Software Secure Workload
Activity Configure

Workflow

  • First, the user must verify that the F5 BIG-IP REST API endpoint is reachable from Secure Workload.

  • For TaaS or in cases, where the F5 BIG-IP appliance is not directly reachable, the user must configure a Secure Connector tunnel to provide connectivity.

  • Create an external orchestrator with type F5 BIG-IP.

  • Depending on the delta interval value it might take up to 60 seconds (default delta interval) for the first full snapshot of F5 BIG-IP virtual servers to complete. Thereafter the generated labels can be used to create Secure Workload scopes and enforcement policies.