You are on page 1of 3

About header

normalization......................................................................
..................... 247
About default HTTP
headers............................................................................
..............247
Overview: Configuring HTTP
headers...........................................................................
248
Configuring HTTP
headers............................................................................
..... 248
Configuring the maximum HTTP header
length..................................................249
Implementation
Result.............................................................................
...................... 250
Changing Security Policy
Settings...........................................................................
............ 251
About security policy
settings...........................................................................
..............251
Editing an existing security
policy........................................................................251
Changing security policy
enforcement................................................................ 251
Adjusting the enforcement readiness
period.......................................................252
Viewing whether a security policy is case-
sensitive............................................ 252
Differentiating between HTTP and HTTPS
URLs............................................... 252
Specifying the response codes that are
allowed................................................. 253
Activating ASM iRule
events.............................................................................
.. 253
Allowing XFF headers in
requests.......................................................................254
Adding host
names..............................................................................
................255
Protecting against cross-site request forgery
(CSRF).........................................256
Configuring General ASM System
Options..........................................................................25
9
Changing your system
preferences........................................................................
....... 259
Adjusting system
variables..........................................................................
...................259
Incorporating external antivirus
protection..................................................................... 260
Creating user accounts for application
security............................................................. 261
Validating regular
expressions........................................................................
............... 262
Working with
Violations.........................................................................
................................ 263
About
violations.........................................................................
.....................................263
Viewing descriptions of
violations........................................................................2
63
Changing severity levels of
violations..................................................................263
Types of
violations.........................................................................
......................264
About violation
rating.............................................................................
.........................264
Investigating potential
attacks............................................................................
............ 265
Overview: Creating user-defined
violations....................................................................265
Creating user-defined
violations.........................................................................
.266
Enabling user-defined
violations.........................................................................
267
Sample iRules for user-defined
violations........................................................... 267
Deleting user-defined
violations.........................................................................
. 271
Exporting and importing user-defined
violations................................................. 272
Maintaining Security
Policies...........................................................................
..................... 273
Overview: Importing and exporting security
policies .....................................................273
About security policy export
formats................................................................... 273
Exporting security
policies...........................................................................
........273
Importing security
policies...........................................................................
........274
Overview: Comparing security
policies..........................................................................
274
Comparing security
policies...........................................................................
..... 275
Configuring ASM with Local Traffic
Policies........................................................................277
Overview: Configuring ASM with local traffic
policies.................................................... 277
About application security and local traffic
policies............................................. 277
About application security and manually adding local traffic
policies..................277

You might also like