Workflow 2: Configure Network Security and DoS Event Logging

Task 1 – Configure Network Security and DoS Event Logging

You enable Network Security event logging using the virtual servers displayed in the context list

  1. Navigate to the Configuration Security Network Security Contexts

  2. Check the box next to the IPV4_TCP VIP

  3. Select “Configure Logging” from the top buttons

    image119

  4. You will receive a configuration message alerting you to the changes about to be made to the device, click Continue

    image120

This will now configure a logging profile, associated pools, monitors and all necessary configuration to send logs to the Data Collection Device (DCD).

In the spirit of central management, we’re also going to configure the DoS event logging, so we only must perform one deployment on both devices.

  1. Navigate to Configuration Security Shared Security DoS Protection Device DoS Configurations

  2. Highlight bigip1.dnstest.lab and click the “Configure DoS Logging” button from the top.

    image121

  3. Once again you will receive a configuration message, click continue

  4. Once completed navigate to the Deployments tab

    As most of the configuration is “LTM” related you will first need to deploy the LTM configuration.

  5. Navigate to Evaluate & Deploy

  6. Select Local Traffic & Network Traffic

  7. Create an evaluation named “logging_configuration”, leave all other defaults and select both devices, once finished, create the evaluation.

    Feel free to examine the changes in the evaluation, when satisfied deploy the changes.

  8. Once the LTM configuration is deployed, you’ll need to also deploy the Network Security portion of the changes.

    Navigate to Deployment Evaluate & Deploy Network Security.

Again, create an evaluation and subsequent deployment for both devices.

Task 2 – Evaluate Network Firewall Events

  1. Browse to http://10.30.0.50 once again (or refresh in your tabs).

  2. Within BIG-IQ, navigate to Monitoring Network Security Firewall

  3. Click on a line item for enriched information in the window below as shown

    image122

    Feel free to view other logs to see the data presented.

Task 3 – Evaluate DoS Events

  1. Open a few separate windows to the attack host. We will launch a few attacks at once to see the value of consolidated reporting within BIG-IQ (there is a text document on the jumbox desktop which contains all of the attack commands).

  2. Launch a few attacks at once and navigate to Monitoring Events –DoS DoS Summary

    image123

  3. From here you have a consolidated view of all your devices and attacks.

    Click on one of the attack ID’s for enriched information about the attack

    image124

This concludes the lab. You have had quite the eventful first week at Initech! You have successfully allowed communication to a new webserver, you tuned and defended against several DoS attacks, you then configured BIG-IQ for central device management and monitoring and lastly, you’re now managing AFM within BIG-IQ. I think you deserve Friday off!!