The Cequence Unified API Protection Platform (UAP) can natively integrate with the F5 BIG-IP to provide seamless integration with your BIG-IP deployments. Cequence fully supports Mutual TLS authentication as well as other configuration options. Log in to the see the full integration details.
What is BIG-IP?
BIG-IP is a Web Application Firewall (WAF) used for security application server traffic and providing load balancing functionality. The BIG-IP provides a managed proxy layer and services for denial of service attacks, web form abuse, rate limiting, quotas, and more.
Overview
There are two basic approaches for integrating Cequence Unified API Protection Platform (UAP) into an existing F5 BIG-IP Deployment: inline and passive. Your Cequence UAP deployment could include Bot Defense, API Sentinel, or both.
In inline Integration, API traffic is routed through the Cequence UAP. This deployment scenario supports both Bot mitigation and API protection. For inline integration, there are two integration options to choose from: Upstream and Hairpin.
In passive integration, request/response transaction information is captured and sent to Cequence UAP using the F5 BIG-IP Clone Pools feature. This approach supports API discovery and risk analysis of APIs by Cequence API Sentinel. Detection, discovery, and risk events may be logged to external SIEM and SOAR services.
Integration Deployments
Inline Data flow - Hairpin Deployment:
API traffic requests and responses are both routed by the F5 BIG-IP to flow through the Cequence Defender which then forwards captured transactions back to Cequence Unified API for deeper analysis. The Cequence Defender is logically inline, and in a position to mitigate both requests and responses based on user defined or refined system mitigation policies.
Inline Data flow - Upstream Deployment
API traffic is received by the F5 BIG-IP, then forwarded to the Cequence Defender en route to the Application server for deeper API security analysis. The Cequence Defender is upstream of F5 BIG-IP. Requests are forwarded directly from Cequence Defender to the application(s). Responses from the application(s) are forwarded back through F5 BIG-IP to the client.
Additional Information
Detailed step-by-step instructions are available to Cequence customers.