Chapter 1: Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP System Configuration
- Leveraging F5 Support Resources and Tools
Chapter 2: Traffic Processing with BIG-IP
- Identifying BIG-IP Traffic Processing Objects
- Understanding Profiles
- Overview of Local Traffic Policies
- Visualizing the HTTP Request Flow
Chapter 3: Web Application Concepts
- Overview of Web Application Request Processing
- Web Application Firewall: Layer 7 Protection
- Layer 7 Security Checks
- Overview of Web Communication Elements
- Overview of the HTTP Request Structure
- Examining HTTP Responses
- How F5 Advanced WAF Parses File Types, URLs, and Parameters
- Using the Fiddler HTTP Proxy
Chapter 4: Web Application Vulnerabilities
- A Taxonomy of Attacks: The Threat Landscape
- Common Exploits Against Web Applications
Chapter 5: Security Policy Deployment
- Defining Learning
- Comparing Positive and Negative Security Models
- The Deployment Workflow
- Policy Templates: Protection Starting Point
- Deployment Workflow: Using Advanced Settings
- Defining Logging Profiles
- Security Checks Offered by Rapid Deployment
- Defining Data Guard
Chapter 6: Policy Tuning and Violations
- Post-Deployment Traffic Processing
- How Violations are Categorized
- Violation Rating: A Threat Scale
- Defining Staging and Enforcement
- Defining Enforcement Mode
- Defining the Enforcement Readiness Period
- Defining the Learn, Alarm and Block Settings
- Defining Learning Suggestions
- Interpreting the Enforcement Readiness Summary
- Configuring the Blocking Response Page
Chapter 7: Attack Signatures and Threat Campaigns
- Defining Attack Signatures
- Creating User-Defined Attack Signatures
- Defining Simple and Advanced Edit Modes
- Defining Attack Signature Sets
- Understanding Attack Signatures and Staging
- Updating Attack Signatures
- Defining Threat Campaigns
Chapter 8: Positive Security Policy Building
- Defining and Learning Security Policy Components
- Defining the Wildcard
- Defining the Entity Lifecycle
- Choosing the Learning Scheme
- How to Learn: Never (Wildcard Only)
- How to Learn: Always
- How to Learn: Selective
- Reviewing the Enforcement Readiness Period: Entities
- Viewing Learning Suggestions and Staging Status
- Defining the Learning Score
- Defining Trusted and Untrusted IP Addresses
- How to Learn: Compact
Chapter 9: Securing Cookies and Other Headers
- The Purpose of F5 Advanced WAF Cookies
- Defining Allowed and Enforced Cookies
- Securing HTTP headers
Chapter 10: Visual Reporting and Logging
- Viewing Application Security Summary Data
- Building Application Security Reports Using Filters
- Viewing F5 Advanced WAF Resource Consumption
- Ensuring PCI Compliance: PCI-DSS 3.0
- Using the OWASP Compliance Dashboard
- Analyzing Requests using the Attack Expert System
- Local Logging Facilities and Destinations
- Viewing Logs in the Configuration Utility
- Defining the Logging Profile
- Configuring Response Logging
Chapter 11: Lab Project 1
Chapter 12: Advanced Parameter Handling
- Understanding the Need for Parameter Protections
- Understanding Where Parameters Appear
- Understanding Parameter Types and Definitions
- Understanding Parameter Levels
- Understanding Parameter Properties
- Understanding Static Content Value Parameters
- Understanding User Input Parameters
- Defining Dynamic Parameters
- Defining Dynamic Parameter Extraction Properties
- Defining Positional Parameters
- Understanding Sensitive Parameters
Chapter 13: Automatic Policy Building
- Overview of Automatic Policy Building
- Identifying Templates Which Automate Learning
- Defining Policy Loosening
- Defining Policy Tightening
- Defining Learning Speed: Traffic Sampling
- Defining Track Site Changes
Chapter 14: Web Application Vulnerability Scanner Integration
- Integrating Scanner Output
- Importing and Resolving Vulnerabilities
Chapter 15: Deploying Layered Policies
- Defining a Parent and Child Policies
- Layered Policy Deployment Use Cases
Chapter 16: Login Enforcement and Brute Force Mitigation
- Defining Login Pages for Flow Control
- Defining Brute Force Attacks
- Defining Credential Stuffing
Chapter 17: Reconnaissance with Session Tracking
- Defining Session Tracking
- Configuring Actions Upon Violation Detection
Chapter 18: Layer 7 DoS Mitigation
- Defining Denial of Service Attacks
- Defining the DoS Protection Profile
- Overview of TPS-based DoS Protection
- Configuring Stress-based Mitigation
- Defining Behavioral DoS Mitigation
- Mitigate Attacks Starting with the TLS Handshake
Chapter 19: Advanced Bot Defense
- Classifying Clients with the Bot Defense Profile
- Defining Bot Signatures
- Defining F5 Fingerprinting
- Defining Browser Verification
- Defining Device ID
- Defining Bot Defense Profile Templates
- Defining Microservices protection
- Mitigating Web Scraping
Chapter 20: Form Encryption using DataSafe
- What Elements of Application Delivery Are Targeted?
- Exploiting the Document Object Model
- Protecting Applications Using DataSafe
- Configuring a DataSafe Profile
Chapter 21: Review and Final Labs
- Final Lab Project (Option 1) – Production Scenario
- Final Lab Project (Option 2) – Managing Traffic with Layer 7 Local Traffic Policies