Securing BIG-IP Generated HTTP Server Header Information
Securing BIG-IP Generated HTTP Server Header Information
Securing BIG-IP Generated HTTP Server Header Information
JOB AID
Securing BIG-IP
Generated HTTP Server
Header Information
DIGITAL EDUCATION SERIES
JOB AID
TABLE OF CONTENTS
DIGITAL 2
EDUCATION
SERIES
BIG-IP ADMINISTRATOR TRAINING
BIG-IP FUNDAMENTALS CURRICULUM
Secure HTTP Profile Server Agent Name Using the Configuration Utility
Requirements: You must be an Administrator, Resource Administrator, or Manager to perform these steps.
1. Navigate to Local Traffic » Profiles : Services : HTTP, and click on the name of the HTTP type services profile
you wish to secure. In this example, we will select the HTTP-type profile named empty_server_agent.
DIGITAL 3
EDUCATION
SERIES
BIG-IP ADMINISTRATOR TRAINING
BIG-IP FUNDAMENTALS CURRICULUM
DIGITAL 4
EDUCATION
SERIES
BIG-IP ADMINISTRATOR TRAINING
BIG-IP FUNDAMENTALS CURRICULUM
Requirements: You must be an Administrator, Resource Administrator, or Manager with TMOS shell access to
perform the modify step below.
1. List the current server-agent-name setting for the HTTP-type profile named empty_server_agent.
2. Modify the HTTP-type profile named empty_server_agent to send no HTTP Server header in BIG-IP generated
HTTP responses.
3. If you want your changes to be permanent, remember to save the running configuration to the stored
configuration. You must be an Administrator to perform this step.
DIGITAL 5
EDUCATION
SERIES