Article - K38201755 - BIG-IP AFM Operations Guide - Chapter 1 - Guide Introduction and Contents
Article - K38201755 - BIG-IP AFM Operations Guide - Chapter 1 - Guide Introduction and Contents
Operations Guide
Contents
Chapter 2: Packet Flow
Unlike a firewall, the BIG-IP AFM system processes traffic through any non-management interface using the
same ingress to egress packet flow method.
The BIG-IP AFM Network Firewall uses rules to specify traffic handling actions.
Network Firewall
IP Intelligence
Protocol security
Routing options
BIG-IP AFM rules
BIG-IP AFM policies
BIG-IP AFM iRules
Rules and policies troubleshooting
A Network Address Translation (NAT) is a mapping of one IP address to another, which can be a translation of
source, destination, or both.
SNAT
NAT iRules
The BIG-IP AFM system provides mitigation techniques against DoS/DDoS attacks.
BIG-IP AFM DoS mitigations
Packet processing (SYN cookie protection)
Device DoS
BIG-IP AFM DoS vectors
DoS policy development
Dynamic Signatures
DoS reporting and visibility
Signaling and intelligence
Several external tools can be used to assist with management of one or multiple BIG-IP AFM systems,
logging, and transfer of information.
Because BIG-IP AFM is a critical component of a security infrastructure, F5 recommends periodic review of
BIG-IP AFM deployment logs to actively monitor the device and baseline performance.
Chapter 8: Troubleshooting
An introduction to the packet flow process and the tools needed for troubleshooting.
The BIG-IP AFM system delivers the most effective network-level security for enterprises and service
providers. Whether on-premises or in a software-defined data center, the BIG-IP AFM system tracks the state
of network sessions, maintains application awareness, and mitigates threats based on more attack details than
traditional network firewalls. The BIG-IP AFM system also protects your organization from aggressive
distributed denial-of-service (DDoS) attacks before they can reach your data center.
Notes:
App-centric policy enforcement unifies the application configuration with security parameters for
tighter policy enforcement.
Intelligent control automatically guards against known bad actors at the earliest traffic flow point. In
BIG-IP AFM 12.1.x and later, bad actor treatment is expanded to cover most DoS vectors to help select
and disable individual sources of malicious traffic. Each bad actor is handed off to IP intelligence and
dropped for a configurable period of time
Layer-3 and layer-4 attack protection terminates all connections and runs checks to identify and
mitigate network-level threats before they reach the data center.
Centralized management enables efficient deployment and management for a consistent and effective
security posture across an expanding set of firewall devices.
High-volume logging controls log DDoS events, provide controls that prevent log servers from
becoming overwhelmed, and support SNMP, SIP, DNS, and IPFIX collectors.
ScaleN Virtual Clustered Multiprocessing (vCMP) consolidates multiple firewalls onto a single device
for more flexible and isolated allocation of resources.
Supplemental Information
About operations guides
Optimizing the support experience
Applies to: