You are on page 1of 2

Implementation

results............................................................................
.......................280
Automatically Synchronizing Application Security
Configurations.................................. 281
Overview: Automatically synchronizing ASM
systems...................................................281
About device management and synchronizing application security
configurations.....................................................................
............................281
Considerations for application security
synchronization......................................282
Performing basic network configuration for
synchronization............................... 282
Specifying an IP address for config
sync............................................................ 283
Establishing device
trust..............................................................................
........283
Creating a Sync-Failover device
group................................................................284
Syncing the BIG-IP configuration to the device
group.........................................285
Specifying IP addresses for failover
communication........................................... 286
Creating a Sync-Only device
group.....................................................................287
Enabling ASM synchronization on a device
group.............................................. 288
Synchronizing an ASM-enabled device
group.....................................................288
Implementation
result.............................................................................
........................289
Manually Synchronizing Application Security
Configurations...........................................291
Overview: Manually synchronizing ASM
systems..........................................................291
About device management and synchronizing application security
configurations.....................................................................
............................291
Considerations for application security
synchronization......................................292
Performing basic network configuration for
synchronization............................... 292
Specifying an IP address for config
sync............................................................ 293
Establishing device
trust..............................................................................
........293
Creating a Sync-Failover device
group................................................................294
Syncing the BIG-IP configuration to the device
group.........................................295
Specifying IP addresses for failover
communication........................................... 296
Enabling ASM synchronization on a device
group.............................................. 297
Synchronizing an ASM-enabled device
group.....................................................297
Implementation
result.............................................................................
........................298
Synchronizing Application Security Configurations Across
LANs................................... 299
Overview: Synchronizing ASM systems across
LANs................................................... 299
About device management and synchronizing application security
configurations.....................................................................
............................300
Considerations for application security
synchronization......................................300
Performing basic network configuration for
synchronization...............................

You might also like