Configured network interfaces. Serial Number Serial number for the BIG-IP device. Mac Address Mac address for the BIG-IP device. CPU Info Manufacturer and technical details. For example, Intel(R) Xeon(R) CPU X5660 @ 2.80GHz. Memory (MB) Memory on the BIG-IP device. Platform Z100 HAL ID For example, 4208f88e-3f9e-0d7e-b75e-ca1dc2dd630c. UUID Universally unique identifier. For example, 6b8bf5ef-bcb0-4d1b-b61f-8c95f70475a8. - To exit from the inventory, click Close.
About device reimport/rediscovery
Once configurations are in sync between BIG-IP devices and the BIG-IQ Security system, there is seldom a need to reimport a BIG-IP device.
Some possible reasons to reimport include:
- Additions, deletions, or changes made to management IPs or virtual servers on the BIG-IP device.
- Changes to policies, firewall rules, shared objects, or signature files made locally on the BIG-IP device.
- Updates made to the BIG-IP device's software that need to be recognized by BIG-IQ Security.
If any of these reasons occur, you must reimport/rediscover to reconcile any changes with the configuration maintained on BIG-IQ Security. If you do not reconcile changes, a subsequent deployment process will overwrite any changes made locally.
The reimport/rediscovery process is modal. Once reimport starts, the process blocks you from performing any other tasks or interacting with BIG-IQ Security in any way until the process completes or is canceled.
During reimport/rediscovery, a Remove Device button appears in the dialog box after the task has identified the device and started the import process. If you click Remove Device, the reimport/rediscovery is canceled, management authority over the device is rescinded, and the device is removed.
Reimporting or rediscovering devices
You reimport/rediscover BIG-IP devices to reconcile any configuration changes with the configuration maintained on BIG-IQ Security. If you do not reconcile changes, a subsequent deployment process will overwrite any changes made locally.
- Navigate to the Devices panel.
-
Hover over the name of the device you want to import/reimport and when the gear
icon appears, click it to display the expanded screen. You can modify only a few
of the properties displayed.
Option Description Host Name Fully-qualified domain name (FQDN), identified at time of discovery. Cluster Name BIG-IP device cluster name, provided at time of discovery. IP Address / Management Address IP address for the communication route to the BIG-IQ system internal self IP address. Each managed device must be configured with a communication route from its self IP address or management IP address to a BIG-IQ system self IP addresses. Otherwise, discovery will fail. F5 recommends that you use a BIG-IP system self IP address for discovery.
Product Product identity. Version Version and hotfix level of the device under management. Status (BIG-IQ Web Application Security) Active. Snapshot Check box used to take a snapshot of the configuration on the BIG-IP device before importing (the default). Username Administrative login name. For example: admin. Password Administrative password for this user. Update Framework Check box used to update the REST framework installed on the BIG-IP device. Certain BIG-IQ system components must be installed and kept up-to-date on all BIG-IP devices brought under central management. These components provide a REST framework on the BIG-IP devices that support the required Java-based management services. To ensure the framework is up-to-date, select this Update On Save check box.
Root Username If the framework on the target BIG-IP device must be updated, you must specify the root user name as part of the reimport process. Type the root user name, which is root, by default. Root Password If the framework on the target BIG-IP device must be updated, you must specify the root password as part of the reimport process. Type the root password. - In the Device Properties screen, click Add/Reimport.
Monitoring device health and performance
- Navigate to the Devices panel.
- To display properties and health and performance statistics for an individual device, hover over the name for that device (in the Devices panel).
- When the gear icon appears, select Show Properties or click the gear to expand the panel.
- Scroll past the properties to examine the health and performance statistics for this device.