Applies To:
Show Versions
BIG-IQ Security
- 4.3.0
Overview: BIG-IQ device management
The process of designating a device for central management by BIG-IQ Web Application Security is known as discovery.
Once a BIG-IP device is discovered, all security policies and virtual servers on the device come under management by the BIG-IQ system.
For each device discovered, the system creates an extra virtual server to hold all policies not related to any virtual server in the discovered device.
After discovery, BIG-IQ Web Application Security enables a view of devices and properties, policies, and virtual servers associated with those devices and a way to perform device-specific and policy-specific actions.
To view all devices managed by BIG-IQ Web Application Security, navigate to the Devices panel.
Discovering devices
Monitoring device health and performance
- Navigate to the Devices panel.
- Hover over the banner of the device you want to monitor and when the gear icon appears, click it to expand the panel.
- In the expanded panel, view health data under device properties.
Displaying policy properties
- To display properties for an individual device, hover over the header for that device (in the Devices panel).
- Click the gear icon to display and expand the panel containing device properties.
Device properties
Device properties are displayed for informational purposes and are read-only, except the check box options.
Device properties | Description |
---|---|
Host Name | Fully-qualified domain name (FQDN), identified at discovery time. |
Management Address | Management address of the BIG-IP device, used for communication between it and the BIG-IQ system. |
Product | Product identification. |
Version | Version and hotfix level of the device under management. |
Status | Active/Inactive. |
Check box | Used during discovery or rediscovery processes to allow (or prevent) the overwriting of imported policies that already exist on BIG-IQ Web Application Security. |
Signature file properties | Description |
---|---|
Version | Device current signature file version. |
Auto update enabled | Check box used to enable automatic Update & push for signature files. |
About rediscovering devices
Once configurations are in sync between BIG-IP devices and the BIG-IQ Web Application Security system, there is seldom a need to rediscover a BIG-IP device.
However, some scenarios that might require rediscovery include:
- Additions, deletions, or changes made to self IPs or virtual servers on the BIG-IP device.
- Changes to security policies made locally on the BIG-IP device.
- Updates made to the BIG-IP device's software that need to be recognized by BIG-IQ Web Application Security.
If any of these scenarios occur, you must rediscover to reconcile any changes with the configuration maintained on BIG-IQ Web Application Security. If you do not reconcile changes, a subsequent deployment process will overwrite any changes made locally.
The rediscovery process is modal. This means that once rediscovery starts, the process blocks you from performing any other tasks or interacting with BIG-IQ Web Application Security in any way until the process completes or is canceled.
Rediscovering devices
If a policy has identified the device being rediscovered as its source, the policy source type is changed to FILE, which means that the device retains the policy's source file and it can be deployed to other devices.
Removing devices
- To begin the removal process, navigate to the Devices panel.
- Hover in the Devices header and click the gear icon to display the expanded Properties panel.
- In the expanded Properties panel, click Remove.