Top Banner
© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners. F5 BIG-IP and Quarri POQ Clients can leverage existing F5 BIG-IP appliances for enforcement of POQ deployments Connection of client browser and web server security extends F5’s essential web security features to include: Zero-hour malware defenses on browser endpoint Information controls to prevent saving, copying, printing and screen-capturing browser-delivered information Organizations that deploy BIG-IP LTM as a front-end device for multiple independent web applications can require the use of a protected browser without modifications to any of their protected web applications
3

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product.

Jan 02, 2016

Download

Documents

Dwight Atkins
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product.

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners.

F5 BIG-IP and Quarri POQ

► Clients can leverage existing F5 BIG-IP appliances for enforcement of POQ deployments

► Connection of client browser and web server security extends F5’s essential web security features to include: Zero-hour malware defenses on browser endpoint Information controls to prevent saving, copying, printing and

screen-capturing browser-delivered information

► Organizations that deploy BIG-IP LTM as a front-end device for multiple independent web applications can require the use of a protected browser without modifications to any of their protected web applications

Page 2: © 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product.

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners.

BIG-IP - POQ Integration

1. Web site or application request is made2. BIG-IP intercepts it and sends to POQ Server for validation

using an iRule. (v10 and v11 are supported.) 3. If POQ session ID does not exist, BIG-IP redirects the client

to the POQ server4. POQ secure browser is launched

Page 3: © 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product.

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners.

► Quarri, F5 collaborated on iRules POQ script

► iRule script implements POQ enforcement logic

► Supports BIG-IP LTM V10 and V11

► Available today via Quarri technical support Script bundled in next release of POQ (3.0)

► General integration approach: Configure a pool for the POQ Server(s),

no need to be sticky Create a virtual server for POQ Server and set default pool to

above Create iRule, paste script into it, modify static parameters in

script to local deployment needs Attach iRule to webapp virtual server to be secured

iRules – POQ Script