f5 Asm Operations Guide
f5 Asm Operations Guide
Operations Guide
Our series of operations guides address real-world scenarios and challenges. The content
was written by the engineers who design, build, and support our products, as well as other
F5 professionals—some former customers worked in the field and have firsthand experience.
In this guide you’ll find recommendations, practices, and troubleshooting tips to keep your F5
products running at peak efficiency and elements that may be incorporated into your own run
books.
—Julian Eames
ii
Contents
Acknowledgements 1
Glossary 5
Customization 5
Issue escalation 5
Document conventions 5
Introduction 8
Web application firewall protection 8
Web services 16
Validation 26
Remote logging 30
Traffic Learning 33
Configuration guidelines 35
iii
Tuning violations 40
Regulatory Compliance 51
Regulatory compliance of WAFs 51
Update geolocation 72
Monitor performance 85
Professional services 93
iv
F5 certification 94
Engage Support 99
Appendix 110
Considerations 110
Copyright 115
Trademarks 115
Patents 115
Notice 115
v
ACKNOWLEDGEMENTS
Acknowledgements
Executive sponsor: Julian Eames, Executive Vice President and Chief Operations Officer
Project team, writers, editors, and testers: Aaron Brailsford, Ido Breger, Celeste Crocker, Jack Fenimore, Chad Jenison,
QiHua Jiang, Josh Michaels, Lior Moscovici, Sven Mueller, Erik Novak, David Remington, Lior Rotkovitch, Ziv Saar, Peter
Scheffler, Justin Shattuck, Tzoori Tamam, and Frank Thias
BookSprints facilitator, designer, editor, and support team: Barbara Rühling, Henrik van Leeuwen, Julien Taquet, Raewyn
Whyte, and Juan Gutiérrez. For information about the BookSprints process, see the Booksprints web site. (This link takes you to
an outside resource.)
Content, support, and assistance: Don Martin, Vice President, Global Services Strategic Programs; the Global Services New
Product Introduction Team, Bryan Gomes, Ilana Trager, Phillip Esparza, Derek Smithwick, Beth Naczkowski, Joe Taylor, Mark
Kramer, Andrew Pemble, Dave Bowman, Jim Williams, David Katz; and the rest of the Global Services management team.
Thanks also to the BIG-IP ASM product development team, Orit Hakim, Galit Khon, and Amatzia Yifhar; and thanks to Jill Devine
and Anjuli Lam for copy-editing assistance.
1
ABOUT THIS GUIDE
Common terms and concepts
The goal of this guide is to assist customers with keeping their BIG-IP system healthy, optimized, and performing as designed. It
was written by F5 engineers who assist customers with solving complex problems every day. Some of these engineers were
customers before joining F5. Their unique perspective and hands-on experience has been used to serve the operational and
maintenance guides F5 customers have requested.
This guide describes common information technology procedures and some that are exclusive to BIG-IP systems. There may be
procedures particular to your industry or business that are not identified. While F5 recommends the procedures outlined in this
guide, they are intended to supplement your existing operations requirements and industry standards. F5 suggests that you read
and consider the information provided to find the procedures to suit your implementation, change-management process, and
business-operations requirements. Doing so can result in higher productivity and fewer unscheduled interruptions.
See Feedback and notifications , for information on how to help improve future versions of this guide.
• Installed your F5 platform according to its requirements and recommendations. Search the AskF5 Knowledge Base
(support.f5.com) for “platform guide” to find the appropriate guide.
• Followed the general environmental guidelines in the hardware platform guide to make sure of proper placement, airflow,
and cooling.
• Set recommended operating thresholds for your industry, accounting for predictable changes in load. For assistance, you
can contact F5 Consulting Services.
• Familiarized yourself with F5 technology concepts and reviewed and applied appropriate recommendations from the F5
BIG-IP TMOS: Operations Guide.
2
ABOUT THIS GUIDE
Common terms and concepts
Protocol https
Host www.testsite.com
Path /folder/page.html (in the BIG-IP ASM system referred to as the URL)
Table 0.2 Additional HTTP request components important to the BIG-IP ASM system
Referer http://www.testsite.com/index.php
Content-Type application/x-www-form-urlencoded
Host www.testsite.com
Connection Keep-Alive
Content-Length 48
Cookie SESSION=9899474fd85b473ca496d16b363ec3b8
parameter1=value1¶meter2=value2
Method POST
3
ABOUT THIS GUIDE
Limits of this guide
Cookie SESSION
There is a wealth of documentation covering these areas in the AskF5 Knowledge Base (support.f5.com). The F5 self-help
community, DevCentral, is also a good place to find answers about initial deployment and configuration. You can find additional
resources detailed in Acknowledgments . The following figure shows where this guide can best be applied in the product life
cycle.
4
ABOUT THIS GUIDE
Document conventions
Glossary
A glossary is not included in this guide. Instead, the F5 Glossary page (f5.com/glossary) offers an up-to-date and complete listing
and explanation of common industry and F5-specific terms. For terms specific to BIG-IP ASM, see the following guides:
Customization
Customization may benefit your implementation. You can get help with customization from a subject matter expert, such as a
professional services consultant from F5 Consulting Services.
Issue escalation
See Optimize the support experience for issue escalation information.
If you have an F5 WebSupport contract, you can open a support case by clicking Open a support case on the AskF5
Knowledge Base (support.f5.com).
F5 operations guides are updated frequently, and new guides are being written. If you would like to be notified when new content
is available, email [email protected] and your name will be added to our distribution list for updates and new releases.
Document conventions
To help you easily identify and understand important information, the document in this guide uses the stylistic conventions
described here.
Examples
All examples in this document use only private IP addresses. When you set up the configurations described, you will need to use
valid IP addresses suitable to your own network in place of our sample addresses.
We apply bold text to a variety of items to help you easily pick them out of a block of text. These items include interface labels, file
names, specific web addresses, directories, and IP addresses.
5
ABOUT THIS GUIDE
Document conventions
Configuration utility
The BIG-IP® Configuration utility is the name of the graphic user interface (GUI) of the BIG-IP system and its modules. It is a
browser-based application you can use to install, configure, and monitor your BIG-IP system.
Configuration utility menus, sub-menus, links, and buttons are formatted in bold text. For more information about the
Configuration utility, see Introducing BIG-IP Systems in BIG-IP Systems: Getting Started Guide.
The corresponding # prompt is not included. For example, the following command shows the configuration of the specified pool
name:
tmsh show /ltm pool my _ pool
The following table explains additional special conventions used in command line syntax:
Character Description
You can run the TMSH utility and issue commands in the following ways:
• You can issue a single TMSH command at the BIG-IP system prompt using the following syntax:
tmsh [command] [module . . . module] [component] (options)
• You can open the TMSH utility by typing tmsh at the BIG-IP system prompt:
(tmsh)#
Once at the TMSH utility prompt, you can issue the same command syntax, leaving off tmsh at the beginning.
6
ABOUT THIS GUIDE
Document conventions
For the sake of brevity, all TMSH utility commands provided in this guide appear in the format listed in the first bullet.
You can use the command line utilities directly on the BIG-IP system console, or you can run commands using a remote shell,
such as the SSH client or a Telnet client. For more information about command line utilities, see Bigpipe Utility Reference Guide
or the Traffic Management Shell (tmsh) Reference Guide.
Note Examples are shown in UTF8 language encoding. If you are using one
of the other language encoding character sets supported by the BIG-IP ASM
system, adapt examples as needed. For more information, see the AskF5
article SOL6335: Overview of encoding language settings for ASM.
7
INTRODUCTION
Web application firewall protection
Introduction
BIG-IP Application Security Manager (ASM) enables organizations to protect against the Open Web Application Security
(OWASP) Top 10 threats, application vulnerabilities, and zero-day attacks. Leading layer-7 (L7) DDoS defenses, detection and
mitigation techniques, virtual patching, and granular attack visibility work to thwart sophisticated threats before they reach your
servers.
The BIG-IP ASM system allows compliance with key regulatory standards such as Health Insurance Portability and Accountability
Act (HIPAA) and Payment Card Industry Data Security Standard (PCI DSS).
With the BIG-IP ASM system, organizations gain the flexibility they need to deploy web application firewall (WAF) services for
protecting applications wherever they reside—within a virtual software-defined data center (SDDC), managed cloud service
environment, public cloud, or traditional data center.
WAFs also detect anomalous behaviors from clients attempting to access applications, mitigating the potential impact of
automated agents, bots, scanners, and brute-force attacks.
Web applications typically use a two- or three-tier model, in which the web server acts as the presentation layer for the
application. The web server receives input from the user and displays outputs, while sending transactions to either an application
tier or directly to a back-end database.
In these models, some actions performed on the web application could potentially reach the back-end database, meaning a
malicious client can gain unauthorized access to data even if the database servers themselves are not directly accessible to the
users.
• Disallow incoming traffic from finding and targeting known vulnerabilities in web applications.
• Allow a quicker and easier way to fix vulnerabilities, as revealed in web applications by scanners and penetration tests.
8
INTRODUCTION
BIG-IP ASM security policy life cycle
• Prevent malicious clients from abusing web applications by exploiting flaws in business logic or the application
infrastructure.
• Provide an additional point of control to minimize the risk of developer or administrative error.
• Provide visibility into what types of attacks and scans are targeting the application.
• Provide a forensic record and event correlation for triaging after a suspected security incident.
• Provide behavioral mitigations, such as web scraping and bot detection, that are very difficult to implement in each
application.
Before you deploy an application security policy, it helps to have an understanding of exactly what you are trying to protect and
why. Defining your security problem before you start will make it easier to develop and enforce a security policy. Some use cases
require more extensive policy development and tuning, while with other use cases, a simple security policy will suffice.
The application security policy life cycle has three phases: policy deployment, policy tuning, and policy maintenance.
9
INTRODUCTION
Policy tuning details
application. This is necessary as some legitimate traffic may not pass set policy rules and may resemble an attack. Over time, the
security policy will become more strict, meaning that policy components that have not triggered any violations are enforced, and
acceptance occurs for elements specific to your application, such as file types, parameters, and HTTP methods.
A good, finely-tuned security policy deployed according to the security requirements of your application should incur minimal
operational costs. A very strict and application-specific security policy can potentially take more time and effort to maintain,
especially in light of application changes. A generic, lightweight policy requires very little maintenance, even when applied to
multiple or different applications.
Tasks included in tuning include adjusting policy blocking settings, populating entry lists, and enforcing entities and attack
signatures.
At the end of the tuning process, the policy should contain all the relevant violations. This will be true whether you started with a
fully enforced list and tuned it down ("tightened"), or you started with a blank list and enforced violations over time ("loosened").
A BIG-IP ASM policy usually starts with catch-all wildcards (*) for the entity lists (file types, parameters, URIs, cookies, headers,
and entities.). Depending on the deployment settings, the BIG-IP ASM system will suggest specific entities to populate the lists.
10
INTRODUCTION
Tips and guidelines
Once the lists are populated, wildcards can be removed and the list enforced. Not all entity types are relevant to all security and
application requirements, so F5 recommends tuning to include only those that are important to you.
The tuning phase for each entity is marked with a Staging flag, meaning the entity's attributes are only checked, not enforced.
Once all attributes are manually or automatically adjusted to fit legitimate application use, the staging flag can be manually or
automatically removed.
Attack signatures behave the same way. All signatures in a policy start in staging. This means that traffic will not be blocked if it
matches that signature.
Once you disable the signatures causing false positives, you can turn off staging and enforce the rest of the signatures.
Session tracking includes the ability to track users and sessions according to their activities in the application, blocking them
completely, or logging their requests, whether legitimate or malicious.
Web scraping detects non-human behaviors on the website, flagging, and blocking bots with malicious intents, even if all they do
is access legitimate resources on the website.
DoS protection guards the application from heavy traffic patterns and rates that are meant to bring down the application or
database, even when each request appears to be in order and does not trigger any of the violations in the policy.
• Do not allow the path to implementation to become blocked by a desire to instantly build a perfectly secure and tuned
environment. Allow for a learning curve and build your security policy to support the needs of your application and
organization.
• Do not feel like you must use a feature simply because it exists.
11
INTRODUCTION
Tips and guidelines
• When zero day hits, it is better to be in blocking mode with a current policy than to have to build a new policy from scratch.
• Sometimes providing basic protections for many applications is just as important as providing detailed protection for one.
• The BIG-IP ASM Policy Builder creates an effective security policy and can save you a lot of time.
• The BIG-IP ASM system is designed to learn while in production. If you do not have a robust QA environment, your
application users may supply the best source of legitimate traffic from which the BIG-IP system can learn.
• The BIG-IP ASM system has multiple, layered protections for each attack vector. Do not over-invest time or resources on
particular mitigations.
• Start with a policy that loosens security restrictions to allow all legitimate behavior and disallow malicious requests.
12
INTRODUCTION
Tips and guidelines
13
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
BIG-IP ASM API/WEB SERVICES PROTECTION
Web API Use Cases
You can define explicit policy entities and violation settings for specific components of an API service.
Due to the nature of APIs and API data, you need to manually create a security policy and add appropriate security entities to
protect the API service, including parameters, sensitive parameters, URLs, HTTP methods, and content profiles.
The three fundamental use cases of web APIs are back-end to back-end (B2B) APIs, browser to back-end APIs, and mobile
application APIs.
The client system is called back-end because it is not a browser or any other client that is expected to provide an interactive
interface or GUI to a user. Rather, it provides a back-end system that implements business logic.
Typical B2B use case examples include reseller to retailer, retailer to supplier, and credit to bank. However, the most prominent
use is for web services.
Web application frameworks separate the presentation layer (HTML template, CSS stylesheets, and front-end JavaScript code)
from the content that the user will present or the data that the user will manipulate.
Presentation layer assets are retrieved when a new page loads. Meanwhile, users retrieve content or manipulate data using HTTP
requests from within the page itself. This process and content retrieval can occur asynchronously, allowing many non-blocking
requests for content and manipulations to data to occur simultaneously.
These non-blocking requests are called AJAX requests or XmlHttpRequests (XHR) in JavaScript vocabulary.
The API client is the JavaScript code from within the page. These APIs are typically, but not exclusively, REST.
15
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
Web services
Web services are the traditional standard for invoking API on the web.
They consist of multiple standards from the W3C and OASIS organizations.
The following web services are most relevant to the BIG-IP ASM system:
• Web Services Description Language (WSDL), which is the language for defining the API.
• Web service security (WSS), which encrypts and signs elements of the SOAP messages.
• Security Assertion Markup Language (SAML), which is the language for authentication tokens asserting the identity of a
user.
Web services are commonly used in application-to-application use cases, but they are also used in web browsing instead of the
REST/JSON, and on mobile applications.
Typically, RESTful APIs use JavaScript Object Notation (JSON) as the document format used in the request and response, but
they may also use XML. You can use RESTful API services for client-to-server or server-to-server communication.
No official standards or RFC exist for REST, so developers adopt other standards and protocols that use a similar design pattern.
These standards and protocols include JSON, URI, HTTP, HTTPS, and XML. The adoption of these standards provides a solid
foundation for securing a REST API using the BIG-IP ASM system.
16
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
API methods Part of the message. HTTP methods following the CRUD paradigm.
Any methods can be defined.
Security Message level (WSS) and transport level Only transport level (SSL/TLS).
(SSL/TLS).
In the browser to back-end server API (AJAX) use case, the web application consists of two sets of URLs, which need to be
treated differently: static content URLs and AJAX URLs.
From the BIG-IP ASM perspective, the main difference between the sets of URLs is the way in which request payload is handled:
content requests do not carry a body payload, while AJAX requests often do. In the web services use case, this applies to all
requests, while in the REST use case, POST, PUT, and PATCH are the modifying methods.
Content URLs have either Disallow, Check content signatures, or Form Data (especially for content upload cases) for the request
body handling.
JSON or XML are the body handling method for AJAX URLs. JSON or XML profiles are attached, respectively.
17
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
Methods used in BIG-IP ASM policies to separate the allowed URLs into content or AJAX URL groups include the following:
1. If the URI (path) patterns for the two groups are known in advance, the groups can be configured manually to one or few
wildcards for each group.
For example /resources/* catches all content URLs, and /api/* catches AJAX API URLs.
Note The same content profile (XML or JSON) applies to all RESTful URLs. If
more fine-grained control is required, you have to break the AJAX URL
wildcard into several wildcards, each with its own separate profile.
2. If you cannot easily group the URLs by URI patterns, or if the application changes often, it makes sense to have all URLs
learned and let the BIG-IP ASM system also detect the content payload automatically. Do this by activating the URL
classification setting (in BIG-IP 12.0.0), or the detect advanced protocols setting (in BIG-IP 11.6.0).
3. If most URLs are AJAX, the static content URLs can be identified as those without a JSON or XML body. In this case, the
new URLs are learned in selective mode and the "*" URL is configured with XML or JSON body.
During the policy tuning phase, requests with payload other than AJAX or XML fail to parse correctly or to generate
violations. These requests are eventually learned as separate URLs in the policy, while the "*" URL covers AJAX traffic.
2. Application vulnerabilities.
The XML profile is the container of the XML and web services enforcement.
18
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
Parser level and XML syntax verification. Basic security measure that you The inclusion of any XML
buffer overflow. have to always apply. profile enforces XML
syntax.
Message sizing restriction: F5 recommends that you apply all Enable and set thresholds
length, number of elements, defense checks and let the learning per each defense
nesting level, and more. process adjust the thresholds. measure.
Application WSDL or XML schema If the server application has a WSDL Attach WSDL or XSD file to
vulnerabilities. validation. file, attach the file to the policy so the profile.
that the policy can be enforced.
Restrict the allowed SOAP WSDL is assumed, but not all Mark the allowed methods
methods. methods are allowed in all URLs to from the WSDL.
the API.
For example, in some URLs you may
only allow read methods, while in
other URLs, you allow all methods,
including those that modify data.
Attack signatures in XML F5 recommends that you enable Enable attack signatures.
element content. attack signature checks and let BIG-
IP ASM learning process disable
false positive signatures.
Message-level Handling encryption and If the client application uses WSS, WSS section.
security. decryption, message the BIG-IP ASM system can pass
signing, and validating a message to the server without
signatures on either the encryption, or with shorter keys.
client or server side. The same is true for signatures and
authentication.
To secure your REST API, F5 recommends that you have access to the endpoints, which typically follow a URI standard. These
19
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
resources allow you to set the enforcement mode to Blocking immediately after you apply the security policy to your virtual
server.
When you deal with the browser to back-end server (AJAX) use case, make sure that you separate AJAX URLs from HTML and
resource URLs in your security policy.
Deployment example
This section describes a real-world deployment example based on the following assumptions:
• The API uses MongoDB to store JSON documents for its data store, instead of using an SQL database.
• The API service uses BIG-IP LTM as a proxy to forward SSL (HTTPS: 443) L7 traffic to the server's listening port for the
API.
• The API is developed and the data store (MongoDB) is managed by a developer in your organization.
• You have a specification associated with the API service outlining the stack (services/daemons) that is required for a
proper functioning API.
• The API stores, contains, or returns data containing PII (Personally Identifiable Information), which must be excluded from
all logging processes.
• API documentation indicates fields that are considered to be highly sensitive, which you need to obscure before logging
requests, violation requests, or responses to your logging infrastructure.
Your developer supplies you with the following sample command syntax that users can apply to update and view customer
information.
20
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
"name":"JohnDoe", "phone":"+11231231234",
"email":"[email protected]"
},
"active":"true"
}
To list customers
21
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
"email":"[email protected]"
},
"active":"true",
"created":"1447669909"
"modified":"1447669939",
}
}
Using the data specification for the API, you can manually create an explicit policy to allow users to view certain URLs and
parameters, but not others.
The more explicit configuration and security policy rules, the more potential for false positives. However by keeping track of
updates in your API, you can keep the security policy updated to reflect new changes and available URLs or added HTTP
methods.
Note You can protect data by using the BIG-IP ASM system to deny access
from automated libraries (liburl, python, php-curl, curl, wget, etc.), and to
deny known malicious bots and crawlers access to the system, as well.
Because in this example the application is built within your organization, you can set the policy enforcement mode to Blocking
immediately after applying the policy to your virtual server.
The tasks to create and apply the policy include the following:
2. Create a JSON profile. Enable GET and POST HTTP methods in the security policy.
6. Delete wildcards.
22
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
7. Apply the policy to the virtual server and set the enforcement policy to Blocking.
1. Navigate to Security >> Application Security : Security Policies : Active Policies and click Create.
2. For Local Traffic Deployment Scenario, select Do not associate with Virtual Server, and click Next.
3. For Deployment Scenario, select Create a security policy for XML and web services manually, and
click Next.
4. Name the policy, leave Application Language at the default setting Unicode (utf-8), clear Security Policy
is case sensitive and Differentiate between HTTP and HTTPS URLs, and click Next.
Note In this example, F5 assumes that your application does not rely on
case sensitivity, uses either HTTP or HTTPS protocols, and does not need to
differentiate between the protocols. Adjust the example, as necessary, for
your use.
• Unix/Linux
• Apache
• Node.js
• jQuery
• MondgoDB
7. Click Finish.
23
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
Note For tighter security, you can set the maximum values instead of
selecting Any. You need to adjust these parameters as your API grows.
4. Click the Value Meta Characters tab and add the characters to disallow, as appropriate. For this example,
disallow the following:
• EOT
• BS
• TAB
• LF
• CR
• ESC
5. On the Sensitive Data Configuration tab, enter the Element names of any sensitive data that you do not
want logged. This may include any PII that you need to disallow, such as a customer name and address. For this
example, you are storing Employee Identification Numbers (EIN), which should not be displayed, so type ein, and
click Add.
To enable methods
1. Navigate to Security >> Application Security : Headers : Methods, and click Create.
Note In BIG-IP ASM 11.6.0, HTTP methods allow you to define global
options for permitted HTTP methods. In BIG-IP ASM 12.0.0 and later, you
can specify individual HTTP methods that the system allows for each
endpoint. Additionally, you can use an iRule to allow or deny specific HTTP
request methods against certain paths.
24
BIG-IP ASM API/WEB SERVICES PROTECTION
RESTful API services
1. Navigate to Security >> Application Security : URLs : Allowed URLs : Allowed HTTP URLs, and click
Create.
2. Add URLs that you want the customers to be able to access. For our example, for URL Example:*, type /
customers, and add a URL Description.
6. In Learn Explicit Entities, select Never (wildcard only) and add a URL Description, and click Create.
1. Navigate to Security >> Application Security : Parameters : Parameters List, and click Create.
3. For Parameter Name, select Wildcard and type a name (for example, customer).
5. Click Create.
To delete wildcards
1. Navigate to Security >> Application Security : Parameters : Parameters List, select the wildcard *
parameter, and click Delete.
2. Navigate to Security >> Application Security : URLs : Allowed URLs : Allowed HTTP URLs, select the
wildcard * URL, and click Delete.
You can now apply the policy to a virtual server, and set the policy enforcement mode to Blocking.
25
BIG-IP ASM API/WEB SERVICES PROTECTION
Validation
Validation
You can test API URLs using smoke testing. Smoke testing allows you to use the API as if you were in a production environment.
Even if your API is still being developed, you can conduct smoke testing and regression testing in a non-production environment
to identify issues with the policy.
In this example, smoke tests are run against a sample API, learning the URIs, parameters, and various positive enforcement
entities. The enforcement mode is set to Blocking, and tests are run again. Chaos Monkey is also used to test the policy against
a variety of attack vectors, including null byte, directory traversal, disallowed HTTP methods, and others. These vectors are
tested against a variety of paths to make sure requests are blocked, alarmed, and/or logged as specified in the configuration.
26
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
BIG-IP ASM EVENT LOGGING
Log display formats
When logging to a remote destination, see product documentation to determine whether a custom format is required.
For more information and guidance, see Logging Considerations and AskF5 article SOL9435: Overview of the Storage Format
option for a remote logging profile.
Support ID
The support ID number identifies the request and is associated with the local request logs, manual learning suggestions, and the
remotely logged message.
Violations
The violations found in the previous example include the following:
28
BIG-IP ASM EVENT LOGGING
Log display formats
Figure 3.1 Violations displayed on the Request Details tab in BIG-IP ASM Configuration utility
Under the Request Details tab, the Violations area shows violations triggered by the request and identifies violation types. The
Learn column indicates whether the current security policy needs to learn this violation in order to pass it.
The log message also includes the full query string and POST data, which may be used to determine whether a formatted
request is legitimate or malicious.
29
BIG-IP ASM EVENT LOGGING
Remote logging
Logging both valid and violation requests may significantly increase size of your logging files...
By default, the local log storage is finite with a maximum capacity of 3 million records stored across all BIG-IP ASM security
policies and 2 GB in database table size.
Log entries are rotated out on a strict age basis. If you log multiple applications locally, it is possible for one application to
generate more than its share of messages, filling the log and pushing out entries for other applications before they can be
investigated.
The local log provides detailed information for all learning suggestions. If the log rate is too high, it is possible for the BIG-IP ASM
system to lose detailed information for learning suggestions that are current for the policy.
Remote logging
Local logging may significantly impact disk performance, especially on systems with slow disk subsystems.
F5 recommends externally logging all or at very least all illegal requests to a security information and event management (SIEM)
system for better data retention, searching, event correlation, and scalability.
For logging on remote storage, TCP and UDP are used for log delivery. UDP has lower overhead but can only log up to 1KB of
data per log entry, while TCP delivers greater reliability and allows up to 64KB of data per log entry. This greater capacity for data
makes TCP a better choice as it allows storing complete log entries.
F5 recommends using session tracking to log only violations rather than all requests. Session tracking allows you to log all
requests which cross specific violation thresholds for only specific sessions. This reduces load and data retention requirements
by capturing full requests for only suspicious activities without logging the full requests for all sessions.
When using Remote Storage type Remote in BIG-IP 11.6.0, or Comma Separated Values in BIG-IP 12.0.0, consider the order
in which the Selected Items are defined in the Storage Format.
By default, the full request is sent in the middle of the log entry. This may cause items such as violations to be lost if the log data
limit is met before they appear. You can set the Maximum Request Size and Maximum Query String Size to fix this problem.
See the following table for recommended settings.
30
BIG-IP ASM EVENT LOGGING
Remote logging
BIG-IP ASM 12.0.0 and later Limit Request Size Limit Query String Specify Storage
Size Format
BIG-IP ASM 11.6.0 Limit Request Size Limit Query Specify Storage
String Size Format
31
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
POLICY TUNING AND ENHANCEMENT
Traffic Learning
Staging, enforcement, and learning suggestions can be configured manually or by the BIG-IP ASM system.
Security checks Learn, Alarm, and Block are now system-wide settings integrated with Policy Builder.
An improved learning suggestions mechanism handles requests, with or without violations, for manual and automated policy
building.
Traffic Learning
Learning suggestions can result in policy changes, such as adding entities, disabling an attack signature, or making the policy
more robust based on characteristics of the traffic.
In BIG-IP 11.6.0, learning suggestions are displayed on the Traffic Learning page at Security >> Application Security: Policy
Building: Traffic Learning.
In BIG-IP 12.0.0 and later, the configuration for the Enforcement Mode, Learning Mode, Policy Type, and Learning Speed
33
POLICY TUNING AND ENHANCEMENT
Traffic Learning
is on the Learning and Blocking Settings page: Security >> Application Security : Policy Building : Traffic Learning.
Event Suggestion
When using the manual mode in BIG-IP 11.6.0, you can modify a policy without having any correlated or weighted suggestions
from the BIG-IP ASM system.
In BIG-IP 12.0.0 and later, Policy Builder runs in the background to make it easier for you to make policy modification decisions
when in manual mode.
The BIG-IP ASM system provides suggestions based on the number of requests and how often a signature is triggered. The
system also displays a request violation rating based on statistical calculations from different sessions and client IP addresses,
with a learning score on a scale from 0 to 100 percent.
If using Policy Builder, once a suggestion reaches 100 percent, the BIG-IP ASM system automatically accepts it. If you are using
the manual policy builder, the suggestion stays on the Traffic Learning page until you accept it.
When you accept a suggestion, it is added to the policy. You also can delete suggestions. If you delete a suggestion, it is
removed and can be learned again. If you ignore the suggestion, it is hidden.
You can accept a suggestion at any time in either Policy Builder or in manual mode.
34
POLICY TUNING AND ENHANCEMENT
Configuration guidelines
Note The default learning suggestion filter uses a 5-100 percent learn score
to filter out suggestions with a single occurrence or those not likely to be a
false positive.
Configuration guidelines
This section covers guidelines for common configuration tasks involved in setting up a new policy.
The easiest method to determine whether sensitive information exists, is to request from the application owner, a list of the
sensitive parameters for your application, such as password-based accounts, sensitive session data, and other parameters.
Another method to determine whether sensitive information exists, is to use parameter learning to create suggestions in the entity
learning section. Parameter learning accumulates parameters present on the site, which you can then examine and determine
whether each is sensitive. Parameters can be targeted by name and value.
For more information, see Masking Credit Card Numbers in Logs in BIG-IP Application Security Manager: Implementations.
While most web applications do not treat URIs with case sensitivity, some do. In such applications, example.html and
Example.html may see different web pages, each with their own associated content, parameters and security access controls.
In such cases, enabling case sensitivity is required.
35
POLICY TUNING AND ENHANCEMENT
Configuration guidelines
Some meta characters are considered risky (such as "<" and " ' "), but most attacks taking advantage of these commonly abused
meta characters have matching attack signatures.
To use vulnerability assessment scanners, you need to identify and configure the scanners' IP addresses in the IP address
exception section.
For more information, see Using Vulnerability Assessment Tools for a Security Policy in BIG-IP Application Security Manager:
Getting Started.
The BIG-IP ASM system uses a default blocking response page to notify users when a request has been blocked by a security
policy. It also uses a default page to display when login violations occur.
The default blocking response contains one variable, <% TS.request.ID() %>, which BIG-IP dynamically replaces with a
support ID reference number for the specific request or response that triggered the blocking event.
You can easily create a custom blocking response page for either general violations or login-specific violations. You can style it to
match your organization or application style or branding. F5 recommends that you customize the page so at a minimum it
includes contact information and steps that users can take to address the violation.
F5 recommends that you host required assets for the blocking response page outside the BIG-IP environment serving it. For
example, you can place assets on CDN (Content Delivery Network)/"sorry server".
Because of potential Cross Origin Resource Sharing (CORS), assets stored on a CDN/"sorry server" may become unavailable to
the response page. If this happens, try placing assets like CSS stylesheets inline to the HTML markup as in the following code
example:
<!doctype html>
<html>
<head>
<meta charset="utf
8">
<meta httpequiv="XUACompatible"
content="IE=edge,chrome=1">
<title>Request Blocked | Company Acme</title>
<meta name="viewport" content="width=device
width">
36
POLICY TUNING AND ENHANCEMENT
Configuration guidelines
<style type="text/css">
*, *:after, *:before {
webkitboxsizing: borderbox;
mozboxsizing: borderbox;
msboxsizing: borderbox; boxsizing: borderbox; }
html {
background: #fff;
font: bold 16px/24px "Helvetica Neue Lt Std Light", "Tablet
Gothic", Helvetica, Arial, sansserif;
color: #000;
}
body { width: 100%; margin: 100px auto;}
.logo { padding: 5px; width: 100%; display: block; text
align: center;
marginleft: 100px; }
.logo img { padding: 8px; max
height: 64px; }
section .message { background: #fafafa; color: #666; width: 410px;
margin: 0 auto; padding: 8px 15px 32px 15px; border: 1px solid #e2e2e2;}
Note F5 recommends that you serve the blocking response page assets
from a local “sorry server” and have the BIG-IP ASM system redirect violating
clients with the proper support ID.
F5 recommends that you do not embed images in the BIG-IP ASM response page.
For more information, see the AskF5 article SOL7825: Redirecting a blocking response support ID to an external error page and
Configuring What Happens if a Response is Blocked in BIG-IP Application Security Manager: Implementations.
If your application contains a dynamic list of file types, you can create a list of disallowed file types to block using one illegal file
type violation.
For most applications, F5 recommends that you block the following file types: bat, bck, bin, cfg, cmd, com, config, dat, dll,
eml, exe, exe1, exe_renamed, hta, htr, htw, ida, idc, idq, ini, log, nws, old, pol, printer, save, shtm, shtml, stm, sys,
wmz.
To disallow file types, you can enter them individually by navigating to Security >> Application Security > File Types >
Disallowed File Types – Create, or you can import the following list in the XML policy configuration:
<disallowed _ file _ types>
<file _ type name="bat"/>
37
POLICY TUNING AND ENHANCEMENT
Manual learning and policy building
For more information, see Adding File Types to a Security Policy in BIG-IP Application Security Manager: Implementations.
38
POLICY TUNING AND ENHANCEMENT
Manual learning and policy building
The BIG-IP ASM system generates learning suggestions for violation types that have the Learn flag enabled on the Blocking
Settings page (in BIG-IP 11.6.0) or the Learning and Blocking Settings page (in BIG-IP 12.0.0 and later).
When the system receives a request triggering a violation, it updates the Manual Traffic Learning page (in BIG-IP 11.6.0) or the
Traffic Learning page (in BIG-IP 12.0.0 and later) with learning suggestions based on information from the violating request.
You can review learning suggestions to determine whether the listed requests triggered a legitimate security policy violation or
whether you need to update the security policy to allow such requests.
Learning suggestions enable you to create policy entities based on actual traffic. They provide the number of times each violation
has occurred and a list of the requests that contain violations. From this information, you can make policy decisions.
Does the violating entity make sense for the application? (For example: Does the application make use of .WOFF file types?)
Can the application owner provide a summary of which entities should be allowed into the application?
How many learning suggestions exist for the given entity? Numerous occurrences may indicate a false positive.
Learning suggestion records expire at a rate determined by the number of violations set in Blocking Settings and the number of
policies using traffic learning. Since learning suggestion requests are not indefinitely retained, F5 recommends that you regularly
review suggestions on any policy that the system is actively learning, or use the Policy Builder.
To see the impact of new or updated signatures, enable learning suggestions on all or select violations when updating attack
signatures. Doing so can help ensure proper policy configuration and reduce potential false positives. Learning suggestions do
not sync or move between the BIG-IP ASM system systems and therefore can only be found on the active unit that learned the
traffic. When a failover occurs, you must fail back to the original system to access learning suggestions. Also, learning
suggestions are cleared when a system is upgraded. F5 recommends that you accept or clear all learning suggestions before
you upgrade your system.
For more information, see Refining Security Policies with Learning in BIG-IP Application Security Manager: Implementations.
39
POLICY TUNING AND ENHANCEMENT
Tuning violations
Tuning violations
Policy violations are displayed on the Policy Building: Traffic Learning page. An important part of tuning your policy is to fix
violations and manage issues associated with false positives. For example, legitimate application traffic may be disrupted if your
policy is blocking violation types that create false positives. Even if blocking for a violation is off, false positives can trigger alarms,
and an excess of improperly logged violations can create noise that may distract from real issues.
In many cases, violations show both malicious traffic and legitimate traffic. If the system is blocking legitimate traffic (a false
positive), you can address these violations by accepting the related suggestion—also known as loosening the policy--even
though malicious requests were also detected by the same violation.
This may seem counterintuitive, since the policy, by design, successfully detected and blocked malicious traffic, but it is better to
loosen the policy than to create false positives or excessive, improperly logged violations.
Non-production environment (QA or Test): Only valid traffic requests should exist in a non-production environment; however,
policy violations may still occur with a new policy or as a result of an application update.
If vulnerability scanning and penetration testing are performed, make sure to exclude that traffic from Learning to distinguish it
from legitimate traffic. Address all generated violation types, and accept all resulting learning suggestions for the security policy.
Production environment: Once a mature policy is deployed to production, most violations will likely represent malicious
attacks; however, some false positives may occur, depending on how much tuning you did before deployment. Some violation
types are more prone to false positives than others.
Other than volumetric attacks, most real attacks do not cause high volumes of traffic, so a large number of incidents associated
with a particular violation type increases the likelihood that false positives exist.
The following section lists the most common policy violation types and how to treat each, based on whether they occur in a
production or non-production environment.
Non-production environment: Accept. This violation typically occurs when new application resources are added or new
technology is adopted in the application.
Production environment: Unless these violations occur in conjunction with a new application update, violations of this type in
a production environment are generally malicious and you should not accept as a learning suggestion or loosen the policy.
40
POLICY TUNING AND ENHANCEMENT
Tuning violations
Production environment: Do not accept. Regard as an attack. If data shows high number of incidents, review several of the
incidents for malicious traffic. If samples are malicious, ignore the learning suggestion and do not disable the violation. If the
incident count is low, these are very likely malicious. However, application updates or new types of clients may rarely trigger this
type of violation. If false positives are evident, disable the improper firing protocol compliance check.
Illegal Method
Triggered by: Request uses the HTTP method not allowed by the security policy.
Production environment: Regard new methods triggered as attacks. If you observe a high number of incidents, review the
data for false positives. These false positives are typically caused by a new type of client accessing the application. To permit a
new client type, update the policy to allow the new method.
Production environment: False positives are not uncommon for this violation type in the production environment. If they occur
after an application update and the incident count is high, sample the incident data to confirm that it is legitimate traffic. If the
traffic is legitimate, accept the learning suggestion.
Note Evasion Technique checks are global for the policy. If you accept the
learning suggestion for any subviolation, all Evasion Technique checks will be
disabled. The risk of disabling this check is mitigated by other security
checks, which occur after normalization process.
For more information on this violation type, see AskF5 article: SOL 7929: Working with Evasion technique detected violations.
41
POLICY TUNING AND ENHANCEMENT
Attack signature tuning
If this sub-violation is disabled, requests not exceeding the configured number of decoding passes can still trigger a violation of
other security checks. If requests exceed the configured number of decoding passes, a double-encoded request matching a
signature still causes a signature violation after decoding. In the same circumstance, if the sub-violation is enabled, such requests
generate a violation for both the signature and the sub-violation.
Production environment: False positives may rarely occur due to application updates. Review incidents for false positives. If
false positives exist, accept learning suggestion, which disables the sub-violation. Since normalization (including at least two
decoding passes) of requests occurs independently of this sub-violation, the policy will likely remain effective in mitigating attacks
using multiple encoding passes in an attempt to evade detection.
False positives
Indicators of potential false positives include the following:
High occurrence of a specific attack signature—particularly a new one--triggering high volume of violations. The signature is likely
detecting a portion of application code as an attack.
Newly implemented signature registering immediate violations. When adding new signatures to a policy, either through signature
updates or through application of additional current signatures, F5 recommends that you turn on learning for the signatures. If
new signatures register immediate violations, review the requests to confirm legitimate blocking or to see if the signature is
causing a false positive.
Review the request for malicious content. If possible, consult the application owner, who may be able to help determine
valid traffic from malicious traffic.
Correct the false positive. Your action depends on the nature of the false positive and your ability to fix it. There are common
methods for correcting a false positive while maintaining good security posture:
42
POLICY TUNING AND ENHANCEMENT
Transition enforcement mode from Transparent to Blocking
The following table shows the various violation types and the recommended period they should spend in the production
environment without triggering false positives before you transition the enforcement mode to Blocking.
Table 4.2 Transition period for the BIG-IP ASM system violations
Never log traffic from this IP Address Disable if evidence of violation must be shown (for security auditors, for example).
Enable to reduce spam violations in event log and make it easier to find real-time
attacks in production environment.
Attack signature detected: Remove attack signatures out of staging, resolve issues
with attack signatures triggered by false positives.
Illegal Redirection Attempts.
43
POLICY TUNING AND ENHANCEMENT
Transition enforcement mode from Transparent to Blocking
Application language
Every web application has language encoding that determines the character set the browsers use to both display the page and
send any submitted form data. The BIG-IP ASM system supports multiple language encodings.
You can configure the language for new web applications (or those you want to reconfigure), and you set the language encoding
using the Deployment wizard. F5 recommends that you select the default setting, Auto detect, when it is available. The
Application Security Manager determines the acceptable character set for the application.
Note Once you set the web application language, you cannot change it
unless you reconfigure the web application completely, losing all settings. For
information about reconfiguring web applications, see Returning a web
application to a new, unconfigured state.
• If manually setting the application language, make sure you know the character set the application will use for HTML form
submission.
For more information, see the Ask F5 article SOL6335: Overview of encoding language settings for BIG-IP ASM.
The BIG-IP ASM system checks to see if the sequence of bytes is valid within the defined encoding. Sequences not found trigger
the Failed to convert character violation.
However, the BIG-IP ASM system attempts to parse the data, even when the encoding is wrong. For example, a web application
configured with ISO-8859-8, while the web site sends pages in UTF-8 encoding, requests generated from pages contain UTF-8
encoded data. If the application cannot parse the data as ISO-8859-8, but can validate it as ISO-8859-8 characters in UTF8, the
request does not cause a Failed to convert violation.
JSON/XML considerations
By default, the BIG-IP ASM system expects HTML form data. If an application contains either XML or JSON protocols, the
security policy accounts for this using content profiles.
F5 recommends that you associate an XML/JSON content profile for generic policies that create wildcard entities.
44
POLICY TUNING AND ENHANCEMENT
Session tracking and login pages
For content-type-based XML/JSON, a generic content profile using header-based content validation must be associated with a
URL wildcard entity.
For more information see Adding JSON Support to an Existing Security Policy in BIG-IP Application Security Manager:
Implementations.
When an incoming request exceeds the defined buffer size, the Request length exceeds the defined buffer size violation
setting determines whether a request will be blocked or bypassed.
Set this violation to Blocking if the protected environment is not expecting large file uploads. Requests will bypass the security
policy after inspecting up to 10KB of the request (containing the requests' headers, URIs, and initial request payloads).
For more information, see the AskF5 articles: SOL935: Error Message: Request length exceeds defined buffer size and
SOL17573: The BIG-IP ASM system does not need to be disabled to allow large file uploads.
You can set the BIG-IP ASM system to trust the IP address contained within the HTTP header instead of the NAT IP address from
the CDN. Trusting the X-Forwarded-For (Header name may vary depending on the CDN) is generally preferred, as you will see
the actual client IP address in the log files.
For a DoS profile, the Insert X-Forwarded-For should also be enabled. It uses a default page to display when set in the HTTP
profile used on the virtual server being protected.
Mandatory HTTP header violation searching for CDN based headers: Some HTTP headers should always appear in
traffic that was forwarded by CDN servers. These headers can be added to a policy and checked to verify that traffic came from
the CDN.
45
POLICY TUNING AND ENHANCEMENT
Session tracking and login pages
The advantage of using session tracking is that you can identify the user and the unique session for each request, which provides
additional data points that you can use in combination with the source IP address to investigate suspicious traffic.
Whether you create them manually or automatically, login pages define the URLs, parameters, and validation criteria required for
users to log in to the application. User and session information is included in the system logs so you can track a particular
session or user. The system can log activity, or can block a user or session if either triggers more violations than the configured
threshold allows.
• Track a specific user instead of using the authenticated session. Tracking by IP address is impractical for a number of
reasons. .
• Block suspicious sessions once specific limits are triggered. You can configure limits as a number of violations per unit of
time, per user, or per session. This might be an attacker with automated scanner-tools that are generating a high rate of
alerts per time frame. If the limits are exceeded, the attacker is blocked for a specific amount of time.
46
POLICY TUNING AND ENHANCEMENT
Session tracking and login pages
The default blocking response contains one variable, <% TS.request.ID() %>, which BIG-IP dynamically replaces with a
support ID reference number for the specific request or response that triggered the blocking event.
You can easily create a custom blocking response page for either general violations or login-specific violations. You can style it to
match your organization or application style or branding. F5 recommends that you customize the page so at a minimum it
includes contact information and steps that users can take to address the violation.
F5 recommends that you host required assets for the blocking response page outside the BIG-IP environment serving it. For
example, you can place assets on CDN (Content Delivery Network)/"sorry server".
Because of potential Cross Origin Resource Sharing (CORS), assets stored on a CDN/"sorry server" may become unavailable to
the response page. If this happens, try placing assets like CSS stylesheets inline to the HTML markup as in the following code
example:
<!doctype html>
<html>
<head>
<meta charset="utf
8">
<meta httpequiv="XUACompatible"
content="IE=edge,chrome=1">
<title>Request Blocked | Company Acme</title>
<meta name="viewport" content="width=device
width">
<style type="text/css">
*, *:after, *:before {
webkitboxsizing: borderbox;
mozboxsizing: borderbox;
msboxsizing: borderbox;boxsizing: borderbox;}
html {
background: #fff;
font: bold 16px/24px "Helvetica Neue Lt Std Light", "Tablet
Gothic", Helvetica, Arial, sansserif;
color: #000;
}
body { width: 100%; margin: 100px auto;}
.logo { padding: 5px; width: 100%; display: block; text
align: center;
marginleft: 100px; }
.logo img { padding: 8px; max
height: 64px; }
section .message { background: #fafafa; color: #666; width: 410px;
margin: 0 auto; padding: 8px 15px 32px 15px; border: 1px solid #e2e2e2;}
47
POLICY TUNING AND ENHANCEMENT
Compare and merge policies
Note F5 recommends that you serve the blocking response page assets
from a local “sorry server” and have the BIG-IP ASM system redirect violating
clients with the proper support ID.
For more information, see Configuring Application Security Session Tracking in BIG-IP Application Security Manager:
Implementations or Tracking User Sessions in BIG-IP Application Security Manager: Implementations.
Comparing and merging a production policy with a policy running in a staging environment.
The following figure shows the differences between the two policies. Each policy has a modified signature list. Policy /common/
production shows that /config/access is disabled and policy /common/staging shows that /dms/AggreSpy is disabled.
48
POLICY TUNING AND ENHANCEMENT
Compare and merge policies
You can now use the Policy Diff functionality to only monitor and audit the changes, or to move the changes from the policies to
a new copy of the policy, which contains both modifications.
For more information, see Maintaining Security Policies in the BIG-IP ASM Implementations Guide.
49
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
REGULATORY COMPLIANCE
Regulatory compliance of WAFs
Regulatory Compliance
This chapter contains guidance to enhance BIG-IP ASM security policies and improve compliance with various regulatory
regimes.
Review this chapter to determine the type of policy you want to use as your basis for compliance, then create an appropriate
security policy or create a unique policy based on your specific security needs.
Many regulatory compliance mandates provide few specific implementation requirements and leave areas open to interpretation.
F5 recommends using the BIG-IP ASM system to secure your web application environment with consideration for the security
posture of the organization, the sensitivity and threat surface of the applications, and the application security resources available.
Whether a particular implementation satisfies the regulations is often subject to interpretation. F5 recommends consulting
organization security policies, auditors, and regulatory bodies to determine whether applications are compliant with a particular
regime.
This chapter provides guidelines to ensure that the BIG-IP ASM system is configured and an appropriate policy is created for
implicated applications.
• Make sure that the introduction and configuration of the BIG-IP ASM system does not accidentally expose the organization
to non-compliance.
• Make sure that the BIG-IP ASM system is used to achieve commonly requested regulatory requirements that are not
specific to WAFs, where the BIG-IP ASM system can improve compliance or function as a compensating control for
security purposes.
These guidelines are limited to the configuration of the BIG-IP ASM system behavior and security policy.
Regulations that govern the overall device posture and administrative controls are not within the current scope of this document.
Examples of what is not covered include overall device hardening, multi-factor requirements for administrative access, and device
patching.
51
REGULATORY COMPLIANCE
Open Web Application Security Project Top 10
The following table lists BIG-IP ASM system components and capabilities that you may find useful when creating a security policy
to mitigate the listed vulnerabilities. Where applicable, the Policy Type that will automatically include the mechanism is listed in
parentheses.
52
REGULATORY COMPLIANCE
Payment Card Industry Data Security Standard 3.1
The current version of the PCI DSS 3.1 (this link sends you to an external site) lists WAFs as mechanisms which organizations can
use to satisfy section requirements. You should become familiar with the entire DSS; specifically, section 6.5 describes the
application vulnerabilities that developers should take particular care to guard their applications against.
The following table lists requirements and BIG-IP ASM controls that you may find useful when pursuing PCI DSS compliance.
Where applicable, the Policy Type that will automatically include the mechanism is listed in parentheses. This table is similar to
the OWASP Top 10 list. You can see OWASP resources and related materials to improve the security of web applications when
pursuing PCI DSS compliance.
53
REGULATORY COMPLIANCE
Payment Card Industry Data Security Standard 3.1
Attack signatures
Meta character restrictions (Enhanced or Comprehensive)
6.5.1 Injection flaws Parameter length restrictions
Attack signatures
6.5.2 Buffer overflows Length restrictions (Fundamental or Comprehensive)
Session Tracking
Attack signatures (Forceful browsing)
File types (Fundamental)
URL (Enhanced)
6.5.8 Improper Access Control URL flows (Comprehensive)
* Specific requirements regarding SSL/TLS are new in PCI DSS 3.1. Specifically, the PCI DSS prohibits the use of SSL and TLS
version 1.0. For more information, see SSL Traffic Management in BIG-IP System: SSL Administration.
54
REGULATORY COMPLIANCE
Health Information Portability and Accountability Act
Consideration Recommendation
Logging. By default, the BIG-IP ASM system may log Define all parameters that may include cardholder
cardholder data. This may contribute to data leakage. data as Sensitive to prevent the values from being
logged. For more information, see Adding Entities to a
Security Policy in BIG-IP Application Security Manager:
Implementations.
RFC compliance. The PCI DSS does not mandate that Configure RFC compliance to minimize vulnerabilities.
applications must comply with Requests for Comments
(RFC). However, non-compliant applications are vulnerable to
more threats.
Cardholder data leakage. The PCI DSS requires that Use Data Guard.
organizations ensure that cardholder data, such as social
For more information, see Protecting Sensitive Data with
security and credit card numbers, not be exposed in web
applications. Data Guard in BIG-IP Application Security Manager:
Implementations.
Evasion techniques. The BIG-IP ASM system normalizes Complete an evasion techniques policy audit
inputs and blocks requests using common evasion
For more information, Configuring Security Policy
techniques. Make sure that evasion techniques are enforced.
Also make sure that when a technique is allowed to Blocking in BIG-IP Application Security Management:
enable application functionality that it does not expose the Implementations.
application to additional risk.
PCI report
The BIG-IP ASM system includes a PCI report that you can run to help assess whether a given security policy is providing
adequate controls for an application. Compliance is defined as properly securing the application. The PCI report is a useful data
point, but must be augmented by testing the application with web application vulnerability scanners, manual testing of suspected
sections of an application, and consultation with your organization’s PCI auditors.
55
REGULATORY COMPLIANCE
Health Information Portability and Accountability Act
• Auditing and accounting all access to PHI and the systems that manage PHI.
• Ensuring that PHI is properly encrypted at all times, both during transmission and at rest.
• Disclosing any breach that compromises PHI in an accurate, complete, and timely manner.
The following table lists the requirements and BIG-IP ASM controls that you may find useful when pursuing HIPAA compliance.
Where applicable, the Policy Learning type level that will automatically include the mechanism is listed in parentheses.
Logging. By default, BIG=-IP ASM may Define all parameters that may include cardholder
incorrectly log PHI data which could lead to data data as Sensitive to prevent the values from being
leakage. logged.
56
REGULATORY COMPLIANCE
National Institute of Standards and Technology
Auditing. HIPAA is specifically concerned with BIG-IP Audit Logging BIG-IP ASM Change
“who accessed what, when, and how.” This Logging Session Tracking
includes comprehensive logging of all policy
changes and configuration changes to security
devices in the environment.
Another part of NIST regulations requires that your BIG-IP system is securely hardened. For more information, see the NIST
Special Publication 800-53 in DevCentral.
The following table lists the requirements and BIG-IP ASM controls that you may find useful when pursuing NIST compliance.
Where applicable, the Policy Learning type level that will automatically include the mechanism is listed in parentheses.
Protocol Compliance On the Policy Settings page, enable HTTP protocol compliance checks to allow the
BIG-IP ASM system to enforce proper usage of the HTTP protocol, limiting automated
and other non-browser clients from accessing the web application.
Evasion Techniques On the Policy Settings page, enable evasion techniques to allow the BIG-IP ASM
system to find attempts to circumvent scanning and matching mechanisms, enhancing
the BIG-IP ASM system capabilities in enforcing security on the application.
Login Enforcement and Configure the login page(s) for the application.
Session Tracking
Enable Session Tracking and Login Enforcement. This allows the BIG-IP ASM
system to control which parts of the application are accessible only after a user
successfully logs in.
57
REGULATORY COMPLIANCE
National Institute of Standards and Technology
Brute Force Protection After the login pages are configured, add Brute Force Protection to your policy to
make sure that authenticated users are not using brute-forced credentials.
Attack Signatures Attack signatures are enabled by default. The policy finds and enforces controls
for attempts to access predictable resources, such as active content libraries and
administrative folders.
File Types, URLs, and Enable Policy Builder to learn and populate a security policy, inspect traffic (requests
Parameters and responses), and build the application tree. This enables the BIG-IP ASM system to
enforce the policy and block access to URLs not specifically added and allowed during
the policy-building process.
You can choose to populate your policy with these application elements either
automatically or manually.
58
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
COMMON DEPLOYMENT TOPOLOGIES
Platforms and licenses
This chapter provides an overview of the available the BIG-IP ASM system platforms and several common topology options,
including considerations for each. Specific and detailed configuration instructions are outside the scope of this document, but
may be found in articles and manuals on AskF5 and by searching DevCentral.
• BIG-IP VIPRION
Platform choice determines the availability of topologies and scaling options. There are several factors to consider when you are
deciding on the appropriate platform, include the following:
• Number of applications
• Policy-building methods
• Deployment environment (traditional data center, cloud, or private or public hybrid cloud)
• As part of the "Best" bundle of the Simplified “Good/Better/Best” licensing model or as an add-on license to BIG-IP LTM.
Hardware appliances
The BIG-IP ASM system is commonly deployed with Device Service Clustering, as a redundant system. However, other
deployment configurations are available. For more information, see BIG-IP Device Service Clustering: Administration.
60
COMMON DEPLOYMENT TOPOLOGIES
Platforms and licenses
Hardware sizing
The BIG-IP ASM system performs best on hardware devices that are properly sized for the protected applications, and that have
the following:
• Enough available RAM, particularly when using traffic learning on multiple applications
Upgrade hardware
Within BIG-IP hardware appliance series, each appliance is available in two models, which differ in CPU, SSL capacity, and other
characteristics:
Using a software license, you can upgrade most BIG-IP hardware appliances from a base appliance to a scale-up model in that
series. For most appliance series, you can purchase the base model and later increase performance by purchasing the scale-up
model. For example, if you purchased a 5050, using a software license key you can upgrade that model to a 5250, which nearly
doubles the capacity of the platform.
F5 FIPS models
Some F5 hardware appliances are available in a FIPS model for organizations storing their SSL/TLS private keys in a certified
Hardware Security Module (HSM). F5 FIPS models offer FIPS 140-2 level 2 compliance and also an interface to network HSMs
from Thales and Safenet (These links send you to external sites.)
61
COMMON DEPLOYMENT TOPOLOGIES
Platforms and licenses
vCMP support
Some hardware appliances support F5 vCMP virtualization technology to allow multiple virtual BIG-IP instances on a single
platform. A vCMP guest instance functions identically to a hardware appliance for the topologies described, as long as adequate
resources are assigned to the guest instance.
The BIG-IP ASM system can be deployed in cloud environments or as a virtual appliance on a variety of hypervisors. (To find
supported hypervisor types and versions, see the Virtual Edition documentation for your version.)
• Your environment requires rapid deployment, high levels of instantiation, or mobile deployment.
Capacity concerns
Most applications protected by the BIG-IP ASM system are encrypted with SSL/TLS. F5 recommends that you carefully consider
capacity.
A virtual edition is licensed to perform up to 500 SSL TPS for 2048-bit keys per vCPU allocated to the virtual appliance. Actual
TPS varies depending on the type and speed of the CPUs.
Depending on your license, you can allocate up to eight vCPUs. Applications that require high volumes of SSL/TLS traffic may
require either cryptographic offload (hybrid topology for example) or scaling the Virtual Edition appliances using a pool topology
or clustering.
Additionally, each Virtual Edition appliance is available in a variety of throughput levels, from 25Mb/sec to10Gb/sec, depending on
hypervisor. You can easily upgrade these throughput levels. When allocating disk space, CPU, and RAM, you can increase the
resources, as available, and increase the capacity and performance of each BIG-IP ASM virtual appliance.
For more information, see the AskF5 article SOL14810: Overview of BIG-IP VE license and throughput limits and BIG-IP Virtual
Edition Datasheet.
VIPRION
62
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
VIPRION is an F5 scalable chassis and blade platform. The platform presents multiple blades as a single logical device, to scale
rapidly and without disruption through the installation of additional blades. Since flow on any blade can be processed on the
computing resources for that blade or any other blade, the design provides robust processing power for a BIG-IP ASM
deployment.
The VIPRION platform is a frequent choice to protect high performance and high capacity applications, or to protect a large
number of applications.
vCMP support
With an optional, additional license, VIPRION supports F5 vCMP virtualization technology to allow multiple BIG-IP instances on a
single platform. In examples provided in this chapter, a vCMP guest instance can function identically to a hardware appliance for
the topologies described, as long as adequate resources are assigned to the guest instance.
Sizing
The BIG-IP ASM system performs best on VIPRION systems offering the following:
• Enough available RAM, particularly when using traffic learning on multiple applications
• Single-tiered is the most common topology. It involves deploying the BIG-IP ASM system in a simple active-standby
device pair, with protected application traffic directed to the active unit.
• Multi-tiered involves deploying multiple BIG-IP ASM appliances in parallel with traffic steered to BIG-IP ASM devices
through BIG-IP LTM appliances.
• Hybrid involves deploying BIG-IP ASM VE in a distributed topology, combined with VIPRION or hardware appliances,
63
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
Modes
You can deploy the BIG-IP ASM system in either routed mode (with or without SNAT) or in a one-armed mode (with SNAT).
You can configure both modes at the same time on a single BIG-IP system, on an app-by-app basis.
Note Requests and responses must go through the BIG-IP system. This
means that if you do not use NAT on the source IP address of the client, the
default gateway of the server needs to be the BIG-IP system. If you use
SNAT for all traffic from the client to an IP address of the BIG-IP system, all
responses will be sent back to the IP. To keep track of the original client IP
address, you can enable the X-Forwarded-For feature of the HTTP profile.
This adds the client IP address to the HTTP header that was sent to the web
server.
Routed mode
In route mode, the BIG-IP ASM system is in the routing path of the web servers, and all traffic to the server flows through the
system.
64
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
• Servers detect the actual client IP address in the IP header for security and logging purposes. Since all communication
traverses the BIG-IP system, there are no alternate, unprotected routes to the protected applications.
• The BIG-IP system must be configured to allow administrative and non-application traffic.
• Response traffic must be routed through the BIG-IP system, you usually accomplish this by setting the default gateway of
the web server to the floating self-IP of the BIG-IP system.
One-armed mode
In one-armed mode, only application traffic flows through the BIG-IP ASM system, and the server-side connection uses a SNAT.
The BIG-IP ASM appliance is logically in line with the web application traffic flow, but not physically in line with all traffic to and
from the web servers.
65
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
Note Requests and responses must go through the BIG-IP system. This
means that if you do not use NAT on the source IP address of the client, the
default gateway of the server needs to be the BIG-IP system. If you do use
SNAT for all traffic from the client to an IP address of the BIG-IP system, all
responses will be sent back to the IP. To keep track of the original client IP
address, you can enable the X-Forwarded-For feature of the HTTP profile.
This adds the client IP address to the HTTP header that was sent to the web
server.
• Only application traffic is sent through the BIG-IP system, which reduces traffic traversing the device.
• Servers detect the IP address of the BIG-IP system in the TCP/IP header, which may complicate logging.
66
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
• There is more than one path to the protected application. You need additional security controls such as firewalls to ensure
that malicious users do not access the application.
Single-tiered topology
Combining BIG-IP LTM and BIG-IP ASM on a single BIG-IP platform has several advantages from an architectural perspective,
such as:
Depending on project requirements, you may not need BIG-IP LTM features. In this case, you can deploy the BIG-IP ASM system
only. (This is unlikely. Most will need BIG-IP LTM.)
Multi-tiered topology
BIG-IP LTM load balances to multiple BIG-IP systems. Traffic terminates on the BIG-IP LTM where the BIG-IP ASM devices are
configured in a pool.
• You do not have to change licensing or the virtual server profile configuration on the load balancer.
• You can add a BIG-IP ASM to or remove a BIG-IP ASM system r from the pool without changing the network
infrastructure.
• BIG-IP ASM and BIG-IP LTM software versions do not need to match.
• You can use the BIG-IP VE ASM to alleviate WAF processing, which is CPU-intensive.
• You can deploy BIG-IP ASM systems in an N+1 redundant system configuration.
BIG-IP LTM uses a virtual server with a pool assigned. The pool members are virtual servers of the back-end BIG-IP ASM
systems.
67
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
• The system uses cookie persistence (Cookie insert) on the front-end BIG-IP LTM system. This means SSL needs to be
terminated on the front-end BIG-IP LTM.
• The system uses only L7 monitors on the front-end because L4 or ICMP monitors check only the state of the back-end
BIG-IP ASM virtual servers and not the real application.
• Use sync-only device-groups on BIG-IP ASM stand-alone systems to ensure that the BIG-IP ASM policy is synchronized
among all back-end BIG-IP ASM members.
BIG-IP ASM systems are behind BIG-IP LTM, so statistics on the BIG-IP ASM system are individual, per stand-alone instance.
The same is true for BIG-IP ASM event logs; therefore F5 recommends that you use a central logging system if you need a
centralized view of all event log data.
• On BIG-IP ASM systems, Auto Last Hop should be disabled on a per virtual server basis. Otherwise Mac Masquerade
needs to be configured on BIG-IP LTM to ensure seamless failover.
In this configuration, you can size the appropriate hardware appliance for L7 traffic management while scaling up capacity
requirements for the BIG-IP ASM system by adding resources to the virtual appliances, increasing the number of virtual
appliances, or by doing both. Doing so allows a flexible and efficient right-sizing of capacity.
The hybrid topology allows organizations with a robust and rapidly expanding virtual environment to use commodity computing
resources and to rapidly deploy new BIG-IP ASM instances that do not need to be shipped or physically installed after purchase.
Virtual Edition licensing pools and other volume and on-demand purchasing and licensing options allow you to simply deploy
another instance from a pool of pre-purchased licenses on demand.
• Use commodity computing resources for computing-constrained tasks while using hardware acceleration for application
delivery tasks.
• Use hardware DDoS L3/L4 capabilities on physical devices, but scale L7 DDoS capabilities on commodity computing.
68
COMMON DEPLOYMENT TOPOLOGIES
Common topology options
• If virtual BIG-IP ASM systems are not also licensed for BIG-IP LTM, traffic must traverse BIG-IP LTM twice (or to another
tier of BIG-IP LTM) for distribution to the web server pools.
• SSL offload on hardware reduces VE load, but sends traffic unencrypted to the VE and to the servers. This does not apply
to all applications in all environments. Using OneConnect greatly reduces TCP overhead, improves traffic distribution, and
reduces impact of the topology's added built-in network latency.
• SSL offload with re-encryption performs much better on VE when you use ECC ciphers and certificates exclusively for the
back-end encryption, all the way through to the web servers.
• If you are offloading or bridging SSL at an external BIG-IP LTM, F5 recommends that you enable an HTTP compression
profile to perform hardware compression on the hardware model you choose to offload this workload at the outer tier. This
will improve the overall performance of BIG-IP ASM VEs.
• If VE appliances do not load balance to the web servers, traffic between BIG-IP LTM and BIG-IP ASM VE requires you to
use SNAT and/or Auto Last Hop. If the web servers need to detect the original client IP address in the TCP/IP header,
consider a different option.
• You can "re-SNAT" to the original client IP from a header. This requires you to enable X-Forwarded-For on the external
BIG-IP LTM virtual server, enable Trust XFF in BIG-IP ASM policies, and set up an iRule on the load balancing BIG-IP LTM
virtual server to use SNAT to return traffic to the original client IP address.
• With additional licensing, VE can perform crypto offload to a hardware appliance, a VIPRION system, or a third-party
network HSM platform.
Note The Crypto offload feature is outside the scope of this document. For
more information, see Implementing External Cryptographic Server Offload
with BIG-IP systems.
69
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
COMMON MANAGEMENT TASKS
Guidelines
You can deploy the BIG-IP ASM system with the following configuration types:
• Stand-alone
Multiple BIG-IP devices share the same BIG-IP version and configuration.
Multiple BIG-IP devices share a configuration, particularly specific application security policies.
Guidelines
Redundant systems guidelines
• A BIG-IP system can be a member of only one device group.
• All BIG-IP systems in a device group must use the same BIG-IP ASM version, including hotfix updates.
• BIG-IP systems in the device group synchronize application security configuration data and security policies, providing
consistent enforcement on all the devices. However, event logs, reporting, and learning suggestions are not synchronized.
• Policy Builder can run on only one system per security policy. When you set up Policy Builder on one member of a device
group, the policy is built on that BIG-IP system and then automatically updated on the other systems in the device group.
• The BIG-IP ASM system considers one VIPRION platform (with multiple blades) as one device. You need add only the
master blade to the device trust and group.
• You cannot use connection mirroring on virtual servers that have a BIG-IP ASM policy attached.
• You must have consistent system times across all units using network time protocol (NTP).
• For BIG-IP systems in a group, you should enable ports 22 and 443 for communication among self IPs and ports 1026
UDP and TCP for syncing between devices. Make sure to configure the Port Lockdown setting and use a self IP address
rather than the management IP address for configuration synchronization (ConfigSync).
• We also need ports 1026 UDP and TCP for syncing between devices. See AskF5 article SOL13250: Overview of port
lockdown behavior (10.x - 11.x).
71
COMMON MANAGEMENT TASKS
Update geolocation
• When troubleshooting ConfigSync issues on a redundant system, review the /var/log/ltm file.
For more information, see Synchronizing Application Security Configurations Across LANs (11.x) or Synchronizing Application
Security Configurations Across LANs in BIG-IP Application Security Manager: Implementations.
F5 publishes signature update files on a regular basis. You must establish a process to keep attack signatures updated and
manage the update process within the policies.
The easiest way to update attack signatures is using automatic delivery mode through scheduled or manual updates. However, for
air-gapped systems with no access to the Internet (either direct or via a proxy), use the manual delivery mode. Manual delivery
mode allows you to download the update file manually from F5 Downloads and then upload that file using the BIG-IP ASM
Configuration utility.
For more information, see Working with Attack Signatures in BIG-IP Application Security Manager: Implementations (BIG-IP 11.6)
or Updating signatures manually in BIG-IP Application Security Manager: Custom Signature Reference (BIG-IP 12.0). Also see
AskF5 article: SOL8217: Updating the BIG-IP ASM attack signatures.
If you update signatures to add protection or mitigation for a specific, newly identified vulnerability, after updating, decide whether
the new signature will be transitioned immediately into Enforced or if the Staging period will be allowed to proceed as defined in
staging settings.
Update geolocation
The BIG-IP ASM system can protect against attacks based on the geolocation of the source IP during a request. Geolocation data
is used to control the accessibility of requests in the Geolocation Enforcement page and to detect suspicious L7 denial-of-
service (DoS) attacks from specific geolocations. Geolocation data changes regularly, so F5 releases a monthly download based
on collected data.
You must manually update geolocation information using the TMSH utility on your BIG-IP system.
For more information, see AskF5 article: SOL11176: Downloading and installing updates to the IP geolocation database.
72
COMMON MANAGEMENT TASKS
Maintain IP intelligence database
Remove only the /shared/tmp/GeoIP.old/ path if the installation of all four RPM packages is successful, and you are able to
verify proper functionality by querying an IP address using the geoip_lookup tool.
In the BIG-IP ASM system, the IP intelligence database allows you to:
• Provide additional details for BIG-IP ASM scoring functionality to help better understand if a request is likely an attack (a
score of 4-5) or a false positive (a score of 1-2).
The IP intelligence database is updated very frequently, so the default minimum download interval is five minutes.
Note The IP intelligence database is very large and can take a long time to
download for the first time, depending on your connection. Later updates are
incremental and thus quicker to download and apply.
You can update the IP intelligence database using a direct IP connection or through an intermediate proxy.
Important DNS lookups on the BIG-IP system must first be configured for
the database to successfully download.
For more information, see Enabling IP Address Intelligence (BIG-IP 11.6) or Setting Up IP Address Intelligence Blocking (BIG-IP
73
COMMON MANAGEMENT TASKS
Maintain IP intelligence database
12.0) and AskF5 article: SOL13875: Managing IP reputations and the IP Address Intelligence database.
Verify updates
Once you've downloaded and installed updates to the IP intelligence database, you should verify the installation by checking the
last time an update was received.
1. Navigate to Security >> Application Security > IP Address > IP Address Intelligence.
To display date and time of updates using the TMSH utility at the command line
For more information, see AskF5 articles: SOL13776: Determining the IP intelligence subscription expiration date and SOL13653:
The IP Intelligence Service database cannot be updated.
1. Navigate to Security >> Application Security > IP Addresses > IP Address Intelligence.
3. Click Save.
74
COMMON MANAGEMENT TASKS
Back up your BIG-IP configuration information
For more information, see Setting Up IP Address Intelligence Blocking in BIG-IP Application Security Manager: Implementations.
Logs
IP intelligence functionality on the BIG-IP system is performed by the iprepd process, which logs to the /var/log/iprepd/
iprepd.log file.
You can use the Configuration utility to trigger backups, or you can use a central management system such as BIG-IQ or
Enterprise Manager. Only the configuration information is backed up.
Event logs, reporting, and learning suggestions are not backed up and cannot be saved from the local system. For this reason,
these items are also not synchronized between devices or blades in a cluster.
• Make sure you have a valid BIG-IP system license for that system.
For more information, see AskF5 article: SOL13945: The BIG-IP ASM MySQL database is not installed completely if the BIG-IP
ASM is not provisioned when the UCS is loaded.
To successfully install a user configuration set (UCS) archive file on a BIG-IP system, perform one of the following actions:
• Restore the UCS archive to the same system from which it was saved.
• Have the license associated with the serial number of a new system. To do so, contact F5 Technical Support.
Note F5 Technical Support will associate a license file with a new serial
number only on an as-needed basis, in the event of a Return Materials
Authorization (RMA).
75
COMMON MANAGEMENT TASKS
Back up your BIG-IP configuration information
• Save the license file prior to restoring the configuration from another system, and then copy the license file back.
• Install the UCS archive by using the the tmsh utility no-license option.
For more information, see AskF5 articles: SOL13132: Backing up and restoring BIG-IP configuration files (11.x - 12.x) and
SOL12880: Configuring a replacement BIG-IP device after a Return Materials Authorization.
76
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
TROUBLESHOOT BIG-IP ASM
Use platform logs
The following table describes the contents of each platform log related to the BIG-IP ASM system.
Log Description
/var/log/ltm Contains general BIG-IP LTM log entries, such as availability of pool members, high
availability, and config-sys entries.
/var/log/asm Contains critical messages from processes that the BIG-IP ASM system uses (mysql,
policy building engine, enforcer). Each process has its own log file under /var/log/ts
(see log, following).
/var/log/audit Contains audit trails for BIG-IP user activities such as failed login attempts and certain
security events involving HTTPS, SSH, or other configuration changes.
/var/log/ts/… Contains information about various BIG-IP ASM system daemons and policy building.
/var/log/pktfiler Contains results from implementation of packet filters and packet filter rules.
/var/log/dosl7 Contains BIG-IP ASM system DDoS event information such as attack started/stopped
and bot signature update status.
/var/log/icrd Contains entries for iControl API calls, their results, and failures.
/var/log/ REST API Java framework used by BIG-IP and BIG-IQ to communicate writing logs.
restjavad.0.log Log entries include communication attempts and failures, such as SSH handshake
failures, certification, and authentication failures, and time skews.
/var/log/tmm[0…] Contains traffic events, such as unexpected resets, DDoS drops, and other events.
Typically very large. File should be analyzed only with F5 support assistance.
You can configure the logging level for most platform logs at System\Logs\Configuration\Options.
78
TROUBLESHOOT BIG-IP ASM
Check BIG-IP ASM system health
For detailed information on core BIG-IP ASM services, and the impact to the BIG-IP ASM system operation if the service is not
running, see the AskF5 article SOL14020: BIG-IP ASM daemons (11.x).
79
TROUBLESHOOT BIG-IP ASM
Bypass BIG-IP ASM
Accept
Ranges: bytes Content
Length: 376
Keep
Alive: timeout=300, max=500 Connection: Keep
Alive
ContentType: text/html; charset=UTF8 SetCookie:
S01425764=01ae97ff1e19f24a9b73757578683232de31fec9e054b6f04b167d6a7d88f4f7333871255d;
Path=/
<html>
...
...
</html>
For more information, see the AskF5 article: SOL6850: Overview of BIG-IP ASM cookies.
iHealth is a hosted application that parses a qkview file. The qkview provides a running snapshot of your BIG-IP system with
up-to-the-minute configuration and diagnostic information. You can download a qkview from your BIG-IP system and then upload
the file to the iHealth system.
For more information, see iHealth in the F5 BIG-IP TMOS: Operations Guide.
Starting in BIG-IP ASM 10.2.3, you can configure the following system variables using the following Configuration utility
commands:
• bypass_upon_load
• bypass_upon_asm_down
For more information, see SOL15093: The BIG-IP ASM system bypass_upon_load and bypass_upon_asm_down variables
should not be enabled.
If you enable the bypass_upon_load variable (set the value to 1), web application traffic bypasses the the BIG-IP ASM system
system when there are insufficient resources for BIG-IP ASM service.
80
TROUBLESHOOT BIG-IP ASM
Handle unexpected HTTP responses
If you enable the bypass_upon_asm_down variable (set the value to 1), web application traffic bypasses the BIG-IP ASM system
when any of the following conditions occur:
• BIG-IP ASM service is restarted; traffic bypasses the BIG-IP ASM system from the time the BIG-IP ASM service is down
until the service resumes processing.
• BIG-IP ASM service performs a core dump; traffic bypasses the BIG-IP ASM system until the BIG-IP ASM service resumes
processing.
If you enable either or both of the system variables, all web application traffic that is protected by BIG-IP ASM security policies is
no longer directed through the BIG-IP ASM system for security checks when BIG-IP ASM service experiences the previously-
described conditions; traffic is forwarded directly to the origin web servers. As a result, the web application may be at risk of
security threats and false positives.
Caution F5 recommends that you enable these system variables with careful
consideration to the security impact on your application environment.
The following flowchart shows the steps you can follow to decide whether the BIG-IP ASM system is processing an HTTP
response correctly:
81
TROUBLESHOOT BIG-IP ASM
Handle unexpected HTTP responses
82
TROUBLESHOOT BIG-IP ASM
Handle unexpected HTTP responses
Application is broken.
Page is blank.
Response is blocked.
Finding Connection is reset.
Action Find out if the BIG-IP ASM system is causing the problem.
Question Does the request trigger the BIG-IP ASM blocking response page on the HTTP client?
NO Go to step 2.
Application is broken.
Page is blank.
Response is blocked.
Connection is reset.
Finding BIG-IP ASM blocking response page is not displayed on HTTP client.
Enable Log All Requests in event log on virtual server running the BIG-IP ASM system (see to
BIG-IP ASM Event Logging ).
Try to match the HTTP request in question with the event log. (See Capture HTTP request/
Action response.)
YES Go to step 4.
Finding HTTP request does not arrive at the BIG-IP ASM system.
83
TROUBLESHOOT BIG-IP ASM
Handle unexpected HTTP responses
Finding Matched HTTP request appears in the BIG-IP ASM event log.
Action Review the logged request by selecting the HTTP request in the event log.
Question Does the request log show that the request was blocked?
NO Go to step 5.
Actions For iRule examples, see Wiki: iRules API on DevCentral (login required).
Question Does the issue continue after the removal of BIG-IP ASM security policy?
NO Go to step 7.
84
TROUBLESHOOT BIG-IP ASM
Monitor performance
Finding Request is blocked by the BIG-IP ASM system. Possible false-positive violation.
Action Tune your BIG-IP ASM security policy. See Policy Tuning and Enhancement.
Monitor performance
Performance can be monitored in several ways. You can use performance graphs, iHealth, or the top command.
Performance graphs
The BIG-IP system provides performance graphs in the Configuration utility. Navigate to Statistics >> Performance.
85
TROUBLESHOOT BIG-IP ASM
Monitor performance
The graphs show historical running performance data for up to one month. In BIG-IP 12.0 and later, the BIG-IP system also
provides real-time dashboard style performance analytics. Navigate to Statistics >> Analytics : ASM Resources.
86
TROUBLESHOOT BIG-IP ASM
Monitor performance
These graphs include CPU Utilization, Memory Utilization, and Bypass Information.
Regularly check these graph to monitor the overall health and capacity of the BIG-IP system. They can show early signs of
potential issues, allowing you to act on problems before they occur.
iHealth
iHealth provides an alternative for viewing RRD based performance graphs, and it is easy to compare performance data between
different BIG-IP ASM systems, and snapshots of different time periods. iHealth provides heuristic diagnostics based on log
messages and statistical data to help a customer identify performance issues.
87
TROUBLESHOOT BIG-IP ASM
Monitor CPU usage
top command
Table of processes (top) is a Linux/Unix CLI tool for process reporting, and is used for troubleshooting CPU and memory
performance issues on the BIG-IP ASM system.
You can start top in interactive mode and watch the performance data change.
Normal CPU usage at the peak of any CPU/thread on the system should not exceed 75 percent under normal traffic volume.
However, some administrative processes, such as those related to learning, may cause higher loads on the last CPU core. This is
not generally a problem on most platforms that use process scheduling and process separation across CPU cores.
Note For BIG-IP 11.5.0 and later, on systems with a CPU using Hyper-
Threading Technology, tmm runs on half of the cores/threads on the system.
For more information, see the AskF5 article: SOL15003: Data plane and
control plane tasks use separate logical cores when the BIG-IP system CPU
uses Hyper-Threading Technology.
If CPU usage is too high, you need to identify the process that is causing the problem. Use the performance graph to view CPU
usage per core/thread and see whether CPU over-use occurs on multiple cores/threads or just one.
Some important BIG-IP ASM-related processes such as tmm or bd are multi-threaded and tend to spread their threads across
all even-numbered CPU cores. If you find excessive CPU usage on all even-numbered cores, these multi-threaded processes are
likely the problem.
The top command provides dynamic CPU usage by each process; using this command, you can display additional threads and
cores information.
5. Type f
88
TROUBLESHOOT BIG-IP ASM
Monitor CPU usage
6. Type j.
89
TROUBLESHOOT BIG-IP ASM
Troubleshoot memory usage
1. Navigate to Statistics >> Module Statistics: Local Traffic >> Virtual servers.
2. See the data in the CPU Utilization Avg. and ASM CPU Utilization Avg. columns.
For performance reasons, the BIG-IP ASM traffic processing daemon, bd, does not release memory back to the operating
system.
Typical bd process is as follows:
2. The bd process immediately loads the configuration and allocates initial buffers.
This process uses a small amount of resident memory.
3. If not memory is available, the bd process sends a request to the system to allocate new memory for a fresh
buffer.
5. On the first day in production, bd memory increases and peaks as traffic throughput increases.
The following graphs show typical BIG-IP ASM system memory use over time with respect to traffic.
90
TROUBLESHOOT BIG-IP ASM
Troubleshoot memory usage
Figure 8.4 BIG-IP ASM memory use over time with respect to traffic
To identify a potential memory leak in a BIG-IP ASM process, use the top command to collect continuous snapshots for a
particular interval, and monitor a process's memory use.
For example the following example will capture 60 iterations at 10 second intervals and log the output to /var/tmp/top_output.
txt.
top –b –n 60 –d 10 > /var/tmp/top _ output.txt
Using these settings, the capture will take 10 minutes (60 x 10 seconds).
91
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
OPTIMIZE THE SUPPORT EXPERIENCE
Professional services
F5 strives to continuously improve its support service and create closer customer relationships. Designed to provide assistance
with specific break-fix issues and ongoing maintenance of F5 products, F5 professional support services are consistently
high-quality. This means:
• Customers are treated with respect and given every consideration possible.
Some technical support issues arise from configuration errors, either within the BIG-IP system or with other devices in the
network. In other cases, a misunderstanding of BIG-IP capabilities can lead to support questions and issues. Although F5 does
everything possible to prevent defects in BIG-IP hardware and software, these issues may still arise periodically. Regardless of
the root cause of a problem, the goal is to resolve any issues quickly.
The F5 Standard and Premium support offerings include remote assistance from F5 Network Support Engineers, both online and
over the phone.
Premium Plus customers receive priority status at F5, with fast, easy access to a dedicated team of senior-level, F5-certified
Network Support Engineers and a Service Delivery Manager.
Professional services
Take advantage of the full range of F5 Consulting Services to help you design, customize, and implement a solution that is right
for your IT infrastructure and supports your business goals.
93
OPTIMIZE THE SUPPORT EXPERIENCE
F5 certification
You can request specific support services by using either of the following forms:
F5 certification
F5 Certified! exams test the skills and knowledge necessary to be successful when working with today’s application delivery
challenges. Our technically relevant and appropriate exams deliver consistently reproducible results that guarantee excellence in
those that achieve certification.
Certification levels
The F5 certification program is progressive with the four levels – Administrator, Specialist, Expert, and Professional– building on
the skills and knowledge demonstrated on previous exams.
The starting point for all certifications; a certified BIG-IP administrator has basic network and application knowledge to be
successful in application delivery.
The Technology Specialist certification assures employers that candidates are fully qualified to design, implement, and maintain a
specific product and its advanced features.
The Solution Expert certification focuses on how F5 technologies combine with industry technology to create real-world business
solutions.
The Application Delivery Engineer certification exam and requirements are still under development.
The Application Delivery Architect certification exam and requirements are still under development.
94
OPTIMIZE THE SUPPORT EXPERIENCE
Review self-help options
Certificate expiration
F5 certifications are valid for two (2) years. Three months before the expiration date, the certificate holder becomes eligible for
recertification and can register for the necessary exam. Only the last exam in the highest level certification achieved needs to be
retaken.
Get involved
There are a several ways to get involved with the F5 certification beta program:
• Beta participation. Interested in taking our Beta exams? Send an email to [email protected] to learn more.
• Exam development. Send an email to [email protected] if you’re interested in helping us create our F5 Certified!
exams.
• LinkedIn community. Join us on LinkedIn (this link sends you to an external site) for answers to frequently asked questions,
community developed resources, and more.
• Downloads
• Security updates
• BIG-IP iHealth
• TechNews
• RSS Feeds
• DevCentral
95
OPTIMIZE THE SUPPORT EXPERIENCE
Review self-help options
AskF5
AskF5 (support.f5.com) provides thousands of articles to help you manage your F5 products more effectively, and should be the
first resource you choose when you need support. Step-by-step instructions, downloads, and links to additional resources give
you the means to solve known issues quickly and without delay, and to address potential issues before they become reality.
Whether you want to search the knowledge base to research an issue, or you need the most recent news on your F5 products,
AskF5 is your source for:
• General articles
• Known issues
• Security advisories
• Recommended practices
• Troubleshooting tips
• How-to documents
• Changes in behavior
• Hotfix information
Downloads
Downloads are available from the F5 website. It is highly recommended that your F5 software is kept up-to-date, including
hotfixes, sSecurity updates, OPSWAT updates, BIG-IP ASM signature files, and geolocation database updates. All software
downloads are available from F5 Downloads (downloads.f5.com).
Security updates
You can receive timely security updates and BIG-IP Application Security Manager (BIG-IP ASM) attack signature updates from
F5. When remote vulnerabilities are discovered, F5 implements, tests, and releases security hotfixes for any vulnerable supported
version, and sends an email alert to the F5 Security mailing list. F5 encourages customers with an active support account to
subscribe to this list. For more information, see AskF5 article: SOL4602: Overview of the F5 security vulnerability response policy.
96
OPTIMIZE THE SUPPORT EXPERIENCE
Review self-help options
iHealth
iHealth is among the most important preventative tools to verify the proper operation of your BIG-IP system. This diagnostic
viewer ensures that hardware and software are functioning at peak efficiency, and helps detect and address issues that may
potentially affect F5 systems. iHealth is not integrated within the BIG-IP system. This tool is hosted by F5 at f5.com/support/tools/
ihealth and can be accessed with any web browser.
F5 recommends you generate an iHealth qkview file on the BIG-IP system and upload it to iHealth on a weekly basis in order to
benefit from the many regularly occurring diagnostic updates. Uploading qkview files to iHealth also provides F5 technical
support with access to your qkview files if you open a support case.
By reviewing iHealth output, many of the issues commonly experienced by customers can be resolved without the need for
opening a support case with F5.
For more information on running iHealth diagnostics, see iHealth in the TMOS Operations Guide.
TechNews
AskF5 provides two TechNews email publications to help keep administrators up-to-date on various F5 updates and other
offerings:
TechNews Weekly eNewsletters. Up-to-date information about product and hotfix releases, new and updated articles, and new
feature notices.
TechNews Notifications. Do you want to get release information, but not a weekly eNewsletter? Sign up to get an HTML
notification email any time F5 releases a product or hotfix.
Security Alerts. Receive timely sSecurity updates and BIG-IP ASM attack signature updates from F5.
To sign up for the TechNews mailing lists, go to the AskF5 Publication Preference Center. Enter your email address and select the
publications you want to receive, and click Submit.
The Recent Additions and Updates list is also published over RSS. You can configure feeds that pertain to specific products,
product versions, and/or document sets. You can also aggregate multiple feeds into your RSS Reader to display one unified list of
all selected documents.
To generate an RSS feed, see AskF5 article: SOL9957: Creating a custom RSS feed to view new and updated documents.
97
OPTIMIZE THE SUPPORT EXPERIENCE
F5 Global Training Services
DevCentral
DevCentral (devcentral.f5.com) is an online forum of F5 employees and customers that provides technical documentation,
discussion forums, blogs, and media, related to application delivery networking. DevCentral is a resource for education and
advice on F5 technologies, and is especially helpful for iRules and iApps developers. Access to DevCentral is free, but registration
is required. As a DevCentral member, you can:
• Contribute to “wikis.”
In-person courses
F5 courses are available in multiple training facilities across five continents. Each course combines instructor presentations,
classroom discussions, and interactive labs. The hands-on learning environment helps provide a fast track to accomplishing your
goals.
F5 Training Programs and Education (f5.com/education/training) provides links to course schedules, pricing, and registration
details. This page also has information about alternative training solutions such as virtual and web-based training for those who
98
OPTIMIZE THE SUPPORT EXPERIENCE
Engage Support
cannot attend training in person. You can also find out more about the F5 Professional Certification or a non-accredited
Application Delivery Networking Certificate through F5.
Engage Support
F5 Technical Support is designed to provide support for specific break-fix issues for customers with active support contracts. For
more information about F5 scope of support, see Support Policies.
• Online: You can open a support case at the F5 WebSupport Portal. Click Register for an Account to access to the
WebSupport Portal.
• By phone: Phone numbers are provided in the General contact numbers section below. It is strongly recommended that
you contact F5 by phone if you have a Sev1 or Sev2 case, as defined in Open a support case .
Contact numbers
Standard, Premium, and Premium Plus Support customers can open and manage cases by calling one of the contact numbers
listed below.
North America
Outside North America, Universal Toll-Free: (800) 11 ASK 4 F5 or (800 11275 435)
Egypt: 0800-000-0537
99
OPTIMIZE THE SUPPORT EXPERIENCE
Engage Support
Greece: 00-800-11275435
Indonesia: 001-803-657-904
Israel: 972-37630516
Malaysia: 1-800-814994
Philippines: 1-800-1-114-2564
Singapore: 6411-1800
Taiwan: 00-800-11275435
Thailand: 001-800-12-0666763
Vietnam: 120-11585
T Before opening a support case with F5, you should consult the following resources:
• Deployment guides and white papers provide information about specific deployment configurations.
• AskF5 Knowledge Base provides many articles including known issues, how-to guides, security advisories, release notes,
and general information about products. Many of the issues customers encounter are already documented on AskF5.
• iHealth enables customers to upload qkview configuration snapshots in order to verify operation of any BIG-IP system.
100
OPTIMIZE THE SUPPORT EXPERIENCE
Engage Support
• The serial number or base registration key of the specific BIG-IP system requiring support. For more information, see
AskF5 article: SOL917: Finding the serial number or registration key of your F5 device.
• A full description of the issue: A clear problem statement is the best tool in helping to troubleshoot issues. Your description
should include as much of the following information as you can provide.
• Occurrences and changes: The date and times of initial and subsequent recurrences. Did this issue arise at
implementation or later? Were there any changes or updates made to the BIG-IP system prior to the issue arising? If so,
what were they?
• Symptoms: Ensuring your list of symptoms is as detailed as possible will give more information for support personnel to
correlate with.
• Scope of the problem: Note whether the problem is system-wide or limited to a particular configuration feature, service, or
element (such as VLAN, interface, application service, virtual server, pool, and others).
• BIG-IP component: The feature, configuration element, or service being used when the problem occurred (such as
Session Tracking, Signatures, DoS/DDos protection, Policy Builder, or others).
• Steps to reproduce: The steps to reproduce the problem as accurately and in as much detail as possible. Include
expected behavior (what should happen) as well as actual behavior (what does happen).
• Environment: Current usage of the system. (Is this unit in production? If so, is there currently a workaround in place?)
• Changes: System changes made immediately prior to the problem’s first occurrence. This may include upgrades,
hardware changes, network maintenance, and other changes. Have any changes been made to resolve the problem? If
so, what were they?
• Issue Severity: A description of the impact the issue is having on your site or Case severity
• Severity 1: Software or hardware conditions on your F5 device are preventing the execution of critical business
activities. The device will not power up or is not passing traffic.
• Severity 2: Software or hardware conditions on your F5 device are preventing or significantly impairing high-level
commerce or business activities.
101
OPTIMIZE THE SUPPORT EXPERIENCE
Engage Support
• Severity 3: Software or hardware conditions on your F5 device are creating degradation of service or functionality in
normal business or commerce activities.
• Severity 4: Questions regarding configurations (“how to”), troubleshooting non-critical issues, or requests for product
functionality that are not part of the current product feature set.
• Contact and availability information including alternate contacts authorized to work on the problem with F5 Technical
Support. When there are more personnel available to work with F5 Technical Support, the resolution of your issue may be
expedited.
• A qkview file obtained while problem symptoms are manifesting. A qkview file of the system before the occurrence is also
useful. F5 recommends archiving qkview files regularly. For more information, see iHealth in the TMOS Operations Guide.
• Platform and system. Version and provisioned software modules of the affected system.
To locate platform and system information using TMSH at the command line
102
OPTIMIZE THE SUPPORT EXPERIENCE
Engage Support
To copy software version and build number information at the command line
2. Highlight and copy the output information and include it with your support case.
103
OPTIMIZE THE SUPPORT EXPERIENCE
Send information to Support
2. Highlight and copy the output information and include it with your support case.
Use of the WebSupport Portal requires a current support contract and registration on the F5 website (login.f5.com).
Once registered, you’ll receive an email within 24 hours letting you know your account has been enabled with WebSupport Portal
access.
4. Complete the Contact information portion of the page and then select I have a support contract and
need access to WebSupport.
104
OPTIMIZE THE SUPPORT EXPERIENCE
Collect BIG-IP ASM data
For example, if [email protected] has opened ticket C123456, he would log in to the dropbox.f5.com site using the following
information:
Username: C123456
Password: [email protected]
If [email protected] has opened ticket 1-12345678, he would log in to the dropbox.f5.com site using the following
information:
Username: 1-12345678
Password: [email protected]
For more information regarding uploading and downloading files using dropbox.f5.com, see AskF5 article: SOL2486: Providing
files to F5 Technical Support.
Important F5 Technical Support is the single point of contact for security vulnerability questions. For more information, see AskF5
article: SOL4602: Overview of the F5 security vulnerability response policy.
The asmqkview script automatically collects configuration and diagnostic information from BIG-IP ASM systems. The output
includes all data collected in qkview files and other data for BIG-IP ASM systems in a single file, which you can then provide to
105
OPTIMIZE THE SUPPORT EXPERIENCE
Collect BIG-IP ASM data
For more information, see AskF5 article: SOL6824: Overview of the asmqkview script.
You can export a security policy and save it in a file. The exported security policy can be used as backup, or you can import it
onto another system.
2. In the Active Security Policies list, select the security policy that you want to export, then click Export.
Note You can also export security policies from the Inactive Policies list using the same method.
• To save the security policy as an XML file, select Export security policy in XML format. To reduce the size
of the XML file, select the Compact format check box.
• To save the security policy as a policy archive file (.plc file), select Binary export of the security policy.
• If the security policy integrates with a vulnerability assessment tool, select the Include Vulnerability
Assessment configuration and data check box.
4. Click Export.
The system exports the security policy in the format you specified.
106
OPTIMIZE THE SUPPORT EXPERIENCE
Collect BIG-IP ASM data
For more information, see Importing and Exporting Security Policies in BIG-IP Application Security Manager: Implementations.
Important HttpWatch and Fiddler are commercial software and a license is required.
Example
In the following example, a Chrome browser is used to save a single HTTP request into a cURL command and the entire
transaction into an .har archive file.
1. Navigate to View > Developer > Developer tools > Network tab.
4. Copy as cURL.
7. Navigate to View > Developer > Developer tools > Network tab.
Important Information leakage may occur when capturing sensitive application transactions on production traffic.
107
OPTIMIZE THE SUPPORT EXPERIENCE
Collect BIG-IP ASM data
Important Information leakage may occur when capturing sensitive application transactions on production traffic.
• SOL6546: Recommended methods and limitations for running tcpdump on a BIG-IP system
• SOL7227: Considerations when using the tcpdump utility with tagged VLAN traffic
For more information, see AskF5 article: SOL4423: Overview of UCS archives.
Important A typical UCS archive contains user accounts, passwords, critical system files, and SSL private keys. However, you
can explicitly exclude SSL private keys from a UCS archive during the backup process. If your UCS archive contains SSL private
keys, you must store backup UCS archives in an environment that is as secure as where you store your private keys.
108
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
APPENDIX
Use Multiple Decoding Passes with Evasion Technique
Appendix
BIG-IP AAM dynamic caching integration
You can deploy both the BIG-IP ASM system and F5® BIG-IP® Application Acceleration Manager® (AAM) for a single web
application.
Considerations
The BIG-IP ASM system overrides the eligibility for caching entities that it inspects in the following instances:
• Frame cookies are either created or removed due to an issue such as dynamic parameter extraction.
• The system processes a request triggering policy tightening suggestions (file types, URLs, or parameters).
• The system processes requests for pages that have extractions configured (including pages with dynamic sessions).
• The system processes requests for pages that are within a Flow Access (including URLs embedded in the cookie and
logout URLs).
• Applying a BIG-IP ASM security policy invalidates the BIG-IP AAM cache.
The Policy Builder periodically applies a policy that invalidates the BIG-IP AAM cache. Use BIG-IP AAM only after automatic
learning is complete and disabled. When protecting websites where performance improvements are critical, you can also choose
a policy type (such as the rapid deployment policy template) that does not require continuous learning.
For more information, see AskF5 article SOL16565: Configuring a Web Acceleration profile for use with a BIG-IP ASM-enabled
virtual server (11.4.0 and later).
For more information, see Tracking User Sessions in BIG-IP Application Security Manager: Implementations.
You can locate the Multiple Decoding option by navigating to Policy > Blocking > Evasion Techniques.
110
APPENDIX
Use Multiple Decoding Passes with Evasion Technique
Note As part of the normalization process that BIGIP ASM uses, multiple decoding is performed whether or not the blocking
properties are enabled. You can enable blocking properties to alarm or block an evasion technique when one is detected.
You can configure the Multiple Decoding option to perform two to five passes.
The number of specified decoding passes determines how the system responds. It either flags the results as an evasion
technique, triggers an attack signature, or both.
When the blocking properties are not set for Multiple Decoding, the ability to identify signatures is reduced to the number of
encoded passes.
The following table shows the actions the BIG-IP ASM system takes on each of the decoding passes:
2 to 3 Triggers an evasion technique but will not trigger an attack signature if one exists
5 Triggers an attack signature if one exists, but does not trigger an evasion technique
For example, Multiple Decoding set to perform 3 decoding passes converts the following a%252fb string to a/b after the
second pass. On the third decoding pass, the system responds with the appropriate alarm or block action you have configured.
• On third pass, the system takes action. The encoding attempt of the characters a/b results in action specified
by the Learn, Alarm, and Block settings of the Evasion Technique Detected category on the Blocking
Policy page.
Using the previous string as an example within a URI, the string translates from hexadecimal to ASCII is as follows:
111
APPENDIX
Resource Materials
Hexadecimal ASCII
25 %
3C <
3e >
The following table shows the decoding results for this URI string, based on the number of passes configured:
Passes Result
The number of configured passes is not high enough for the system to check /nameandcolor.
asp?aaa=<SCRIPT> against the list of known attack signatures, which could possibly trigger an attack
signature.
4 Fourth decoding pass results in the system checking the fully decoded results against the known attack
signatures.
The system triggers both an evasion technique and an attack signature.
5 Fifth decoding pass results in the system triggering on the detected matching attack signature.
No evasion technique violation is reported.
Note A higher number of decoding passes impacts system performance. F5 recommends that you set blocking properties when
you use the lower settings (two to three passes).
Resource Materials
BIG-IP ASM product documentation
BIG-IP ASM product documentation provides step-by-step instructions for how to create a security policy and add available
protections.
112
APPENDIX
Resource Materials
AskF5 articles
The following articles contain information you may find useful.
Opening a support case SOL6825: Information required when opening a support case for
BIG-IP ASM
Updating BIG-IP ASM attack signatures SOL8217: Updating the BIG-IP ASM attack signatures
Using local traffic policies SOL15085 Overview of the Local Traffic Policies feature
Configuring the language encoding SOL6335 Overview of encoding language settings for BIG-IP ASM
Sending SNMP traps to communicate a blocked SOL7738 Configuring the BIG-IP ASM system to send SNMP traps
request and violation to communicate a blocked request and request violation
Redirecting response page to an external server SOL7825: Redirecting a blocking response support ID to an
external error page
Working with evasion technique violations SOL7929: Working with Evasion technique detected violations
Using the wildcard entity in the BIG-IP ASM system SOL8623: Using the wildcard entity in BIG-IP ASM
Understanding the BIG-IP ASM system and caching SOL14880: BIG-IP ASM may prevent object caching
Understanding the BIG-IP ASM system cookies SOL6850: Overview of BIG-IP ASM cookies
113
Help improve this guide
Please help F5 improve this guide by responding to a few questions about this chapter.
(Note: You must be viewing this document in Adobe Acrobat Reader or similar to use this form.)
Did this chapter answer all of your questions about the subject matter? Yes No
Did you find any errors pertaining to subject matter in this chapter? Yes No
If yes, please copy and paste the paragraph containing the error here:
Did you find non-subject-matter errors in this chapter (spelling, etc.)? Yes No
If yes, please copy and paste the paragraph containing the error here:
Send
LEGAL NOTICES
Notice
Legal Notices
Publication date
This document was published February 2016. Publication Number: BIG-IP ASMOps 01_0.
Copyright
Copyright © 2013-2016, F5 Networks®, Inc. All rights reserved.
F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for
the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license
is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically
described by applicable user licenses. F5 reserves the right to change specifications at any time without notice.
Trademarks
AAM, Access Policy Manager, Advanced Client Authentication, Advanced Firewall Manager, Advanced Routing, AFM, APM,
Application Acceleration Manager, Application Security Manager, ARX, AskF5, ASM, BIG-IP, BIG-IQ, Cloud Extender,
CloudFucious, Cloud Manager, Clustered Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN],
DNS Express, DSC, DSI, Edge Client, Edge Gateway, EdgePortal, ELEVATE, EM, Enterprise Manager, ENGAGE, F5, F5[DESIGN],
F5 Certified [DESIGN], F5 Networks, F5SalesXchange [DESIGN], F5Synthesis, f5Synthesis, F5Synthesis[DESIGN], F5
TechXchange [DESIGN], Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, GUARDIAN, iApps, IBR,
Intelligent Browser Referencing, Intelligent Compression, IPv6 Gateway, iControl, iHealth, iQuery, iRules, iRules OnDemand,
iSession, L7 RateShaping, LC, Link Controller, Local Traffic Manager, LTM, LineRate, LineRate Systems [DESIGN], LROS, LTM,
Message Security Manager, MSM, OneConnect, Packet Velocity, PEM, Policy Enforcement Manager, Protocol Security Manager,
PSM, Real Traffic Policy Builder, SalesXchange, ScaleN, Signalling Delivery Controller, SDC, SSL Acceleration, software designed
applications services, SDAC (except in Japan), StrongBox,
SuperVIP, SYN Check, TCP Express, TDR, TechXchange, TMOS, TotALL, Traffic Management Operating System, Traffix
Systems, Traffix Systems (DESIGN), Transparent Data Reduction, UNITY, VAULT, vCMP, VE F5 [DESIGN], Versafe, Versafe
[DESIGN], VIPRION, Virtual Clustered Multiprocessing, WebSafe, Silverline, and ZoneRunner, are trademarks or service marks of
F5 Networks, Inc., in the U.S. and other countries, and may not be used without express written consent.
All other product and company names herein may be trademarks of their respective owners.
Patents
This product may be protected by one or more patents. See the F5 Patents page (f5.com/about/guidelines-policies/patents).
Notice
THE SOFTWARE, SCRIPTING, AND COMMAND EXAMPLES ARE PROVIDED "AS IS," WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
115
LEGAL NOTICES
Notice
LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE, SCRIPTING AND COMMAND EXAMPLES, OR THE
USE OR OTHER DEALINGS WITH THE SOFTWARE, SCRIPTING, AND COMMAND EXAMPLES.
116