0% found this document useful (0 votes)
22 views2 pages

Mod4 3

The document discusses integrating application security and protection with database security products. It provides steps for configuring a virtual server, access profiles, and policies to enable this integration. It also covers securing FTP and SMTP traffic with custom configurations and profiles.

Uploaded by

DDDD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Mod4 3

The document discusses integrating application security and protection with database security products. It provides steps for configuring a virtual server, access profiles, and policies to enable this integration. It also covers securing FTP and SMTP traffic with custom configurations and profiles.

Uploaded by

DDDD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Integrating ASM and APM with Database Security

Products............................................. 315
Overview: Integrating ASM and APM with database security
products......................... 315
Prerequisites for integrating ASM and APM with database
security.............................. 315
Creating a
VLAN...............................................................................
.................. 316
Creating a self IP address for a
VLAN................................................................ 317
Creating a local traffic pool for application
security ............................................ 317
Creating a virtual server to manage HTTPS
traffic............................................. 318
Creating a simple security
policy.........................................................................318
Creating an access
profile............................................................................
.......319
Configuring an access
policy.............................................................................
. 321
Adding the access profile to the virtual
server.................................................... 322
Configuring a database security
server...............................................................322
Enabling database security integration with ASM and
APM............................... 323
Implementation
result.............................................................................
........................324
Securing FTP
Traffic............................................................................
...................................325
Overview: Securing FTP traffic using default
values......................................................325
Creating an FTP service profile with security
enabled........................................ 325
Enabling protocol security for an FTP virtual
server........................................... 325
Reviewing violation statistics for security
profiles................................................326
Overview: Securing FTP traffic using a custom
configuration........................................326
Creating a custom FTP profile for protocol
security............................................ 327
Creating a security profile for FTP
traffic.............................................................327
Modifying associations between service profiles and security
profiles............... 328
Configuring an FTP virtual server with a server
pool.......................................... 328
Reviewing violation statistics for security
profiles................................................329
Securing SMTP
Traffic............................................................................
................................331
Overview: Securing SMTP traffic using system
defaults................................................331
Creating an SMTP service profile with security
enabled.....................................331
Creating an SMTP virtual server with protocol
security...................................... 331
Reviewing violation statistics for security
profiles................................................332
Overview: Creating a custom SMTP security
profile......................................................332
Creating a custom SMTP service
profile.............................................................333
Creating a security profile for SMTP
traffic..........................................................333
Enabling anti-virus protection for
email............................................................... 334
Modifying associations between service profiles and security
profiles............... 335
Creating and securing an SMTP virtual server and
pool.....................................335
Reviewing violation statistics for security
profiles................................................336
Legal
Notices............................................................................
.............................................. 337
Legal
notices............................................................................
......................................337

You might also like