You are on page 1of 2

Integrating ASM and APM with Database Security

Products............................................. 315
Overview: Integrating ASM and APM with database security
products......................... 315
Prerequisites for integrating ASM and APM with database
security.............................. 315
Creating a
VLAN...............................................................................
.................. 316
Creating a self IP address for a
VLAN................................................................ 317
Creating a local traffic pool for application
security ............................................ 317
Creating a virtual server to manage HTTPS
traffic............................................. 318
Creating a simple security
policy.........................................................................318
Creating an access
profile............................................................................
.......319
Configuring an access
policy.............................................................................
. 321
Adding the access profile to the virtual
server.................................................... 322
Configuring a database security
server...............................................................322
Enabling database security integration with ASM and
APM............................... 323
Implementation
result.............................................................................
........................324
Securing FTP
Traffic............................................................................
...................................325
Overview: Securing FTP traffic using default
values......................................................325
Creating an FTP service profile with security
enabled........................................ 325
Enabling protocol security for an FTP virtual
server........................................... 325
Reviewing violation statistics for security
profiles................................................326
Overview: Securing FTP traffic using a custom
configuration........................................326
Creating a custom FTP profile for protocol
security............................................ 327
Creating a security profile for FTP
traffic.............................................................327
Modifying associations between service profiles and security
profiles............... 328
Configuring an FTP virtual server with a server
pool.......................................... 328
Reviewing violation statistics for security
profiles................................................329
Securing SMTP
Traffic............................................................................
................................331
Overview: Securing SMTP traffic using system
defaults................................................331
Creating an SMTP service profile with security
enabled.....................................331
Creating an SMTP virtual server with protocol
security...................................... 331
Reviewing violation statistics for security
profiles................................................332
Overview: Creating a custom SMTP security
profile......................................................332
Creating a custom SMTP service
profile.............................................................333
Creating a security profile for SMTP
traffic..........................................................333
Enabling anti-virus protection for
email............................................................... 334
Modifying associations between service profiles and security
profiles............... 335
Creating and securing an SMTP virtual server and
pool.....................................335
Reviewing violation statistics for security
profiles................................................336
Legal
Notices............................................................................
.............................................. 337
Legal
notices............................................................................
......................................337

You might also like