Forum Discussion
Best Practice - Policy management when there are several instances of the same application behind several ASM's
1) Manage each security policy in isolation. At a minimum, this is something of a burden since you would be reviewing and acting on violations in all three locations.
2) Push out the security policy periodically from one of the ASM's to the other two ASM's. It would seem that the potential downside of this approach is that the security policies on each device would not necessarily be tailored to the specific violations seen on that device.
Do I have this about right? Thoughts?
- Mike_MaherNimbostratusSo I am not sure I understand.... When you say tailored to the violations on that device what do mean? Are you about allowing traffic through manual policy building and adjusting the policy based on traffic seen? Is the application the same behind each of the 3 ASMs you have or is each instance different? Also what version are you running?
- Evan_25555Historic F5 AccountThe application behind each ASM is identical. We're running 10.2.0 HF 2.
We anticipated performing automatic policy building for a week or two and then fine tuning the policy through the manual violation review process.
- nitassEmployeesince application is identical, i prefer the second one.
- hooleylistCirrostratusAlso, in 11.0 ASM added support for synching policies across separate ASM units. Though you can only have the policy builder running on one unit at a time. But you run it on the main ASM unit and then still tune the policy on other units using Learning or manual changes and have the changes synchronized.
- Mike_MaherNimbostratusSo I am in the same situation as you are with 4 ASMs 2 in each Data Center and we have multiple applicaations that run through them. Same sort of thing where one application is identical across all 4 ASMs and we have to keep policy in Sync. I am currently running the same version as you are as well. The process I have here is we use a testing environment that is a copy of production to do learning for major changes to the application, I also have a form and spreadsheet that I send to the Developers to have them fill out all the file types, URL's, parameters and information on the values. Then we normally take that information and build policy in the test environment put the policy in blocking and have the users test. Then we copy the policy from the test environment to all 4 production boxes, from there any violations should be minimal so we just manually adjust all 4 boxes when needed, which is not all that often.
- spalandeNacreousHi Mike. Can you be kind to share the form and spread sheet which you send to developer to fill out to build the policy? Thanks, palande.sanjay@gmail.com
- Mike__Maher_108NimbostratusSo I am in the same situation as you are with 4 ASMs 2 in each Data Center and we have multiple applicaations that run through them. Same sort of thing where one application is identical across all 4 ASMs and we have to keep policy in Sync. I am currently running the same version as you are as well. The process I have here is we use a testing environment that is a copy of production to do learning for major changes to the application, I also have a form and spreadsheet that I send to the Developers to have them fill out all the file types, URL's, parameters and information on the values. Then we normally take that information and build policy in the test environment put the policy in blocking and have the users test. Then we copy the policy from the test environment to all 4 production boxes, from there any violations should be minimal so we just manually adjust all 4 boxes when needed, which is not all that often.
- spalandeNacreousHi Mike. Can you be kind to share the form and spread sheet which you send to developer to fill out to build the policy? Thanks, palande.sanjay@gmail.com
- Mike_MaherNimbostratusOne other side note, when doing the policy building we only run through 1 ASM so all the information can be built on one box and once we are at 99-100% then we move to prod across the 4 boxes. Of course this is two separate environments as I am not comfortable from a Security standpoint doing policy building in production. If you only have 1 environment and you have to do the policy building there, I would try and put one ASM out front for the two week automated policy building, but if you are relying on production traffic for that I would advise caution, as we see a lot of blocks when we get to prod that is either just junk traffic most of the time but I also see some poking at the application to see what they can get to. In my large customer facing applications we have a decent size ignore list of URLs that we don't even see in blocking any more because there was so many of the requests coming in.
- Evan_25555Historic F5 AccountThanks guys! Great discussion!
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com