56

consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Embed Size (px)

Citation preview

Page 1: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more
Page 2: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

The authors and publisher have taken care in the preparation of this book, but make no expressed or implied war-ranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental orconsequential damages in connection with or arising out of the use of the information or programs containedherein.

© Copyright 2008 by International Business Machines Corporation. All rights reserved.

Note to U.S. Government Users: Documentation related to restricted right. Use, duplication, or disclosure is sub-ject to restrictions set forth in GSA ADP Schedule Contract with IBM Corporation.

IBM Press Program Managers: Steven M. Stansel, Ellice Uffer

Cover design: IBM Corporation

Associate Publisher: Greg Wiegand

Marketing Manager: Kourtnaye Sturgeon

Publicist: Heather Fox

Acquisitions Editor: Katherine Bull

Development Editor: Ginny Bess Munroe

Managing Editor: Kristy Hart

Designer: Alan Clements

Senior Project Editor: Lori Lyons

Copy Editor: Editorial Advantage

Indexer: WordWise Publishing Services LLC

Compositor: TnT Design

Proofreader: San Dee Phillips

Manufacturing Buyer: Dan Uhrig

Published by Pearson plc

Publishing as IBM Press

IBM Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales,which may include electronic versions and/or custom covers and content particular to your business, traininggoals, marketing focus, and branding interests. For more information, please contact:

U. S. Corporate and Government Sales

1-800-382-3419

[email protected].

For sales outside the U. S., please contact:

International [email protected].

Page 3: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

The following terms are trademarks or registered trademarks of International Business Machines Corporation inthe United States, other countries, or both: IBM, the IBM logo, IBM Press, CICS, Cloudscape, DataPower, Data-Power device, DB2, developerWorks, DFS, Domino, Encina, IMS, iSeries, NetView, Rational, Redbooks, Tivoli,TivoliEnterprise, and WebSphere. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc.in the United States, other countries, or both.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the UnitedStates, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and othercountries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Othercompany, product, or service names may be trademarks or service marks of others.

Library of Congress Cataloging-in-Publication Data

IBM websphere datapower SOA appliance handbook / Bill Hines ... [et al.].p. cm.

ISBN 978-0-13-714819-61. WebSphere. 2. Web site development. I. Hines, Bill. TK5105.8885.W43I265 2008004.6—dc22

2008042957

All rights reserved. This publication is protected by copyright, and permission must be obtained from the pub-lisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by anymeans, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions,write to:

Pearson Education, IncRights and Contracts Department501 Boylston Street, Suite 900Boston, MA 02116Fax (617) 671 3447

ISBN-13: 978-0-13-714819-6

ISBN-10: 0-13-714819-4

Text printed in the United States on recycled paper at R.R. Donnelley in Crawfordsville, Indiana.First printing December 2008

Page 4: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Foreword by Eugene Kuznetsov“The proper planning of any job is the first requirement. With limited knowledge of atrade, the job of planning is doubly hard, but there are certain steps that any person cantake towards proper planning if he only will.”—Robert Oakes Jordan, Masonry

I founded a company called DataPower® in the spring of 1999 to build products based on severaldistinct ideas. The first idea involved applying reconfigurable computing and dynamic code gen-eration to the problem of integrating disparate applications. The second idea centered on the con-cept of data-oriented programming (DOP) as the means to achieve direct and robust datainterchange. The third idea involved delivering middleware as a network function, enabled by theDOP technology and inspired by the successful models of ubiquitous connectivity. The product’sjourney since has been remarkable, and this great book is another milestone for the entire teambehind DataPower. Before more discussion of the book itself, a few words on these three ideas.

Rapidly adapting to change is key for everything and everyone in today’s world, and IBMSOA appliances are no exception. Whether it’s a policy, a transformation map, a schema, or asecurity rule, DataPower will try to put it into effect with as little delay and interruption as pos-sible. Popular methods for maintaining this kind of flexibility come with a large performancepenalty. However, by dynamically generating code and reconfiguring hardware based on the cur-rent message flow, it became possible to achieve both flexibility and near-optimal performance.At any given point, the device operates as a custom engine for a particular task, but when the taskchanges, it can rapidly become a different custom engine underneath the covers.

This dynamic adaptability is especially useful when combined with DOP. Stated briefly,DOP emphasizes formally documenting data formats and using them directly, instead of encap-sulation or abstraction, to integrate or secure different modules or systems. Today, XML is prob-ably one of the most successful and readily recognized examples of DOP, but the principles aremore universal than any particular technology. Another example of DOP is the way DataPowerXI50 processes binary data, by using high-level format descriptors instead of adaptors.

These, in turn, enable the creation of network hardware (also known as appliance) productsthat operate on whole application messages (rather than network packets) to integrate, secure, or con-trol applications. Greater simplicity, performance, security, and cost-effectiveness were envisioned—and are now proven—with the appliance approach. Beyond the appliance design discipline, thesuccess of IP & Ethernet networking in achieving universal connectivity has much to teach about thebest way to achieve radically simplified and near-universal application integration.

Reading this book will enable you to benefit from the previous three ideas in their concreteform: the award-winning IBM products they became. From basic setup to the most powerfuladvanced features, it covers DataPower appliances in a readable tone with a solid balance of the-ory and examples. For example, Chapter 6 does a great job in explaining the big-picture view ofdevice operation, and Chapter 22 gives a detailed how-to on extending its capabilities. With someof the most experienced hands-on DataPower practitioners among its authors, it provides the kindof real-world advice that is essential to learning any craft.

Page 5: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

When learning IBM DataPower, there is one thing that may be more helpful and rewardingthan remembering every particular detail, and that is developing an internal “mental model” ofhow the devices are meant to operate and fit into the environment. Especially when troubleshoot-ing or learning new features, this “mental model” can make device behavior intuitive. Readingthe following pages with an eye toward not just the details but also this mental model will speedboth productivity and enjoyment.

In conclusion, I would like to use this occasion to thank the entire team, past and present, whomade and continues to make DataPower possible. Their work and the passion of DataPower users isan inspiring example of how great people and a powerful idea can change the world for the better.

—Eugene Kuznetsov, Cambridge, MA Founder of DataPower Technology, Inc. served as President, Chairman, and CTO at various points in the company’s history, and then served asdirector of Product Management and Marketing, SOA Appliances at IBM Corporation.

xxviii Foreword

Figure 1 DataPower’s first office is on the right. (Photo courtesy of Merryman Design.)

Page 6: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Foreword by Jerry CuomoIt all started when I was asked to co-host an IBM Academy Conference on “Accelerators and Off-Loading” in 2004. I was feeling a little out of my element, so I decided to take some of the focusoff me and put it on others. I had been reading about some of the new XML-centered hardwaredevices and was intrigued. I have always been interested in system performance. With XMLdominating our emerging workloads (e.g., Service Oriented Architecture), the impact of XMLperformance on system performance was becoming increasingly important. Hence, I thought itwould be a good idea to invite a handful of these XML vendors to our conference.

At the conference, the DataPower presentation was quite different from the others. Itwasn’t about ASICs or transistors; it was about improving time to value and total cost of opera-tion. The DataPower presentation focused on topics that were also near and dear to me, such assystems integration, configuration over programming, and the merits of built-for-purpose sys-tems. In essence, Eugene Kuznetsov, the DataPower founder and presenter, was talking about thevalue of appliances. While very intriguing, I couldn’t help but feel curious about whether theclaims were accurate. So, after the conference I invited Eugene to come to our lab in ResearchTriangle Park in North Carolina to run some tests.

I have to admit now that in the back of my mind, I operated on the principle of “keepingyour friends close and your enemies closer.” Behind my intrigue was a feeling of wanting tounderstand their capabilities so that we could outperform vendors with WebSphere® ApplicationServer. The tests went well; however, the DataPower team was somewhat reluctant to dwell onthe raw XML performance capabilities of their appliance. Feeling a little suspicious, I had myteam run some raw performance experiments. The results were off the charts. Why wasn’t theDataPower team flaunting this capability? This is when I had my “ah-ha” moment. While perfor-mance measured in transactions per second is important and part of the value equation, the over-all performance metrics found while assessing time to value and overall cost of operation andownership are the most critical performance metrics to a business. This is where the DataPowerappliances outperform. I read a paper, written by Jim Barton, CTO and co-founder of Tivo, called“Tivo-lution.” The paper was inspiring as it confirmed the motivations and aspirations that I’vehad ever since I led IBM’s acquisition of DataPower in 2005. In the paper, Barton describes thechallenges of making complex systems usable and how “purpose-built” computer systems areone answer to the challenge:

“One of the greatest challenges of designing a computer system is in making sure thesystem itself is ‘invisible’ to the user. The system should simply be a conduit to thedesired result. There are many examples of such purpose-built systems, ranging frommodern automobiles to mobile phones.”

The concept of purpose-built systems is deeply engrained in our DNA at IBM. The name ofour company implies this concept: International Business Machines.

Foreword xxix

Page 7: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

IBM has a long history of building purposed machines, such as the 1933 Type 285, an electricbookkeeping and accounting machine. I can imagine this machine being delivered to an accountant,plugging it in, immediately followed by number crunching. The accountant didn’t have to worryabout hard drive capacity, operating system levels, compatibility between middleware vendors, orapplication functionality. It just did the job. I can also imagine it followed the 80/20 rule. It probablydidn’t do 100% of what all accountants needed. But it probably did 80% of what all accountantsneeded very well. Users just dealt with the remaining 20%, or learned to live without it.

“Business Machines, Again” is my inspiration. Our customers respond positively to the re-emergence of this approach to engineering products. It’s all about time-to-value and total cost ofoperation and ownership. Appliances such as our WebSphere DataPower XI50 are leading theway in delivering on these attributes.

At the extreme, purpose-built systems, such as a Tivo DVR and a XI50, are built from theground up for their purposes. While they might use off-the-shelf parts, such as an embeddedLinux® OS, it is important that all parts are “right sized” for the job. Right-sizing source code ina hardware appliance is more like firmware (with strong affinity to the underlying hardware) thanit is software. As such, the Tivo-lution paper describes the need to own every line of source codeto ensure the highest level of integration and quality:

“…by having control of each and every line of source code...

Tivo would have full control of product quality and development schedules. When thebig bug hunt occurred, as it always does, we needed the ability to follow every lead,understand every path, and track every problem down to its source.”

The Tivo team even modified the GNU C++ compiler to eliminate the use of exceptions(which generate a lot of code that is seldom used) in favor of rigid checking of return code usagein the firmware. DataPower similarly contains a custom XML compiler that generates standardexecutable code for its general-purpose CPUs, as well as custom code for the (XG4) XMLcoprocessor card.

A physical appliance has the unparalleled benefit of being hardened for security. Jim talksabout this in his Tivo paper:

“Security must be fundamental to the design...We wanted to make it as difficult as possible,within the economics of the DVR platform, to corrupt the security of any particular DVR.”

The DataPower team has taught me the meaning of “tamper-proof” appliances, or moreprecisely “tamper-evident.” Like the 1982 Tylenol scare, we can’t stop you from opening the box,but we can protect you, if someone does open it. In fact, the physical security characteristics ofthe DataPower XS40 make it one of the only technologies some of our most stringent customerswill put on their network Demilitarized Zone (DMZ). If a DataPower box is compromised andopened, it basically stops working. An encrypted flash drive makes any configuration data,including security keys, difficult to exploit. “DP is like the roach motel; private keys go in, butnever come out” is the way we sometimes describe the tamper-proof qualities of the XS40.

xxx Foreword

Page 8: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

But the truth is, DataPower is not a DVR. DataPower is a middleware appliance. Middle-ware is a tricky thing to make an appliance out of. Middleware is enabling technology and by itsnature is not specific to any application or vendor. The Tivo appliance is a specific application(TV and guide) that makes it somewhat easier to constrain:

“Remember, it’s television. Everybody knows how television works.”

“Television never stops, even when you turn off the TV set. Televisions never crash.”

Hence, the challenge (and the art) in building a middleware appliance involves providing theright amount of constraint, without rendering the appliance useless. For example, DataPower doesnot run Java™ code (which is the primary means of customizing much of the WebSphere portfolio);instead, it uses XML as the primary mode of behavior customization. So, at some level, DP is notprogrammed, but instead it is configured. Now, for those who have used XML (and its cousin XSLT),you know that it’s more than configuration; however, it is a constraint over Java programming, whichhas unbounded levels of customizability. The new combined team of IBM and DataPower have beenbridging this gap (of special to general purpose) effectively. We have recently added features to DP toallow it to seamlessly connect to IBM mainframe software (IMS™ and DB2®) as well as capabilitiesto manage a collection of appliances as if they were one.

IBM has a healthy general-purpose software business. Our WebSphere, Java-based middle-ware is the poster child for general-purpose middleware (write once, run almost everywhere).However, there is a place for business machines that are purposed built and focus on providingthe 80 part of the 80/20 rule. We are heading down this path in a Big Blue way.

This book represents an important milestone in the adoption of DataPower into the IBMfamily. The authors of this book represent some of IBM’s most skilled practitioners of ServiceOriented Architecture (SOA). This team is a customer facing team and has a great deal of experi-ence in helping our customers quickly realize value from our products. They have also beenamong the most passionate within IBM of adopting the appliance approach to rapidly illustratingthe value of SOA to our customers. The authors have unparalleled experience in using DataPowerto solve some of our customers’ most stringent systems integration problems. This book capturestheir experiences and best practices and is a valuable tool for deriving the most out of your Web-Sphere DataPower appliance.

—Jerry Cuomo, IBM Fellow, WebSphere CTO

Foreword xxxi

Page 9: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Foreword by Kyle BrownI can still remember the day in late 2005 when Jerry Cuomo first called me into his office to tellme about an acquisition (then pending) of a small Massachusetts company that manufacturedhardware devices.

“Wait a minute. Hardware??!?”That’s the first incredulous thought that went through my mind. Jerry was the CTO of the

WebSphere brand in IBM, which had become the industry-leading brand of middleware based onJava. Why were we looking at a company that made hardware? Echoing the immortal words ofDr. “Bones” McCoy from the classic Star Trek series, I then thought,

“I’m a software engineer, not a hardware engineer, dang it!”But as I sat in his office, Jerry wove me a story (as he had for our executives) that soon had

me convinced that this acquisition did, in fact, make sense for WebSphere as a brand and for IBMas a whole. Jerry had the vision of a whole new way of looking at SOA middleware—a vision thatencompassed efficient, special-purpose appliances that could be used to build many of the partsof an SOA. Key to this vision was the acquisition of DataPower, which gave us not only a wealthof smart people with deep experience in Networking, XML, and SOA, but an entry into this fieldwith the DataPower family of appliances—notably the XI50 Integration appliance.

Since that day, I’ve never regretted our decision to branch out the WebSphere brand wellbeyond its Java roots. The market response to the introduction of the DataPower appliances to thebrand has been nothing short of phenomenal. Far from distracting us, the ability to provide ourcustomers with an easy-to-use, easy-to-install, and remarkably efficient hardware-based optionfor their ESB and security needs has turned out to be an asset that created synergy with our otherproduct lines and made the brand stronger as a whole. It’s been an incredible journey, and as webegin to bring out new appliances in the DataPower line, we’re only now beginning to see thefundamental shift in thinking that appliance-based approaches can give us.

On this journey, I’ve been accompanied by a fantastic group of people—some who came to usthrough the DataPower acquisition and some who were already part of the WebSphere family—who have helped our customers make use of these new technologies. Bill, John, and the rest of theauthor team are the true experts in this technology, and their expertise and experience show in thisbook.

This book provides a wealth of practical information for people who are either novices withthe DataPower appliances, or who want to learn how to get the most from their appliances. It pro-vides comprehensive coverage of all the topics that are necessary to master the DataPower appli-ance, from basic networking and security concepts, through advanced configuration of theAppliance’s features. It provides copious, detailed examples of how the features of the applianceswork, and provides debugging help and tips for helping you determine how to make thoseexamples (and your own projects) work. But what’s most helpful about this book is the way inwhich the team has given you not just an explanation of how you would use each feature, but alsowhy the features are built the way they are. Understanding the thinking behind the approaches

xxxii Foreword

Page 10: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

taken is an enormous help in fully mastering these appliances. The team provides that, and pro-vides you with a wealth of hints, tips, and time-saving advice not just for using and configuringdevices, but also for how to structure your work with the devices.

This book is something the DataPower community has needed for a long time, and I’m gladthat the authors have now provided it to the community. So sit back, crack open the book, open upthe admin console (unless you have yet to take the appliance out of the box—the book will helpyou there, too!) and begin. Your work with the appliances is about to get a whole lot easier, morecomprehensible, and enjoyable as well.

—Kyle Brown, Distinguished Engineer, IBM Software Services and Support

Foreword xxxiii

Page 11: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

3

C H A P T E R 1

An Introduction toDataPower SOAAppliances

Let’s get one thing straight right from the top—these are not your mother’s appliances! Let’s use that opening statement as a springboard for our discussion on exactly what SOA

appliances are, how they are used, and how they are similar and dissimilar to traditional house-hold appliances. The use of the term appliance to describe this new class of IT products is noaccident. It is meant to convey certain parallels to the term that is familiar to us. Think about it—what are the characteristics of your typical household appliances? Visualize the appliances ofyesteryear rather than the more complex ones we see on the market today. Certain attributesshould come to mind:

• Purpose-built—Appliances at home are typically for specialized uses—one for wash-ing clothes, one for keeping food cold, and so on.

• Simple—Most appliances have few knobs and controls. They have simple designs dueto the dedicated purpose for which they are designed. They are also reliable, so theydon’t need to be serviced or replaced often.

Get the picture? Now let’s move the discussion to a realm where we as IT professionals aremore comfortable—for many, that is not the realm of domestic chores!

There is a current trend in IT shops to use specialized appliances wherever possible. This isdue to several factors, the primary ones being total cost of ownership (TCO), return on invest-ment (ROI), performance, integration, ease of use, and security. To get started, we introduce youto IBM’s WebSphere DataPower SOA appliances, and then talk about how appliances can help ineach of these areas. Of course, we go into much greater detail throughout this book.

Page 12: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Meet the Family!The primary1 three products in the DataPower family are the DataPower XA35, XS40, and XI50,as shown in Figure 1-1. As you can see, the products are outwardly similar in appearance. Each isa hardened 1U rack-mount device in a tamper-proof case with four RJ-45 Ethernet ports, a DB-9serial port, and a power switch. We are speaking about the base configuration—there are optionsavailable, such as adding a Hardware Security Module, which could alter the outward physicalprofile. There are also replaceable fan trays, batteries, power supplies, and compact flash cards orhard drives.

4 Chapter 1 An Introduction to DataPower SOA Appliances

Figure 1-1 The DataPower product family.

In the following sections, we discuss the feature set for each model and then move on toscenarios in which appliances can be of great value before taking a closer look at what’s underthe covers.

DataPower XA35The DataPower XA35 (on the bottom in Figure 1-1) is the entry level product in the line and mostrepresentative of the beginnings of the product and DataPower company. The appliance is green,which represents its primary function: to make XML “go faster.” This is also the impetus behindthe designation of the “A” in XA; it stands for acceleration. The XA35 is at its core a highly effi-cient XML processing engine. It makes use of DataPower’s purpose-built features, such as opti-mized caches and dedicated SSL hardware to process XML at near wire-speed.

1 There are also specialized, derivative appliances, such as the XB60 Business-to-Business and XM70 Low LatencyMessaging devices, which are discussed in Appendix C, “DataPower Evolution.”

Page 13: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

The XA35 is a hardened appliance, but it has limited security processing functionality; forexample, it does not have the full XML threat protection or encryption/digital signature capabili-ties as the other models that we discuss. For these reasons, it generally sits behind the DMZ,2 inthe trusted zone to augment the processing of XML files. For example, it may be configured to dovalidation and transformation of XML before it reaches (or for traffic flowing between) the back-end servers. It should be used in-line in the network topology, not as a co-processor hanging off aparticular server (although this latter usage is how the appliances were first designed). A popularusage is to receive XML responses from backend servers and transform those into HTML beforecontinuing the response to the client. It has full SSL and SNMP capabilities to fit into the networkinfrastructure.

DataPower XS40The DataPower XS40 (in the middle in Figure 1-1) is called the security appliance, and justifi-ably it is yellow, which represents caution or yield. The “S” in XS stands for security. This modelis often found in the DMZ, as its security capabilities are extensive.

The XS40 has all the capabilities of the XA35, plus the following:

• Encryption/decryption utilizing purpose-built hardware for RSA operations

• Digital signature creation/verification

• Fine grained Authentication, Authorization, and Auditing (AAA)

• Full XML threat protection

• Tivoli® Access Manager (TAM) integration option

• Hardware Storage Module (HSM) option

• Dynamic routing

• Message filtering

• Fetching content from remote servers

• MIME, DIME, and Message Transmission Optimization Mechanism (MTOM) attach-ment processing

• XML Generation 4 (XG4) accelerator module option

• Web services management

• Service level monitoring

DataPower XI50The DataPower XI50 (at the top in Figure 1-1) is truly the star of the show. It is the integrationappliance, as represented by the “I” in XI, and it is IBM blue (what else!) in color. Due to its inte-gration capabilities, it is often found in the backend private network, functioning in an ESB

Meet the Family! 5

2 A DMZ is generally the front-facing “perimeter” of a network, where client traffic enters. Because it’s the first point ofentry into your network, and hackers have access, it must be hardened.

Page 14: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

capacity but is just as suitable for the DMZ. The majority of this book focuses on the XI50, as it isa superset of the other two models.

The XI50 has all the features of the XS40 (and hence the XA35) plus the following:

• WebSphere MQ client option

• WebSphere Java Message Service (JMS) Jetstream protocol connectivity

• TIBCO Enterprise Message Service (EMS) connectivity

• IBM IMS Connect client

• Database option (DB2, Sybase, Oracle, SQL Server)

• Optimized run-time engine for non-XML transformations

This might seem like a short list compared to all the capabilities that the XS40 heaps onwhat the XA35 had, but these are some big-ticket items! Throughout this book, you will see justhow important these features are and how to leverage them.

Now that we’ve had our brief introduction, let’s talk about where appliances are being usedin corporate information technology shops, and what kinds of problems they can help solve.

Typical Usages of AppliancesWhile the appliances are quite versatile and can thus be used to solve many different types ofproblems (and implementers have been quite creative in this regard), we find there are a few com-mon use cases that are typical. These generally focus around security, performance, cost savings,and integration. In the following sections, we discuss each of these in more detail.

Solving Security ProblemsLet’s think about what it would take to deploy a software-based proxy product in the DMZ. Eachof the layers of the ‘typical server’ shown in Figure 1-2 requires specialized skills to install andmaintain. Particularly for DMZ deployments, the server hardware itself must be hardened. Inhighly secure environments, this can involve removing any components that might allow infor-mation to be taken from the server, such as USB ports and writeable CD/DVD drives. The operat-ing system must also be hardened, removing components such as telnet and sendmail.3 Often,this results in other layers of the software stack not installing or operating properly! If you aresuccessful in installing the application software stack, it must be hardened as well. These arecommon requirements for high security environments such as financial companies, intelligenceservices, and military applications.

6 Chapter 1 An Introduction to DataPower SOA Appliances

3 The Center for Internet Security (http://cisecurity.org/) has papers showing how to harden various platforms, as well asscoring tools to see how well your platform is hardened.

Page 15: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Figure 1-2 Typical server components.

Although software-based DMZ components can be hardened successfully, it is a lot ofwork. Compare this with the simplicity of installing a dedicated, highly secure hardware appli-ance, purpose built to do a few things well with fairly simple administrative interfaces, as shownin Figure 1-3.

Typical Usages of Appliances 7

ProprietarySoftware

Config

WebServer

Config

AppServer

Config

Database

Config

XMLLibrary

DVD/CDDrives

HardwareHardDrive

USBPorts

CLibrary

OtherLibraries Daemons

Config

Operating SystemConfig

Configuration

XMLAcceleration

CryptoAcceleration

Hardware

Firmware

Figure 1-3 High-level SOA appliance components.

The appliances are hardened out of the box. For example:

• They are designed with security in mind from the ground up, before anything else.

• They are shipped secure by default; virtually every feature is disabled, including thenetwork adapters and administrative interfaces (except for the serial port used to do ini-tial bootstrap). If you want something, you must turn it on!

Page 16: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

• They have an encrypted file system.

• They have no Java, print services, or shareable file system.

• They are tamper-proof—backing out the screws on the case disables the appliance.

• They have specialized secure handling of crypto keys and certificates.

• They have an embedded operating system, not prone to known exposures of common OSs.

• They reject messages by default, unless specifically accepted by configured policies.

The age-old rule for the DMZ is to terminate client connections there and then proxy con-nections to the backend from the trusted DMZ servers. However, in the field we find even morestringent security policies that do not warrant any traffic (even proxied through these secure inter-mediaries) to the backend until the client is authenticated and authorized. This is referred to asperimeter security and is an increasingly common requirement, driving sales of DMZ securityproducts such as TAM. Later, we show how DataPower appliances can also solve this problem.

Another requirement for DMZ components is to virtualize or hide the implementationdetails of backend servers and applications. Typical DMZ products interact only with the proto-col layer of the network stack, so they can hide things like hostname/IP, ports, and URIs, whereasXML-centric application proxies such as DataPower appliances can virtualize on a much moreintelligent basis and can analyze the entire message stream.

A strong reason for using these types of appliances is the burgeoning risk of systemsbecoming compromised by XML-based threats. Just as once upon a time we felt HTTP to beinnocuous, today we are susceptible to underestimating what can be done by virtue of XML. InChapter 20 “XML Threats,” we show how entire infrastructures can be brought down usingsmall, simple, well-formed XML files. Only hardware appliances have the processing power tocheck for the many variations of XML threats.

Another common security problem is a mismatch in the specification levels or credentialformats of various technologies across large corporate IT infrastructures. For example, consider amarketing IT silo running on Microsoft®.NET using WS-Security 1.0 and SPNEGO credentialsfor identity and a manufacturing silo using IBM WebSphere Application Server (WAS), WS-Security 1.1, and LTPA credentials for identity. In today’s ESB-driven SOA architectures, asingle transaction may have to pass through both environments, so this presents challenges.Because DataPower appliances incorporate a wide range of the latest specification implementa-tions and credential formats, they can be used to transform messages and credentials to fit the tar-get each step of the way. Notice that this can be used to achieve cross-platform single-signon(SSO), although that also depends on other factors such as having a common registry.

To Lower Total Cost of Ownership (TCO)Refer back to the scenario in Figure 1-2, where there are numerous skills required to install andmaintain a typical server and software stack. Now think of this in terms of the staff required andcost to the organization. With self-contained appliances where the operating system and file sys-tem characteristics are irrelevant from an administrative perspective, this becomes much less

8 Chapter 1 An Introduction to DataPower SOA Appliances

Page 17: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

work. The function of the appliances is dedicated and streamlined, hence the administrative tasksand interfaces tend to be as well. For example, in the scenario in Figure 1-2, you have to continu-ally install fixes and updates at every layer of the stack. However, for appliances, you typically dothis by uploading a small firmware update and rebooting, which takes only minutes. In the serverscenario, you have multiple different administrative consoles to manage the layers of the stack;with the appliances, you have only one console.

The TCO return does not solely manifest itself in the setup and administration of the plat-form. Consider the silo example in the prior section—where various areas of a corporate IT infra-structure are running Web services across different platforms, such as those from IBM,Microsoft, and BEA. If the corporation has one set of policies for security and SLM that need tobe implemented across all these platforms, then it must be done multiple times, by multiplepeople, with skills on each platform. Not only is the configuration redundant and thereforeexpensive, but this problem is repeated each time it needs to change, and there is always the riskthat the policy will not be implemented exactly the same on each platform, which can lead tosecurity holes or application failures. This is depicted in Figure 1-4.

Typical Usages of Appliances 9

Security Processing

Routing

Transformation

New XML Standard

Access ControlUpdate

Change PurchaseOrder Schema

Update applicationservers individually.

Before SOA Appliances

Define and enforcecommon policies forall backend servers.

After SOA Appliances

Figure 1-4 Redundant administration versus simplified appliance model.

A more concrete example can be implemented by creating a single service that acts as aWeb service proxy on the DataPower appliance, importing the WSDL files for the Web servicesproviders on each of those backend platforms, and then applying the security and SLM policieson the proxy, thereby gaining policy definition and enforcement one time for all platforms. Allthis is based on standards that we discuss later, not only Web services itself, but also the accom-panying standards such as WS-Security for security, WS-Policy for policy definition, WS-Addressing for endpoint resolution, and WS-Management and WSDM4 for management.

4 WSDM (Web Services Distributed Management) is a Web service standard for managing and monitoring the status ofWeb services.

Page 18: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Enhancing PerformanceXML is the foundation on which many modern architectures are built—it has evolved into SOAPfor Web services and is found across the breadth and depth of the SOA stack and related specifi-cations. Over time, it has evolved from a simple markup language to something quite complexand sophisticated. Of course, the problem as far as performance is concerned is that XML is fairlyeasy for humans to read, but not for computers. It is a verbose representation of data and typicallyrequires significant resources in terms of CPU power and memory to process. This overhead istypically found in parsing the XML document into an in-memory representation and in validatingthe XML against its schema file.5

Consider the impact of parsing and validating the storm of XML/SOAP documents that hityour systems during peak production levels. Now consider the overhead of security that may beembedded in those messages—validating client identities against LDAP servers, verifying digitalsignatures, and decrypting encrypted data. This requires a tremendous amount of processing powerand time and robs precious cycles away from what your backend systems should really be doing—focusing on transactional business logic! Also consider the absolute waste of expending thesecycles for messages that come in badly formed, with schema violations or illegitimate securityissues. The cycles expended on processing them and handling the errors are wasted. Figure 1-5shows a graph demonstrating the CPU overhead of various common tasks. (Notice the parsing levelis low here—the main hit when parsing is memory utilization.) Notice the impact of security opera-tions. This can be helped somewhat with hardware-assisted acceleration, but the cost-benefit ofhardware acceleration boards is often debated. Also note that abusing these security features to con-sume CPU resources is one way of mounting attacks.

A grand solution for this, of course, is to use appliances to do all that heavy lifting at nearwire speed. As you will see when we discuss the appliance characteristics, they are amazinglyfast and can handle these tasks at orders of magnitude faster than software-based solutions run-ning on standard servers. Now focus on another scenario—one where the appliance makes surethat only clean traffic gets to the backend systems. Imagine the huge differential in available pro-cessing power on the backend if the validation and security tasks are done by the time the trafficgets there. The appliances can validate schemas, verify signatures, decrypt the data, and more.This can often result in huge performance returns, depending on considerations such as messagesizes, cipher strengths, network latency, and so forth.

Speaking of message sizes, this is often another major stumbling block for Java-based soft-ware systems processing XML. In modern day real-world systems, we are now seeing hugeSOAP messages on the order of hundreds of megabytes or even gigabytes in size. The conundrumis how to process these, given constraints on maximum JVM heap sizes in many platforms. Dueto aggressive built-in streaming and compression, appliances can handle messages larger thantheir actual memory space.

10 Chapter 1 An Introduction to DataPower SOA Appliances

5 An XML schema definition file (XSD) is a set of rules for how the file should look and what it should contain, includ-ing optional and required elements.

Page 19: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Figure 1-5 Security impact of common tasks.

On another message-related topic, consider applications that do XML transformationbetween differing schemas; for example, an application that consumes XML purchase orders andmust understand a variety of incoming purchase order formats from business partners, and thentransforms each into the one “golden” purchase order schema that this company uses. Thesetransformations can be quite expensive to process (see Figure 1-5) and result in bloated applica-tion code. We all know that line-for-line, application code is expensive in terms of programmertime, testing, and debugging. Now consider the effect on the application if the transformationswere moved out to the appliance on the frontend so that the backend application now gets onlythe one “golden” schema format. Yes, our application has gone on quite a diet, is less expensive tomaintain, and is much faster. One field scenario consisted of a frontend cluster of Java EE appli-cations to do such transformations to keep the cluster of business logic applications behind itlightweight. However, since this was running on a platform that charged for CPU time, and giventhe overhead of XML transformations shown in Figure 1-5, it was expensive. The solution was tomove the transformation layer out to DataPower appliances. The result was a huge cost savingsand orders of magnitude faster processing.

Integrating PlatformsIn the previous section, we discussed a scenario in which the appliance could be used to bridge dif-ferences in standards specifications (WS-Security v1.0 versus. v1.1) and identity credentials(SPNEGO versus LTPA) across systems. This is one good example of easily integrating disparateplatforms, particularly when the standards and specifications are in flux. It is difficult for software-based solutions running on standard servers and products to keep up with this. On the appliance,you load a firmware update to get the latest and greatest.

Typical Usages of Appliances 11

Parsing

1

ParsingSchemaValidation

3

SchemaValidation

3

XMLSigning

XMLDecryption

8

SignatureVerification

8 1 6

XPathFiltering

5

XMLTransformation

10

XMLEncryption

8

NOTE—FIRMWARE VERSIONS USED FOR THIS BOOK

The recommendations, advice, and practices shown in this book are generally applica-ble to firmware versions 3.6.0 through 3.7.2 (and likely future releases) and based onthe DataPower XI50. However, much of the information in this book is “timeless” in thatit represents information that is generally accepted as “best practices” in our experi-ence for most situations, and unrelated to specific firmware versions.

Page 20: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

However, there are other issues that arise when integrating different platforms. Consider ascenario in which a medium-sized business XYZ Corp has its infrastructure running on legacyplatforms and technologies, perhaps mainframe-based EDI. The business partners that theydepend on have long since moved their platforms to Web services and are telling poor XYZ Corpthat they can no longer afford to support XYZ’s legacy interface to that system, and they mustprovide a modern SOA or Web services interface or lose the business. This puts XYZ in a badposition; what will it cost to retrain its programmers, rewrite its COBOL applications, andrevamp the backends to its Java EE platforms? Likely, it would be a staggering amount! A com-mon solution to this problem is to place appliances at the front of the network as proxies, cook upa WSDL file to describe some Web services, begin receiving the ASCII SOAP messages from thenow-happy business partners, and convert them on-the-fly to EBCDIC EDI or COBOL Copy-book messages and send them over MQ or IMS Connect to the legacy backend. The backend doesnot have to change, and no programs have to be rewritten—a win-win!

Due to the variety of protocols (HTTP(S), FTP, MQ, JMS/JFAP, IMS, NFS, TIBCO, MQ,ODBC, SNMP, and so on) supported by the DataPower appliances, there is a wealth of opportu-nity for protocol bridging, content enrichment, and integration between platforms. Notice that theprevious scenario involved message transformation. The XI50 DataPower appliance can handleeither XML-to-XML or non-XML transformation scenarios, meaning that messages can betransformed to the appropriate format for any intended backend.

Another common and age-old scenario related to integrating platforms is dynamic routing.Because it is often a requirement to make dynamic routing decisions “on the edge of the net-work,” we have DMZ Web servers, proxies, and load balancers handle this. The problem is thatthey can understand only the protocol and not the payload of the message. To accomplish thegoal, applications place some value in the protocol header to facilitate the content-based routing.As an example, if we want any purchase orders over one million dollars to be routed to high-priority servers, the sending application would place a cookie or attribute in an HTTP header orURL parameter. The Web server, proxy. or load balancer in the DMZ would be configured tocheck for this and then route the traffic accordingly. The problem with this scenario is that youhave to put this hack in the applications and the HTTP payload, potentially disclose message datato attackers, and involve the sender/client. This solution doesn’t scale because if you continuallydo this, the HTTP header and application code bloat.

Because SOA appliances are XML-savvy and can use technologies such as XPath, they cancheck inside the message payload to look for the actual <po_value> element rather than alter theapplication and HTTP header. If the message is encrypted, you don’t need to expose this by exter-nalizing the data; you can just decrypt the message and check the value, and then route accord-ingly. The client in this case does not have to be complicit—the routing is truly dynamic andtransparent. The XML Aware Network layer is shown in Figure 1-6.

One last important feature in regard to the integration story is the use of appliances as ESBs.The appliances fulfill the model of an ESB by virtue of their strong routing, transformation, medi-ation, and protocol-switching capabilities. IBM has other ESB products capable of implementing

12 Chapter 1 An Introduction to DataPower SOA Appliances

Page 21: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

the ESB pattern—WebSphere Message Broker (WMB) and WebSphere Enterprise Service Bus(WESB). Each of these have unique capabilities that may suit them for particular usages. AlthoughDataPower may be thought of as a highly secure and performant ESB, the others have features thatDataPower does not have in the arenas of transactionality, persistent message handling, and thecapability to work in other programming languages. We discuss ESBs in Chapter 5, “CommonDataPower Deployment Patterns,” and Chapter 9, “Multi-Protocol Gateway.”

A Closer Look at the DataPower Products 13

Application Infrastructure

XML Device Layer

Database

Internet

XML SOAP XSL

XML-Aware Network

Network Infrastructure

Figure 1-6 XML Aware Network layer.

A Closer Look at the DataPower ProductsNow that you have a general idea what “SOA Appliances” are, and have some familiarity withthe IBM offerings in this space and what they are used for, we will describe them in more detail.

Page 22: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Physical Characteristics of AppliancesAs stated earlier, and demonstrated in Figure 1-1 appliances are “pizza-box,” rack-mountable 1U(1.75-inch thick) hardware devices. The only external interfaces are a power switch, 9-pin serial port,and four RJ-45 Ethernet ports. (Appliances with HSM will have a Pin Entry Device [PED] connector.)

Software Architecture of AppliancesAs Figure 1-3 illustrates, the software architecture is simple from the user perspective. There is a cus-tomized, hardened, native-code operating system kernel that implements the appliance’s core func-tionality. The OS resides in firmware that can be updated by applying small firmware update files.

On top of this is a layer of functionality that is implemented in XSLT stylesheets, which areread-only and used by the system to implement certain functionality. We get into more detail inChapter 2, “DataPower Quick Tour and Setup.”

The next layer up the software stack consists of configurations developed by the user; theseare the application proxies and processing policies to process message traffic for your applications.Configuration files and application artifacts can reside in the directory structure on the file systemor they can be hosted on remote servers and retrieved and cached at start-up time so that they do notever reside on the appliance file system (a requirement in some highly secure environments).

Although the operating system itself and many of the appliances’ implementation details arecustom and proprietary, outwardly, the appliances are built on a standards-based model. A fewimportant ones are listed here. These are based on a single foundation, XML.

• XML—A general purpose specification for creating other markup languages—and manyare built upon it, such as MathML (a markup language to describe mathematics). It is acombination of data and metadata, consisting of tagged elements to not only show the databut to describe and delineate it; for example, <po_number>12345</po_number>.

• XSD—A set of rules that an XML file must conform to. So if you want to define a pur-chase order XML file to use with your applications, you can create an XSD file to be usedto validate those incoming purchase order XML files to ensure they have the properstructures.

• SOAP—A message format used by Web services for sending and receiving XML-basedmessages. It is more sophisticated than “normal” XML in that its construct provides for amessage header and body, among other things.

• WSDL—A language for describing Web services. It defines the services, ports, bindings,and operations that constitute the Web service, along with the endpoint information(hosts, ports, URIs) and perhaps other metadata such as policy information.

• XPath—XPath for XML is somewhat analogous to SQL for databases.6 XPath allowsfor searching and retrieving information (nodesets) from XML documents based onsome criteria.

14 Chapter 1 An Introduction to DataPower SOA Appliances

6 A newer and related XML specification named XQuery is much closer to true SQL capability.

Page 23: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

• XSLT—An XML language for transforming XML documents from one format toanother. If you want to transform a vendor’s XML purchase order format to your owncompany’s XML format, you can write a set of instructions in XSLT to do so.

• EXSLT—A community extension to XSLT to provide a library for things like stringmanipulation, date/time functions, and other miscellaneous library functions.

Administrative ModelAs part of the “secure by default” DataPower mantra, all remote administrative interfaces are shutdown by default. The only way to enable them is by bootstrapping the appliance via the serialport. We show how to do this in Chapter 2. After you do this, you have several options for admin-istrative interfaces. These are described in detail in Chapter 12 “Device Administration” andChapter 13 “Alternate Management Interfaces,” but we give a brief overview in the following list:

• Command-shell Admin—This can be accessed using telnet, secure-shell (SSH), or theserial port. The Command Line Interface (CLI) is an IOS-like interface, which will befamiliar to many network administrators. In the most ultra-secure environments, allremote administrative interfaces are disabled, forcing all administration to be done onlyby those with physical access to the appliances in the datacenter. For security purposes,telnet normally remains disabled.

• XML Management Interface—The XML Management interface provides a way toadminister the appliance and obtain status information via XML-based SOAP requests.There are several different specifications that can be used, including DataPower’s ownSOAP Configuration Management,7 WS-Management, and WSDM. This interface iscommonly used for automated, programmatic, or custom approaches to administration.

• WebGUI Admin Console—This is a standard browser-based administrative interface.It is the most commonly used way to administer the appliances. However, in some highsecurity or production environments, browser-based administration is not permitted andis allowed only in development environments as a convenience for developers. You cansee in Figure 1-7 that the WebGUI is well laid out, attractive, and intuitive.8

The administrative WebGUI is not only used for administering the appliance, it is also usedto create the application proxies that are the raison d’être (justification for existence) for the prod-uct. You can use the drag-and-drop capabilities of the Processing Policy editor to create work-flowtype rules for requests and responses, to carry out various actions as traffic flows through thedevice. Figure 1-8 shows the simplicity of dragging an Encrypt Action from the upper palette rowof actions to the processing rule to encrypt a message as it passes through to its destination. Fromhere, only the certificate to be used for the encryption needs to be identified, although there are

A Closer Look at the DataPower Products 15

7 This has in the past been referred to as SOMA, which is shorthand for SOap MAnagement.8 This is the admin interface for an XI50; the other models will have fewer features.

Page 24: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

many other advanced options that can be chosen, such as the encryption algorithm to use. Com-pare the ease of this to creating policies to encrypt a message on other platforms (and then factor inthe performance difference). Notice in this figure that the other types of actions can be just as eas-ily applied for tasks such as message filtering, creating or validation digital signatures, transform-ing messages, dynamic routing, and AAA. The Advanced Action contains a great deal more.

16 Chapter 1 An Introduction to DataPower SOA Appliances

Figure 1-7 DataPower Web Admin console.

Figure 1-8 Drag-and-drop policy editor.

Page 25: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Often, the browser-based console is used only in development environments for easilybuilding proxies, and from there, automated, scripted processes are used to deploy these configu-rations to test, QA and production environments, leveraging either the command-line, or SOAP-based administrative interfaces. These techniques are described in Chapter 15, “Build andDeploy Techniques.”

Programming ModelAs shown in the previous section, most of the work in configuring the appliances is done usingthe friendly drag-and-drop paradigm of the Processing Policy editor. For any customized scenar-ios not covered by the GUI, the devices can be programmed.

As the appliance is XML-centric, the custom programming model for DataPower is XSLT,which is a full Turing-complete programming language. Any custom programming is done in thislanguage.

XPath is an important technology for these XML-centric products. Aside from custom pro-gramming done in XSLT, XPath expressions are used frequently in building configurations usingthe WebGUI. For example, if you are building a policy to sign and/or encrypt selected nodesets inan XML or SOAP document, you simply provide DataPower an XPath expression so that it canlocate those nodesets. For nonprogrammer types, the DataPower WebGUI provides an easy-to-use XPath tool that enables you to load a sample document and click on the element or nodeset,and the XPath statement is generated for you.

The DataPower appliances offer much more than what standard XSLT and EXSLT have intheir libraries. The appliances support crypto operations and many different protocols that areoutside the domain of XSLT and EXSLT. To provide for custom programming that leverages thefull scope of functionality on the appliances, they include a complete library of extension func-tions and elements that can be used for XSLT custom programming. These are covered in thechapters in Part VI, “DataPower Development.”

Of course, all the power of XML, SOAP, and many of the WS-* specifications/standardsare available on the appliance. Some of the key WS- specifications are

• WS-Security—A specification to enable message integrity, message privacy, and non-repudiation,9 typically using digital signatures and encryption.

• WS-Addressing—A specification to enable Web services to communicate endpointand addressing information between themselves.

• WS-Policy—A specification that allows Web services to advertise and enforce policiesfor things like security and quality of service.

• WS-ReliableMessaging—A specification that enables Web services to reliably trans-mit SOAP messages, even when there are problems in the infrastructure that wouldotherwise lead to failure.

A Closer Look at the DataPower Products 17

9 Many security experts find non-repudiation to be a weak concept.

Page 26: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

DataPower as a Member of the Network InfrastructureAt their physical core, the DataPower appliances are network devices. Certainly, by looking atthem, this would be one’s presumption. In Figure 1.1, the most apparent feature is the set of fournetwork interface jacks on the front of the appliance. On the appliance, these are labeled MGMT,ETH0, ETH1, and ETH2. They can be split up any way you choose; for example, it is common todedicate the Management port to the administrative subnet. From there, the remaining three canbe split up so that two receive client traffic and the third connects to the backend private network,thereby segregating the network data for network security.

There are also a number of network protocols supported on the appliance. These includeHTTP, HTTPS, FTP, FTPS, SFTP, NFS, MQ, MQ/SSL, JMS, and Tibco EMS for applicationtraffic, and SNMP, SMTP, sFTP, and others for administrative usage.

We’ve mentioned SNMP a few times, which is ubiquitous and useful for infrastructuremonitoring. The appliance comes with SNMP MIB files that can be imported into your monitor-ing tools to set up monitoring policies, and the appliances can send out SNMP traps when criticalevents occur. Monitoring can also be achieved by using SOAP, as is the case with the integrationwith Tivoli ITCAM for SOA (see Figure 1-9). There are also objects built in that are useful formonitoring and auditing, such as message count and duration monitors and sophisticated service-level management tools. Most logging is done off-device, utilizing protocols such as syslog and

18 Chapter 1 An Introduction to DataPower SOA Appliances

Figure 1-9 Monitoring DataPower appliances with Tivoli ITCAM for SOA.

Page 27: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

syslog-NG, or by writing logs to a remote NFS mount. (DataPower never shares its own file sys-tem, but can connect to shared file systems on other servers.) There is a full suite of logging for-mats and protocols for your use, as well as a model for specifying event notifications on variouslevels of granularity.

Summary 19

Included with the appliances is a utility for managing multiple devices, ITCAM SE forDataPower, which is based on a cut-down version of the Tivoli ITCAM product built on the TivoliEnterprise™ Monitoring Server (TEMS). This fat-client utility is installed on a server or worksta-tion and enables appliances to be grouped into managed sets in order to keep their firmware levelsand configurations in sync. This can be used to cluster application proxies for high availabilityand better levels of service. It also backs up the configurations when it detects changes.

Similar management features are also included in the WAS 7.0 administrative console.Both utilities are covered in Chapter 29, “Multiple Device Management Tools.”

SummaryThis chapter served as an introduction and overview of the IBM WebSphere DataPower SOAappliances. We introduced you to the product family and ran through some use cases where thestrengths of this platform are emphasized, and then took a closer look and discussed at a glancehow the appliances fit in with the rest of the network infrastructure. We expand on all theseprinciples in the following chapters. Although we cannot cover every aspect of these uniquedevices, we hope to describe those most-often used in your enterprise deployments.

Page 28: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

885

Index

Numerics1000BASE-TX (Gigabit

Ethernet physical layer), 651U rack-mount devices, 4802.11b (Wireless Ethernet), 65

AAAA (Authentication,

Authorization, and Auditing), 248, 437

actions, 214configuring, 450-460examples, 461-471filtering, 801FTP, 209identity extraction, 211Info files, 212naming conventions, 868overview of, 437-438Policy Object menu, 451policy stages, 439-448Policy wizard, 452-457Post Processing Reject

Counter Tool, 606PP, 439processing, 502runtime processes, 477-486

tools, 826-828WAS, 616-626Web services security, 547wizards, 619

abstractions, 64Data Link layer, 65Network layer, 66Physical layer, 65Transport layer, 66

acceptance environment, 431Access Control Lists (ACLs),

199, 352, 504accessing

CLIs, 341-346default logs, 377interfaces, restricting, 351local fallback, 338managers, 332message context, 672-677PP, 439profiles, 333-340protocol headers, 677-679rights, 453TAM, 353, 495-505variables, 659-660

account managers, 332accounting, 438. See also AAAACLs (Access Control Lists),

199, 352, 504

Action Configuration Mode, 347actions, 116

AAA, 214Anti-Virus, 605Call Processing Rule, 263Convert Query Params to

XML, 308Error, 156Fetch, 175-176Filter, 601, 679, 686, 690Log, 392Match, 254On-Error, 700Processing Policy, 145-147Results, 254, 392Route, 185, 194, 266Set Variable, 659, 663Sign , 559SLM, 254SOAP Action Policy, 266-267Transform, 154, 239,

647, 650Transform Binary, 754, 781Validate, 153, 177-179viewing, 358XML Firewall (XMLFW),

173-181Add button, 49Add Monitor, 840

Page 29: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

886 Index

addingaccess control rules, 456application domains, 325certificates, 746credentials, 455, 818-820DataPower2, 857devices, 747, 846documents to WSRR,

273-275FSHs, 221, 250, 261headers, 817, 820multiple access policies, 335MusicService.wsdl, 269passwords, 820remote domains, 325-326responses, 832rules, 255static routes, 49WSDL, 248, 267-268, 279

Additional Properties headings, 275

Address Resolution Protocol(ARP), 48, 56, 66, 70

addressesdevices, configuring, 164Hardware, 66IP, 31, 47MAC, 48, 66private address spaces, 73resolution, 70secondary, 48WS-Addressing, 9

admin passwords, 29admin-state command, 359admin@DataPowerBookXI50, 32administration, 611

certificates, 791CLI, 345-346

accessing, 346aliases, 362-363file and configuration

management commands,360-361

help command, 348-349load and monitoring

commands, 355-356navigating, 347network configuration

commands, 349-351

network troubleshootingcommands, 351-353

object modificationcommands, 357-360

show command, 349system information

commands, 353-354deployment checklists, 876devices, 323

application domains,323-324

authentication caching,340-341

CLI access, 341-343creating domains, 325defining password

policies, 330groups, 331-336managing domains,

326-329RBM, 336-340remote domains, 325-326users, 329-330

domains, 851Eclipse (RAD) Management

Plugin, 745-749models, 15, 17multiple device management

tools, 843ITCAMSEDP, 844-853scripts, 843-844WAS, 854, 858

network administrators, 331redundant, 9system administrator, 331Web Management

Interface, 350WebGUI administrative

consoles, 31-34XML, 363, 423-424

common SOAPmanagement operations,366-371

defining, 364-365enabling SOAP Manage-

ment Interface, 363submitting SOAP

requests, 364threat protection, 595

administrative state, 788Advanced Action icon, 392Advanced Networking

configuration pane, 596agents

User Agent, 139-141. Seealso User Agent

user naming conventions, 868aliases

CLI, 362-363hosts, 79, 403-404IP, 82selecting, 164

Allow-Compression Policy, 140algorithms, 508-509Analyst, 757-758analyzing packet captures, 836Anti-Virus action, 605appliances, 879-880

administrative models, 15-17B2B, 880CLIs, logging into via, 347configuring, 21

backing up, 39completing network

configurations, 35-38connecting/powering up,

26-31planning phases, 25resources not in the

box, 24unpacking, 21-24updating firmware, 40-41WebGUI administrative

console, 31-34development

need for, 637-638XML, 638-647

dynamic backends, 127LLM, 880load commands, 355-356monitoring, 19networks

general network settings,50-54

infrastructure, 18-19interfaces, 45-48static routes, 48-49viewing status, 54-56

Page 30: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 887

overview of, 3physical characteristics of, 14powering down, 42programming models, 17serial numbers, 353services

client-side (front)processing, 112-113

HTTP Service, 123Multi-Protocol Gateway,

120-121overview of, 111-116Processing Policy, 113response processing, 114server-side (back)

processing, 113types, 117WAF, 122WSP, 118XML Firewall

(XMLFW), 117XSL Coprocessor, 123

shutdown, 361software architecture, 14TAM, integrating, 496-505target environments, 87TCP/IP, 67-76uses of, 6-12

applicationsdomains, 323-324

configuring, 400creating, 325managing, 326-329naming conventions, 865promotion, 432remote, 325-326

IDs, 498, 797 legacy, enabling, 106plugins, 319targets, 390-391testing, 816

AAA, 826-828backend spoofing,

829-834browser tools, 821-823cURL, 816-819non-HTTP tools, 823-826remote data collection, 834SoapUI, 819-820XSLT debugging, 829

troubleshooting, 799-810WAF, 122Web

cookies, 313-315form-based

authentication, 316-319headers, 310MPGW, 304overview of, 299-300perimeter security, 301query parameters and

form data, 308-309request processing, 308response processing,

311-313selecting services, 301service configuration

parameters, 304-308threat protection, 300-301WAF, 302-304

applyingplugins, 739-749Probe, 667-669variables, 660

architecture, software, 14ARP (Address Resolution

Protocol), 48, 56, 66, 70ARPANET, 59assigning

input and output, 657IP addresses, 31

asymmetric keys, 508attachments

signing, 562SOAP, 594

attacks. See also securityBillion Laughs, 598confidentiality, 589-592data integrity, 589-592dictionary, 587false message, 588jumbo payload, 583malicious include, 593mega-*, 585-586memory space breach, 593message snooping, 589Public Key DoS, 586recursion, 584replay, 588

SQL injection, 589-591system compromise, 593-594

Attribute Count field, 595attributes

LTPA, 617nodes, 639

AU (Authentication) stage,441-442, 483-487

audits, 438logs, 34, 329processing, 460

AuthDomain, 479authentication

clients, troubleshooting, 541customizing, 494form-based, 316-319headers, deleting, 619LTPA, 450, 613mutual, 507, 512perimeter security, 301SSL, 512-514, 539-540TAM, 503users, 336-341

Authentication (AU) stage,483-487

Authentication, Authorization,and Auditing. See AAA

authentication, 94, 438, 612. Seealso AAA

authorization, 94, 447-449,492-293, 818. See also AAA

wizards, 458autoconfig.cfg file, 429axes, 640

BB2B (business-to-business)

appliances, 880backends, 125-126

defining, 264-266dynamic, 126-128legacy, 754logs, 652loopbacks, 128spoofing, 829-834SSL, 528static, 126URLs, 196XML Firewall (XMLFW),

182-192

Page 31: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

888 Index

backout queues, 230backups, 39

domains, 852files, exporting, 361users, 332

basic authentication headers, 619Basic-Auth Policy, 140, 207behavior, overriding default, 819Billion Laughs attack, 584, 598binary features, advanced

transform, 779-782binding

BookService.wsdl, 276LDAP, 618multiple, configuring, 259WSDL, 247WSP, 257-258

blocks, DP-Policy, 632BookPurchase operation, 288BookQueryService, 686

configuring, 174modifying, 673-675Processing Policy, 202-203rules, 177testing, 180-181

BookService.wsdl, 275-276booting, 26. See also powering

up; startingbranches, objects, 788broadcast networks, point-to-

point connections, 61-62Brown, Kyle, xxxiibrowser tools, 821-823built-in groups, 331-332built-in log categories,

viewing, 389built-in tools, 785

applications, 799-810configuration, 785-799operations, 810-813

buttons, Add, 49Bytes Scanned field, 595

CCA (Certificate Authority), 511caching

DNS, flushing, 54ID, 515log targets, 380policies, WSDL, 269-270

stylesheets, 132XML documents, 133

calculating subnets, 71Call Processing Rule action, 263canonicalization, 548capturing

files, 809packets, 542, 835-840

categories, logs, 388-389CDATA, 593CDs, Resource, 22Certificate Authority (CA), 511Certificate Revocation Lists

(CRLs), 530Certificate Signing Request

(CSR), 531certificates

adding, 746Crypto Certificate object,

518-519devices, 531digital, 511directories, 522expired, 791naming conventions, 868for proxy, 541trust, 522WAS, 614-615

characterizing traffic, 594checklists

configuration, 57deployment, 873-876

checkOutOfServiceScheduletemplate, 719

checkpoints, configuring, 327Chunked Uploads Policy, 140CIDR (Classless Inter-Domain

Routing), 46, 71ciphers, 541, 839classes

log messages, 374networks, 73

Classless Inter-Domain Routing(CIDR), 46, 71

cleaning up output, 818CLI (command line interface),

345-346access, 341-346aliases, 362-363

commands, 29file and configuration

management commands,360-361

help command, 348-349load and monitoring

commands, 355-356methods,

importing/exporting,421-423

navigating, 347networks, 349-353object modification

commands, 357-360Reference Guide, 22show command, 349system information

commands, 353-354client-side (front) processing,

112-113clients

authentication,troubleshooting, 541

cURL, 816-819debugging, 542HTTP Service, 123interface default routes, 79IP log messages, 375MQ Client, 220roles, 512SoapUI, 819-820

co command, 29COBOL Copybook, 753, 760codes

events, 376, 387response, 311

coercive parsing attacks, 586comma-separated value

(CSV), 753command line interface (CLI)

access, 341-346aliases, 362-363commands, 29file and configuration

management commands,360-361

help command, 348-349load and monitoring

commands, 355-356

Page 32: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 889

methods, importing/exporting, 421-423

navigating, 347networks, 349-353object modification

commands, 357-360Reference Guide, 22show command, 349system information

commands, 353-354Command-shell Admin

interface, 15commands

admin-state, 359aliases, 362-363CLI, 29co, 29curl, 817dir, 360do-input, 423exit, 30file and configuration

management, 360-361GET FTP, 214groups, 342help, 348-349import-exec, 422int mgt0, 30ip address, 30ip default-gateway, 30load and monitoring, 355-356networks, 349-353object modification, 357-360show, 349show web-mgmt, 350svrsslcfg, 499system information, 353-354traceroute, 799web-mgmt, 30write memory, 30

comment nodes, 639common fields, 380common non-XML data

formats/scenarios, 753-754common SOAP management

operations, 366-371communication, SSL

handshakes, 512-514communities, 395

comparingconfigurations, 328services, 121

Compile Options Policy object, 138

compiling multiplesubscriptions, 385

completing networkconfigurations, 35-38

componentsservers, 7WebGUI administrative

consoles, 32-34concepts, WSRR, 280-284confidentiality

attacks, 589-592Web services security,

546-547config: directory, 429configuration files (XML), 871Configure XML Manager

page, 132Configured Rules section, 144configuring

AAA, 450-460access policies, 334Anti-Virus action, 605appliances, 21

backing up, 39client-side (front)

processing, 112-113completing network

configurations, 35-38connecting/powering up,

26-31planning phases, 25Processing Policy, 113resources not in the

box, 24response processing, 114server-side (back)

processing, 113services, 111-112unpacking, 21-22, 24updating appliance

firmware, 40-41WebGUI administrative

console, 31-34application domains, 400

BookQueryService, 174Processing Policy, 202rules, 177testing, 180-181, 202-203

cache policies, 269-270Call Processing Rule

action, 263checklists, 57cookies, 315Decrypt keys, 266development

integration, 647-652need for, 637-638XML, 638-647

devices, 401, 424-426addresses, 164

DNS servers, 36domains, 325

managing, 326-329remote, 325-326

endpoints, WRR, 279environments, 401events, filtering, 853exporting, 327file and configuration

management commands,360-361

filesystems, 400HTTP Service, 123HyperTerminal ports, 27interfaces, VLANs, 76load balancing, 402logs

customizing, 388-389customizing

transactions, 393division of traffic, 389-391email pagers, 387event filters, 386-387event subscriptions,

384-385failure notification, 387levels, 168Log action, 392object filters, 385-386objects, 387Results action, 392target fields, 379target types, 380-384transactions, 391

Page 33: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

890 Index

mapping, 768, 774Matching Rules, 148migration, 403

DNS, 405DNS Static Host, 405external tools, 433high availability and

consistency, 424-433host aliases, 403-404network objects, 403summaries, 409tools, 409-419, 421-423XML management

methods, 423-424XSLT, 406-409

MPGW, 194backend URLs, 196FSH, 194FTP use cases, 203-216NFS support example,

238-240protocol control

objects, 194protocol mediation,

196-202WebSphere JMS, 231-237WebSphere MQ (WMQ)

system examples,217-231

multiple bindings, 259networks

configuration commands,349-351

general network settings,50-54

interfaces, 45-49load and monitoring

commands, 355-356object modification

commands, 357-360system information

commands, 353-354troubleshooting

commands, 351-353viewing status, 54, 56

non-XML data, transforming,760-778

objects, SSL, 516persistence, 402-403

ports, 164processing rules, 255queue managers, 793Route action, 185SCM, 406services

backend types, 125-126dynamic backends,

126-128loopbacks, 128objects, 128parameters, 304-308Processing Policy,

143-147, 150-157protocol handlers,

141-142static backends, 126URL Rewrite policies,

128-130XML Manager, 131-141

sets, 856Sign action, 559SNMP

polling, 394-396traps, 396-397

SOAP log targets, 383SSL, 516-526, 528-530

CRLs, 530customizing, 532-540device certificates, 531troubleshooting, 541-544

statements, 290syslog targets, 384TAM, 496-499Throttle, 670Transform action, 154type trees, 764URLs, 233user accounts, 329-336Validate action, 153variables, XSLT, 694WSP, 120, 248-253

FSH, 257-261Processing Policy,

253-255Proxy Settings tab,

263-267reusable rules, 262-263SLM, 285-296

UDDI, 270-273user policies, 256-257viewing, 296-297WSDL, 244-248, 267-270WSRR, 273-284

XML Firewall (XMLFW),159-163

actions, 173-181backends, 182-192navigating, 169-173Processing Policy,

173, 181rules, 173, 181testing, 165-168

XML Spy, 750Connect To dialog box, 27connecting

appliances, 26-31dynamically allocated

outbound, 529Ethernets, 23point-to-point, 60-63remote servers, 352sensitive, 62services, ESB, 97-104SSL, 94, 528TCP/IP, 67

address resolution, 70packets, 67-69routing, 74routing tables, 74-75subnetworks, 70-74VLANs, 75-76

testing, 840-841troubleshooting, 798,

834-840consistency, 424-433consoles

ports, 23target logs, 381WebGUI administrative,

navigating, 31-34content

dynamic rendering, 107-108protocol headers, 686-691

Content Assist pop-up, 729Content-Type headers,

modifying, 131

Page 34: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 891

contextflow, 661messages, accessing, 672-677mismatches, 804-805naming, 805Probe, 669Processing Policy, 155programming, 655-661security tokens, 631

controlerror processing and, 695-705objects, protocols, 194

Control Paneldefault logs, accessing, 377view, 33

conventions, naming, 863AAA policies, 868application domains, 865certificates, 868configuration files (XML), 871crypto profiles, 869devices, 864filters (XSLT), 871front side handlers, 867general guidelines, 863-864Identification Credentials, 869keys, 869log targets, 870match rules, 867processing rules, 866queuing technologies, 870services, 865SSL proxy profiles, 870transforms (XSLT), 871user agents, 868validation credentials, 869XML Manager, 867

Convert Query Params to XMLaction, 308

cookiesencrypting, 302LTPA, 627modifying, 823Web applications, 313-315

copying files, 423core library functions, 641costs, TCP, 8-9COUNT function, 772

credentialsadding, 818-820Crypto Identification

Credentials object, 519Crypto Validation Credentials

object, 520-522guests, 339Identification Credentials, 869LTPA, 613MC, 442-443mismatches, 8multiple, 471naming, 455PP, 439processing, 495SLM statements, 292users, mapping, 338-340validating, 520, 564, 869

critical events,troubleshooting, 811

CRLs (Certificate RevocationLists), 530

Cross Site Scripting (XXS), 302Crypto Certificate object,

518-519Crypto Identification Credentials

object, 519Crypto Key object, 517-518Crypto Profile object, 523Crypto Validation Credentials

object, 520-522cryptography, 508-512

certificate objects, 788files, missing, 791-792profiles, 869tools, 532Web services security,

547-548CSR (Certificate Signing

Request), 531CSV (comma-separated

value), 753Cuomo, Jerry, xxixcURL, 542, 816-819customer support, 812customizing. See also

configuringAAA, 477-495, 495-505authentication, 494

authorization, 447configuration checkpoints, 327EI, 440examples of, 685-691

dynamic routing, 705-711error processing and

control, 695-705passing variables to XSLT,

691-695troubleshooting load

balancing, 712-725JMS headers, 233logs, 388-389mapping, 443messages, 231non-XML data, 779-782PP, 449-450resources, 443signing, 563SLM, 290-294SSL, 532-540users, 257, 332-333XMLFW, 160

Ddata integrity attacks, 589-592Data Link layer, 65Data Type Definitions

(DTDs), 138DataGlue, 354DataPower products, 4

administrative models, 15-17appliances. See appliancesDataPower XI50, 5-6DataPower XA35, 4DataPower XS40, 5firmware, 879hardware, 878-879history of, 877-878network infrastructure

members, 18-19physical characteristics of, 14Product Home Page, 24programming models, 17software architecture, 14

datatypes, multiple deploymentpatterns, 101-103

Page 35: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

892 Index

date:difference() function, 722DB-9 serial ports, 4De-Militarized Zone (DMZ), 512deadLetterQueue, 221debugging

directories, 670logs, 378Probe, 488, 668SQL data source objects, 796SSL, 542-544transaction probes, 802-804WTX transforms, 774XSLT, 734, 738, 829

Decrypt key, 266decryption, 508-509, 565-577default behavior, overriding, 819Default Credential names, 455default gateways, 47default logs, 377-378default routes, 75, 79default XML Manager, 131. See

also XML Managerdefects, product, 812defining

backends, 264-266caching policies, 340custom log categories, 388dynamic backends, 184-192endpoints, 247failure notification, 388filters, 335local files, 381logs, target fields, 380Management Service APIs,

364-365off-device trap listeners, 397password policies, 330remote domain configuration

files, 326responses, 831SNMP communities, 395static backends, 183-184static hosts, 192variables, programming,

657-659deleting

cookies, 315EI, 620

entries, 456headers, 619security headers, 631

demilitarized zones. See DMZsDenial of Service (DoS), 581deployment

checklists, 873-876DataPower, 778patterns, topologies, 91-108policies, modifying, 77-79scenarios, external/internal,

77-79descendant-or-self axis, 641Detail field, 788detecting non-XML files, 782detours, routing, 592developers, 332developerWorks, 25development, 431

domains, 324IDEs, 727-738integration, 647-652need for, 637-638non-XML data, transforming,

756-760tools, 727XML, 638-647

devices. See also appliancesadding, 747, 846addresses, configuring, 164administration, 323

application domains,323-324

CLI access, 341-343creating domains, 325defining password

policies, 330managing domains,

326-329RBM, 336-340remote domains, 325-326user authentication

caching, 340-341user groups, 331-336users, 329-330

certificates, 531

CLIsaccessing, 346file and configuration

management commands,360-361

help command, 348-349load and monitoring

commands, 355-356navigating, 347network configuration

commands, 349-351network troubleshooting

commands, 351-353object modification

commands, 357-360show command, 349system information

commands, 353-354configuration files,

editing, 427configuring, 401, 424-426filesystems, 400monitoring, 393-397multiple management tools,

843-853, 854, 858naming conventions, 864networks

overview of, 59scenarios, 77-89TCP/IP, 67-76terminology, 60-66

DHCP (Dynamic HostConfiguration Protocol), 47

dialog boxesConnect To, 27Windows Networking, 72

Dictionary Attack Protectiontext, 605

dictionary attacks, 587different network zone scenarios,

85-89digests, 509-510digital certificates, 511digital signatures, 510, 549,

555-564DIME (Direct Internet Message

Encapsulation), 555dir command, 360

Page 36: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 893

directoriescertificates, 522config:, 429debugging, 670filesystems, configuring, 400FTP, 208. See also FTP

Disallow GET (and HEAD)configuration, 595

Distinguished Name (DN),337, 710, 804

division of log traffic, 389DMZs (demilitarized zones),

6-8, 86, 512DN (Distinguished Name),

337, 710, 804DNS (Domain Name Service), 52

configuring, 36general network settings,

52, 54migration, 405-409servers, viewing, 351

do-action operation, 367-369do-input command, 423Document Crypto Map, 558, 568Document Object Model

(DOM), 877documents

encryption, 566file systems, writing to,

670-672flow, 657FSH, 208identity, 406-408migration summaries, 409modifying, 673-675OpenSSL, 841requests, 252, 479signing, 555SOAP, 251WSDL, 244-248, 267-270WSRR, adding to, 273-275XML

caching, 133labels, 639parsing, 675-677requests, 165serializing, 675-677signing, 557

DOM (Document ObjectModel), 877

Domain Name Service. See DNSdomains, 32

applications, 323-324configuring, 400creating, 325managing, 326-329naming conventions, 865remote, 325-326

backups, 852CLI user access, 342development, 324log messages, 374managing, 851search configuration, 53status, 788, 790

DoS (Denial of Service), 581multiple-message

attacks, 587single-message attacks,

583-586down FSHs, viewing, 792down handlers, 790-792down helper objects, 796-798down messaging server

objects, 793DP-Policy blocks, 632dp:parse() extension

function, 782dp:reject function, 690dqmq URLs, 218drag-and-drop policy editors, 17DTDs (Data Type

Definitions), 138dynamic backends, 125. See also

backendsconfiguring, 126-128defining, 184-192logs, 652

dynamic content rendering,107-108

Dynamic Host ConfigurationProtocol (DHCP), 47

dynamic routing, 652, 705-711dynamically allocated outbound

connections, 529

EEAR (Enterprise Archive)

files, 611Echo service, 166Eclipse

Co-processing Plugin, 22RAD Management Plugin,

22, 745-749XSLT Coproc Plugin,

739-744ECMAScript, 642EDI message formats, 754editing

device configuration files, 427

files, 748-749Processing Policy, 143text, 728-729, 736

editors, policies, 17efficiency, 661EI (Extract Identity), 440,

478-482, 620EJB (Enterprise Java Bean), 618elements

Filter action, 679nodes, 639XML, 644-647

emailpagers, 387target logs, 383

enablinglegacy applications, 106Probe, 667SNMP polling, 394, 396SOAP Management

Interfaces, 363SSH, 346

encapsulation, 507packets, 68XML, 593

encode() function, 423encryption, 508-509

cookies, 302key exchanges, 514Web services security, 550WS-Security, 565-577

Encryption Mode, 382

Page 37: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

894 Index

endpointsdefining, 247NFS, 239SSL, 94status, 250WSRR, 279

Enterprise Archive (EAR) files, 611

Enterprise Java Bean (EJB), 618Enterprise Service Bus. See ESBentities, selecting, 282entries, deleting, 456enumeration, WSDL, 591environments

acceptance environment, 431configuring, 401deployment checklists,

874-875development environment, 431differences among, 431IDEs, 727-738production environment, 431sensors status, 34target, 87test environment, 431

ER (Extract Resources),443-446, 490

ErrorControl Policy, 700errors

alarms, 23handling, Processing Policy,

155-157Internal Error (from

client), 800processing, 229-230, 695-705RAD, 729rules, redirects from, 313viewing, 797Web services, 807

ESB (Enterprise Service Bus),92-104, 193-194, 512

eth2 interfaces, 835Ethernets, 23, 68, 60events

AAA, filtering, 801code, log messages, 376critical, troubleshooting, 811filters, 386-387, 853subscriptions, 384-385suppressing, 387

evolution of DataPowerappliances, 879-880firmware, 879hardware, 878-879history of, 877-878LLM, 880

Example Configurations Guide, 22

examples, AAA, 461LDAP integration, 465-469real-world policies, 471-474simple on-box AAA, 461-464

exchangeskeys, 514messages, 546

executingrules, 137XSLT, 738

exit command, 30expired certificates, 791exporting

configuration, 327, 421-422files, 361, 423intervals, 419packages, 410-419private keys, 532

expressionsPerl Compatible Regular

Expressions, 457regular, 642-643XPath, 188, 639-641, 730

EXSLT extensions, 646, 650eXtensible Access Control

Markup Language (XACML), 473

Extensible Stylesheet Language.See XSL

Extension Functions andElements Catalog, 658

extensionsEXSLT, 646, 650Filter action, 679functions, 644-647traces, 468URL Open, 681-683

external authentication, 94external authorization, 94external networking scenarios,

77-79

external servers, reliance on, 336external tools, 815

applications, 816-834configuration management,

433Extract Identity (EI), 440,

478-482, 620Extract Resources (ER),

443-446, 490extracting cookies, 315

Ffailover, 874failure notification, 387. See also

troubleshootingfalse message attacks, 588features, XML, 638-647Federal Information Processing

Standard (FIPS), 501Fetch action, 175-176FFD (Flat File Descriptor), 757fields

common, 380Detail, 788digital signatures, 558encryption, 567target logs, 379-384viewing, 374

FIFO (First-In First-Out), 133files

autoconfig.cfg, 429commands, 360-361configuration (XML), 871copying, 423cryptographic, missing,

791-792documents, writing to,

670-672EAR, 611editing, 748-749importing/exporting, 423local, defining, 381non-XML, detecting, 782RAD, 728-729saving, 457target logs, 381XML, building schemas,

735-736

Page 38: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 895

filesystemsconfiguring, 400type values, 210Virtual Ephemeral Filesystem

Type, 214Filter action, 601, 679, 686, 690filters, 640

AAA, 801defining, 335events, 386-387, 853objects, 385-386XSLT, 871

Financial Information Exchange(FIX), 760

FIPS (Federal InformationProcessing Standard), 501

FirefoxCookie Editor, 626headers, viewing, 821

firewalls, 352WAF, 122, 302-304XML, 833XML Firewall (XMLFW),

117, 159actions, 173-181backends, 182-192creating, 160-163navigating, 169-173Processing Policy,

173, 181rules, 173, 181testing, 165-168

firmware, 879images, 856loading, 849queries, 354updating, 40-41upgrading, 361

First-In First-Out (FIFO), 133FIX (Financial Information

Exchange), 760Flash Configuration Mode, 347Flat File Descriptor (FFD), 757flooding, XML, 587flow

AAA, XML in, 477-495context, 661documents, 657

flushingcaches, 341DNS, 54

Forbid setting, 595form data, 308-309form-based authentication,

316-319formatting. See also configuring

common non-XML data,753-754

do-input command, 423EDI messages, 754logs, 380XML in AAA flow, 477-495

forms, testing HTML, 309Front Side Handler. See FSHfrontends, pseudo Web

service, 754FSH (Front Side Handler)

adding, 221, 250, 261documents, 208down, viewing, 792FTP Poller, 204host aliases, 404HTTPS, 199MQ, 226objects, 116protocols, 194SSL, 534WSP, configuring, 257-261

FTP (File Transfer Protocol)Client Policies, 140Poller FSH, 204SSL and, 533-535use cases, 203-216

ftpServer MPGW, 212Functional Map Wizard, 772-773functionality, 630, 642functions. See also commands

core library, 641COUNT, 772date:difference(), 722dp:parse() extension, 782dp:reject, 690encode(), 423EXSLT, 646extensions, 644-647Set-Variable Extension, 659

Ggateways

default, 47hosts, renaming, 307-308MPGW, 193

configuring, 194-216ESB, 193-194NFS support example,

238-240Web applications, 304WebSphere JMS, 231-237WebSphere MQ (WMQ)

system examples,217-231

Multi-Protocol Gateway,118-121

general guidelines for namingconventions, 863-864

general network settings, 50-54generating

Device Certificates, 531packet captures, 835

GET FTP command, 214GET MQ messages, 220GET process, 216get-config operation, 369get-status operation, 366-367gigabytes, 583global configuration mode, 348golden schema, 103governance, policy, 553-554graphs, latency, 288groups

backend servers, 126built-in, 331-332commands, 342users, 330-336XML Manager load

balancers, 133-136guests, 332, 339

Hhandlers

FSH. See FSHprotocols, 141-142troubleshooting, 794

handshakes, SSL, 512-514hardened 1U rack-mount

devices, 4

Page 39: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

896 Index

hardware, 812, 878-879Hardware address, 66Hardware Security Module

(HSM), 4, 23, 532Hash Message Authentication

Code (HMAC), 632hashes, 509-510HBA (Host Bus Adapter), 100headers

adding, 817, 820Authorization, 818deleting, 619Ethernets, 68IP, 68JMS, customizing, 233modifying, 131, 821protocols, 677-679, 686-691request, 310security, 631TCP, 69

health monitoring commands,355-356

Hello messages, 513help command, 348-349helper objects, 796-798HermesJMS, 826hierarchies, service objects, 115high availability, 424-433, 611high-level SOA appliance

components, 7hijacking resources, 587history of DataPower, 877

appliances, 879-880firmware, 879hardware, 878-879integration, 878LLM, 880performance, 877-878security, 878

HMAC (Hash MessageAuthentication Code), 632

Host Bus Adapter (HBA), 100hosts

aliases, 79, 403-404renaming, 307-308selecting, 164static, 53, 192, 405

HotelRoutingMap, 190

HSM (Hardware SecurityModule), 23, 532

HTML (Hypertext MarkupLanguage), testing, 309

HTTP (Hypertext TransferProtocol)

CRLs, 530FSH on port 4002, 221FTP servers over, 214methods, 305to JMS MPGW, 238MPGW, 194to MQ , 220, 225NFS to, 239protocol mediation, 196-202server-side (back)

processing, 113services, creating, 834

HTTPS (SSL over HTTP), 551FSH, 199MPGW, 194protocol mediation, 196-202

HyperTerminal ports,configuring, 27

IIBM Message Queuing

protocol, 100IBM Tivoli Composite

Application Manager SystemEdition for DataPower. SeeITCAMSEDP

ICMP (Internet Control MessageProtocol), 66

ID caching, 515Identification Credentials, 869Identification Methods

hotlink, 452identity documents, 406-408Identity Extraction (IE), 471IDEs (Integrated Development

Environments), 727-738idle timeout values, 38IE (Identity Extraction), 471IETF (Internet Engineering Task

Force), 549IIOP (Internet Inter-ORB

Protocol) requests, 614

images, firmware, 856impersonation, 508-510implementing appliances, 21

backing up, 39completing network

configurations, 35-38connecting/powering up,

26-31planning phases, 25resources not in the box, 24unpacking, 21-24updating appliance firmware,

40-41WebGUI administrative

console, 31-34import-exec command, 422importing packages, 410-422inbound configuration, SSL, 526infrastructure, network members,

18-19Inject Header Policy, 140injection attacks, 591INPUT, 155, 661, 669input, 657, 780Install Guide, 22int mgt0 command, 30Integrated Development

Environments (IDEs), 727-738Integrated Solutions Console.

See ISCintegrating, 647-652

history of DataPower, 878LDAP, 465-469platforms, 11-12security, WAS, 616-626,

629-633TAM, 496-505

integrity, 508-510data integrity attacks,

589-592transactions, 611Web services security, 546

interaction, Power MQData, 217interfaces

CLI, 345-346access, 341-3346aliases, 362-363file and configuration

management commands,360-361

Page 40: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 897

help command, 348-349load and monitoring

commands, 355-356navigating, 347network configuration

commands, 349-351network troubleshooting

commands, 351-353object modification

commands, 357-360show command, 349system information

commands, 353-354clients, default routes, 79eth2, 835general network settings,

50-54IP, aliases, 82multiple on one network,

83-85networks, configuring, 45-48status, viewing, 54-56VLANs, configuring, 76Web Management

Interfaces, 350XML Management

Interfaces, 363-371Internal Error (from client), 800internal networking scenarios,

77, 79internal SSL, 588International Standards

Organization (ISO), 64Internet Control Message

Protocol (ICMP), 66Internet Engineering Task Force

(IETF), 549Internet Inter-ORB Protocol

(IIOP) requests, 614Internet Protocol. See IPintervals, exporting, 419IP (Internet Protocol), 59,

66, 375addresses, 31, 47aliases, 82headers, 68

ip address command, 30ip default-gateway command, 30ip.addr eq 192.168.1.199 field, 837

ip.src eq 192.168.1.199 field, 838ISC (Integrated Solutions

Console), 854-859ISO (International Standards

Organization), 64ITCAM SE for DataPower, 22ITCAMSEDP (IBM Tivoli

Composite ApplicationManager System Edition forDataPower), 399, 844

J–KJava EE, 611-612, 632JAX RPC handlers, 632JMS (WebSphere), 231-237jumbo payload attacks, 583

Kerberos options, 450keys, 508-509

Crypto Key object, 517-518Decrypt, 266exchanges, 514naming conventions, 869PKI, 548Private, exporting, 532selecting, 792WAS, 614-615

keystores, LTPA, 629Kuznetsov, Eugene, xxvii

Llabels, XML documents, 639last mile security, 632last resorts, troubleshooting,

812-813latency graphs, 288layers

Data Link, 65Network, 66OSI, 64Physical, 48, 65security, 618Transport, 66XML Aware Network, 12

lazy authentication, 612LDAP (Lightweight Directory

Access Protocol)Admin tool, 827-828authentication servers, 337

binding, 618Distinguished Name, 829integration, 465-467, 469searching, 486

ldap field, 838ldap-search call, 486legacy applications,

enabling, 106legacy backends, 754levels, configuring, 168Liaison Contivo Analyst. See

Analystlibraries, core functions, 641Lightweight Directory Access

Protocol. See LDAPLightweight Third Party

Authentication (LTPA),450, 613

attributes, 617cookies, 627keystores, 629WAS, 616-629

limitations of XML Parser Limitstabs, 137-138

link/activity lights, 23linking schemas, 246listeners

mock service, 831off-device trap, defining, 397testing, 353troubleshooting, 795

lists, 668, 806LLM (Low Latency

Messaging), 880load balancing

configuring, 402groups, XML Manager,

133-136messages, 126SSL, 515troubleshooting, 712-725VRRP, selecting, 844

load commands, 355-356LoadBalancedBookService

log, 724loading. See also adding

documents in WSRR, 274firmware, 849

local fallback access, 338

Page 41: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

898 Index

local files, defining, 381locate light, 23location paths, 640Log action, 392logic, error processing, 697logical partitions (LPARs), 323login, 347logout, 32logs

audit, 34, 329custom, 388-389debug, 542default, 377-378division of traffic, 389-391dynamic backends, 652formatting, 380FTP, 214levels, configuring, 168messages, 373-376,

662-666, 858No Status Request, 191objects, 387parsing, viewing, 676Platinum request, 190reviewing, 801system, 799-801TAM, 498targets, 379-387, 810-811,

853, 870transactions, 391-393viewing, 791WAS, 622Web service requests, 252

loopbacks, 126, 128firewalls, 118loopback-proxy options,

selecting, 162XML firewalls, 833

loopbacks, 126, 128Low Latency Messaging

(LLM), 880LPARs (logical partitions), 323LTPA (Lightweight Third Party

Authentication), 450, 613attributes, 617cookies, 627keystores, 629WAS, 616-629

MMAC addresses, 48, 66magic numbers, 406-409maintenance, 611malicious include attacks, 593malicious XML, 96management

admin passwords, 29certificates, 791CLI, 345-346

accessing, 346aliases, 362-363file and configuration

management commands,360-361

help command, 348-349load and monitoring

commands, 355-356navigating, 347network configuration

commands, 349-351network troubleshooting

commands, 351-353object modification

commands, 357-360show command, 349system information

commands, 353-354configuration commands,

360-361domains, 326-329, 851Eclipse (RAD) Management

Plugin, 745-749multiple device tools, 843

ITCAMSEDP, 844-853scripts, 843-844WAS, 854, 858

network deploymentscenario, 80-82

queues, configuring, 793RBM, 336-340SCM, 406SLM, 438TAM, 353users, 329

creating, 329-330defining password

policies, 330groups, 331-336

Web Management Interface, 350

Web Services Management, 104

XML, 423-424XML Management

Interface, 363common SOAP

management operations,366-371

defining, 364-365enabling SOAP Manage-

ment Interface, 363submitting SOAP

requests, 364XML Manager

naming conventions, 867threat protection, 595

Management Information Bases(MIBs), 394

manuals, reading, 22Map Credentials (MC), 442-443,

463, 488-489Map Designer, 768Map Resource (MR), 446-447,

463, 490-491mapping

Analyst, 758configuring, 774creating, 768Document Crypto Map,

558, 568precompiling, 781runtimes, modifying, 776user credentials, 338-340

masking resources, 97Match action, 254Match Rules, 642

cookies, 313-314naming conventions, 867Processing Policy, 147, 150troubleshooting, 805-806

Maximum Node Size field, 595Maximum Transmission Unit

(MTU), 48MC (Map Credentials), 442-443,

463, 488-489mediation, protocols, 196-202mega-* attacks, 585-586

Page 42: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 899

members, troubleshooting, 806memory space breach attack, 593menus, AAA Policy Object, 451message

logs, 858sniffing, 840

Message Count Monitor object, 607

Message Filter action object, 608messages

backend types, 125-126dynamic, 126-128loopbacks, 128static, 126

context, accessing, 672-677customizing, 231down server objects, 793EDI, 754EI, 440exchanges, 546GET MQ, 220Hello, 513integrity, 546logging, 662-666logs, 376

classes, 374client IP, 375customizing, 388-389, 393division of traffic, 389-391domains, 374email pagers, 387event code, 376event filters, 386-387event subscriptions,

384-385failure notification, 387Log action, 392object filters, 385-386objects, 375, 387overview of, 373priority, 375Results action, 392target fields, 379target types, 380-384timestamps, 374transactions, 375, 391types, 374

multiple-message DoSattacks, 587

Out of Service, 714rejection, 689requests, 365

WSDL, 245responses, 365single-message DoS attacks,

583-586snooping attacks, 589SOAP, 594, 704tampering protection, 600testing, 807viewing, 226XSL, 662

metadataProcessing Metadata

option, 444service variables, 658

methodsCLI, importing/exporting,

421-423HTTP, 305migration configuration tools,

410-423high availability and

consistency, 424-433XML management

methods, 423-424Methods and Versions tab, 305MIBs (Management Information

Bases), 394migration, configuring, 403

DNS, 405DNS Static Host, 405external tools, 433high availability and

consistency, 424-433host aliases, 403-404network objects, 403summaries, 409tools, 409-423XML, 423-424XSLT, 406-409

MIME (Multipurpose InternetMail Extensions), 549

mismatches, 8context, 804-805

missing cryptographic files,791-792

mock service listeners,starting, 831

MockResponse window, 832MockService, 832models

administration, 15-17programming, 17

modes, physical, 48modifying

cookies, 823default logs, 378deployment policies, 418documents, 673-675headers, 131, 821objects, 357-360Web Management

Interfaces, 350monitoring

adding, 840appliances, 19certificates, 791commands, 355-356devices, 393

configuring SNMPpolling, 394-396

MIBs, 394sending SNMP traps,

396-397services, 397SLM, 104, 112, 285-290

customizing, 290-294service priority, 295-296

moving files, 748MPGW (Multi-Protocol

Gateway Service), 193configuring, 194-216ESB, 193-194methods, 305NFS support example,

238-240requests, 305responses, 305versions, 305Web applications, 304WebSphere JMS, 231-237WebSphere MQ (WMQ)

system examples, 217-231

Page 43: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

900 Index

MQClient, 220FSH, 226processing metadata, 445Queue, 220Queue Manager object,

229, 536Request Response to HTTP

pattern, 225Server, 219SSL and, 536tools, 823-826

MR (Map Resource), 446-447,463, 490-491

MTU (Maximum TransmissionUnit), 48

Multi-Protocol Gateway,120-121

Multi-Protocol Gateway Service.See MPGW

multiple access policies,adding, 335

multiple bindings,configuring, 259

multiple credentials, 471multiple datatypes, 101-103multiple device management

tools, 843ITCAMSEDP, 844-853scripts, 843-844WAS, 854, 858

multiple inputs, 780multiple interfaces on one

network, 83-85multiple non-XML data

formats, 754multiple outputs, 779multiple protocol deployment

patterns, 99-100multiple resources, 490multiple subscriptions,

compiling, 385multiple-message DoS

attacks, 587protection, 598

Multipurpose Internet MailExtensions (MIME), 549

MusicService.wsdl, 269mutual authentication, 507, 512

SSL, 539-540

Nname-value input processing, 302namespaces

nodes, 639XML, 641

namingcontext, 805conventions, 863

AAA policies, 868application domains, 865certificates, 868configuration files

(XML), 871crypto profiles, 869devices, 864filters (XSLT), 871front side handlers, 867general guidelines,

863-864Identification

Credentials, 869keys, 869log targets, 870match rules, 867processing rules, 866queuing technologies, 870services, 865SSL proxy profiles, 870transforms (XSLT), 871user agents, 868validation credentials, 869XML Manager, 867

credentials, 455DN, 337hosts, renaming, 307-308QNames, 644relationships, 281services, 162

NAS (Network AttachedStorage), 100

navigatingAAA Policy Object

menu, 451browser tools, 821-823CLI, 345-347

accessing, 346aliases, 362-363file and configuration

management commands,360-361

help command, 348-349load and monitoring

commands, 355-356network configuration

commands, 349-351network troubleshooting

commands, 351-353object modification

commands, 357-360show command, 349system information

commands, 353-354CLIs, 347WebGUI administrative

consoles, 31-34XML Firewall (XMLFW),

169-173XML Management

Interface, 363common SOAP

management operations,366-371

defining, 364-365enabling SOAP Manage-

ment Interface, 363submitting SOAP

requests, 364NCP (Network Control

Protocol), 59need for development, 637-638Network Attached Storage

(NAS), 100Network Control Protocol

(NCP), 59Network File System (NFS), 100Network layer, 66networks

administrators, 331broadcast, point-to-point

connections, 61-62captures, 839classed, 73configuration commands,

349-351devices

overview of, 59scenarios, 77-89TCP/IP, 67-76terminology, 60-66

Page 44: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 901

file and configurationmanagement commands,360-361

general network settings,50-54

infrastructure members,18-19

interfacesconfiguring, 45-48static routes, 48-49

load and monitoringcommands, 355-356

nodes, 60objects, 357-360, 403paths, selecting, 352routing, point-to-point

connections, 62-63sniffing, 589status, 54-56system information

commands, 353-354troubleshooting, 794-795, 834

commands, 351-353packet captures, 835-840

zones, 85-89New MockResponse, 832NFS (Network File System), 100

support example, 238-240target logs, 383

No Status Request Log, 191No Status route rule, 189nodes, 60, 639

point-to-point connections,60-62

point-to-routed networks,62-63

nodesets, 486non-HTTP tools, 823-826non-repudiation, 510, 547non-XML data, transforming, 753

common formats/scenarios,753-754

creating, 760-770, 772-778customizing binary features,

779-782tools, 755-760

NULL, 155, 649, 661SSL connections, testing, 839

numbersmagic, 406-409serial, 353

Oobjects

AAA, configuring, 450-460branches, 788configuring, 516Crypto Certificate, 518-519Crypto Identification

Credentials, 519Crypto Key, 517-518Crypto Profile, 523Crypto Validation

Credentials, 520-522Decrypt keys, 266domain status, 790down helper, 796

SQL data source, 796TAM, 797-798

down messaging servers, 793filters, 385-386FSH, 116

configuring, 257-261logs, 387

email pagers, 387failure notification, 387messages, 375

Message Count Monitor, 607Message Filter action, 608modifying, 357-360naming conventions, 864

AAA policies, 868application domains, 865certificates, 868configuration files

(XML), 871crypto profiles, 869devices, 864filters (XSLT), 871front side handlers, 867Identification

Credentials, 869keys, 869log targets, 870match rules, 867processing rules, 866queuing technologies, 870services, 865SSL proxy profiles, 870transforms (XSLT), 871user agents, 868validation credentials, 869XML Manager, 867

networks, 403processing, 115protocol control, 194services, 128

hierarchies, 115status, 164URL Rewrite policies,

128-130XML Manager, 131-141

SLM Resource Class, 293SSL Proxy Profile, 523-526status, 786-788

viewing, 792TAM, 500-505troubleshooting, 358UDDI Registry, 272

offloading files, 361On-Error actions, 700Open Systems Interconnection.

See OSIOpenSSL, 423, 841operating systems, 14. See also

architectureoperational state, 787operations

do-action, 367-369get-config, 369get-status, 366-367set-config, 370-371targets, 390troubleshooting, 810-813

optimizing performance, 10-11options. See also customizing

authorization, 447configuration checkpoints, 327EI, 440Kerberos, 450mapping, 443PP, 449-450Processing Metadata, 444resources, 443users

groups, 332-333policies, 257

orchestration, 103-104OSI (Open Systems

Interconnection) layers, 64Out of Service message, 714outbound configuration, SSL,

528-529

Page 45: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

902 Index

OUTPUT, 661context, 155xsl copies of, 690

outputassigning, 657cleaning up, 818multiple, 779

overriding default behavior, 819

Ppackages, importing/exporting,

410-419, 422packets, 60

captures, 542, 835-840encapsulation, 68point-to-point connections,

60-62TCP/IP, 67-69

address resolution, 70routing, 74routing tables, 74-75subnetworks, 70-73VLANs, 75-76

viewing, 837pagers, email, 387parameters

Convert Query Params toXML action, 308

queries, 308-309services, configuring,

304-308URL Open, 682WS-Policy policy, 576

parsingcoercive attacks, 586logs, viewing, 676XML, 675-677XML Parser Limits tabs,

137-138partitions, LPARs, 323Pass Thru option, 162passing variables to XSLT,

691-695passwords, 329, 453

adding, 820admin, 29policies, 330sanitizing, 482User Agent, 206

pathslocation, 640selecting, 352

pattern deployment, 91-108payloads, 69

jumbo attacks, 583PCREs (Perl Compatible Regular

Expressions), 130, 457, 642PED ports, 23performance, 10-11, 631

appliances, uses of, 10-11history of DataPower,

877-878testing, 873-874

perimeter security, 8, 301Perl Compatible Regular

Expressions (PCREs), 130,457, 642

permissionsCLI, 357sniffing, 589

persistence, configuring,402-403

phases, services, 112client-side (front) processing,

112-113Processing Policy, 113response processing, 114server-side (back)

processing, 113physical characteristics of

appliances, 14Physical layer, 48, 65physical mode, 48Pin Entry Device (PED), 14ping tests, 352, 798PIPE, 661PKI (Public Key Infrastructure),

509, 548, 632Plain Old Telephone System

(POTS), 65planning appliances, 21

phases, 25resources not in the box, 24unpacking, 21-24

platformsintegrating, 11-12mismatches, 8

Platinum request log, 190

Platinum route rule, 189plugins, 319, 739

EclipseRAD Management

Plugin, 745-749XSLT Coproc Plugin,

739-744XML Spy (Altova), 749-750

plus (+) sign, 254, 266PMO (PUT Message Options)

parameters, 218point-to-point connections,

60-61broadcast networks, 61-62routed networks, 62-63

Point-to-Point Protocol (PPP), 65point-to-point security, 540Point-to-Point Tunneling

Protocol (PPTP), 66policies

AAAAU, 441-442AZ, 447-449configuring, 450-460EI, 440ER, 443-446MC, 442-443MR, 446-447naming conventions, 868PP, 449-450stages, 439-450

access, creating, 334Basic-Auth Policy, 207caches

defining, 340WSDL, 269-270

editors, 17ErrorControl Policy, 700Filter action, 679FTP, 535passwords, 330Processing Policy, 113,

143, 253actions, 145-147contexts, 155creating, 150-151editing, 143error handling, 155-157Matching Rules, 147, 150

Page 46: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 903

MPGW, 200priority, 152rules, 144, 153-154, 656WSP, 253-255XML Firewall (XMLFW),

173, 181Scheduled Processing

Policy, 137Security Policy

specification, 576SLM, 608SOAP Action, 266-267styles, 662URL Rewrite, 128-130user, 256-257WS-Policy, 9, 553-554XACML, 473

Policy Parameters, 576polling, 208, 394-396populating credentials, 520ports, 202. See also connecting

configuring, 164HyperTerminal, 27TCP

status, 55testing listeners, 353

troubleshooting, 795Post Processing (PP), 439,

449-450, 474, 495POTS (Plain Old Telephone

System), 65pound sign (#), 347power

appliances, 26-31indicators, 23powering down appliances, 42switches, 4

PP (Post Processing), 439,449-450, 474, 495

PPP (Point-to-Point Protocol), 65PPTP (Point-to-Point Tunneling

Protocol), 66predefining context, 661Predicate Query, 640priority

default logs, 378log messages, 375Processing Policy, 152SLM, 295-296

privacy, 508SSL, 508-509transaction logging, 392

private address spaces, 73private keys, exporting, 532privileges, root, 593Probe, 480

debugging, 488requests, 675transactions, 802-804variables, 667-669

processingAAA, 502audits, 460client-side (front), 112-113credentials, 495deployment checklists,

875-876errors, 229-230, 695-705GET, 216instruction nodes, 639message context, 672-677metadata, 445multiple protocols, 99objects, 115PP, 439Probe, 481Processing Policy, 113PUT, 216requests, 308-310responses, 114, 311-313rules, 116

configuring, 255naming conventions, 866

runtime, 477-486, 488-495Scheduled Processing Policy

rules, 137server-side (back), 113troubleshooting, 114

Processing Metadata option, 444Processing Policy, 116, 143

actions, 145-147contexts, 155creating, 150-151editing, 143error handling, 155-157Matching Rules, 147, 150MPGW, 200

priority, 152rules, 144, 153-154, 656WSP, 253-255XML Firewall (XMLFW),

173, 181ProcessRequestQueue

MPGW, 228production environments, 431products. See appliancesprofiles

access, 333-340crypto, 869Crypto Profile object, 523SSL Proxy Profile,

523-526, 870programming

file systems, 670-672Filter action, 679IDEs, 727

RAD, 727-734XML Spy, 736-738

messagesaccessing context,

672-677logging, 662-666

models, 17protocols, 677-679routing, 681security, 484URL Open, 681-683variables, 655-659

accessing, 660configuring Probe,

667-669predefining context, 661

XSLTdynamic routing, 705-711error processing and

control, 695-705examples of, 685-691passing variables to,

691-695troubleshooting load

balancing, 712-725promoting services, 430-433properties

FSH document control, 208Visible Domains, 325

Page 47: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

904 Index

protectionthreats, 300-301XML threat, 594-608XSS, 302

Protocol Threat Protection, 599protocols

non-HTTP tools, 823-826control objects, 194handlers, 141-142headers, 677-679, 686-691mediation, 196-202MPGW, 193

configuring, 194-204,206-216

ESB, 193-194NFS support example,

238-240WebSphere JMS, 231-237WebSphere MQ (WMQ)

system example,217-231

multiple deployment patterns,99-100

Proxy Policy, 139proxy servers

SSL Proxy Profile, 523-526WSP, 243

creating, 248-253FSH configuration,

257-261Processing Policy,

253-255Proxy Settings tab,

263-267reusable rules, 262-263SLM, 285-296UDDI, 270-273user policies, 256-257viewing, 296-297Web service overview,

243-244WSDL, 244-248, 267-270WSRR, 273-284

Proxy Settings, 263backends, defining, 264-266Decrypt key, 266SOAP Action Policy, 266-267

proxying Web applicationscookies, 313-315form-based authentication,

316-319headers, 310overview of, 299-300perimeter security, 301plugins, 319query parameters and form

data, 308-309request processing, 308response processing, 311-313services

configuration parameters,304-308

MPGW, 304selecting, 301WAF, 302-304

threat protection, 300-301pseudo Web service

frontends, 754Pubkey-Auth Policy, 140Public Discussion Area, 25Public Key DoS attacks, 586Public Key Infrastructure (PKI),

509, 548, 632purpose-built appliances, 3PUT

Message Options (PMO)parameters, 218

MQ responses, 220processes, 216

QQA (quality assurance)

environments, 324QNames, 644queries

Convert Query Params toXML action, 308

firmware, 354parameters, 308-309

Queue Manager object, 222queuing

backout, 230managers, configuring, 793MQ Queue, 220technologies, 870

RRAD (Rational Application

Developer), 727-734ranges, testing, 720RBM (Role-Based

Management), 336-340reading cookies, 314real-world policies, AAA,

471-474recompiling maps, 781records, COBOL, 772recursion attacks, 584Redbooks, 25redirects

requests, 306responses, 312-313

redundant administration, 9registries

UDDI, 270-273WSRR, 273-284

regular expressions, XML,642-643

Reject Counter Tool, 607rejection messages, 689relationships

Filter action, 679naming, 281

reliability, 631reliance on external servers, 336remote authentication,

selecting, 336remote data collection, 834remote domains, configuring,

325-326remote servers, connecting, 352renaming hosts, 307-308rendering dynamic content,

107-108replacing WAS plugins, 319replay attacks, 588repositories, WSDL documents

in, 282. See also WSRRRepresentational State Transfer

(REST) requests, 615request

IIOP, 614perimeter security, 301

Request Type, 162requestQueue, 221

Page 48: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 905

requests, 690-691CSRs, 531documents, 252, 479headers, 310logs, 252messages, 245, 365MPGW, 305No Status Request Log, 191Platinum request log, 190PP, 439Probe, 669processing, 308-310redirects, 306REST, 615snoop application, 624SOAP, 251, 364SoapUI, 819-820troubleshooting, 801validating, 600XACML, 474XML documents, 165

resolution, addresses, 70Resource CD, 22resources

ER, 443-446hijacking, 587identifying, 458masking, 97MR, 446-447not in the box, 24

responseQueue, 221responses

adding, 832defining, 831from Echo services, 166messages, 365MPGW, 305Probe, 669processing, 114, 311-313PUT MQ, 220rules, 623-625

REST (Representational StateTransfer) requests, 615

Restrict to HTTP 1.0 Policy, 140restricting access, management

interfaces, 351Result Tree Fragment, 644Results action, 254, 392return on investment (ROI), 3

reusable rules, 262-263reviewing logs, 801rfhutil, 825rights, accessing, 453RIP (Routing Information

Protocol), 66RJ-45 Ethernet ports, 4RJ45 CAT5 Ethernet, 60ROI (return on investment), 3Role-Based Management. See

RBMroles

clients, 512servers, 512

root nodes, 639root privileges, 593Route action, 185, 194, 266routers, 63routes

default, 75, 79static, 48-49

routing, 103-104detours, 592dynamic, 705-711dynamic backends, 127dynamic requests, 652identity documents, 408management networks, 82networks, 62-63programming, 681tables, 706

multiple interfaces, 85status, 55

TCP/IP, 74-75troubleshooting, 82

TCP/IP, 74URLs, 681

Routing Information Protocol(RIP), 66

RS-232 (serial connections), 65Rule Direction drop-down, 144rules

access control, 456adding, 255BookQueryService, 177document flow, 657errors, 156

captures, 698redirects from, 313

executing, 137Match, 147-150, 642

cookies, 313-314naming conventions, 867troubleshooting, 805-806

No Status route, 189Platinum route, 189processing, 116, 866Processing Policy, 144,

153-154, 253-255, 656responses, 623-625reusable, 262-263Scheduled Processing

Policy, 137SetErrorVariable, 700user policies, 256-257WSP, 120XML Firewall (XMLFW),

173, 181runtime

AAA, 477-486, 488-495maps, modifying, 776XSLT, 732

SSAML (Security Assertion

Markup Language), 95, 476,552, 615, 633

sanitizing passwords, 482SANs (Storage Area

Networks), 879Save Config, 32saving files, 457SAX (Simple API for XML), 877scenarios, common non-XML

data, 753-754Scheduled Processing Policy

rules, 137schemas

golden, 103linking, 246security, 592SOAP requests, 251substituting, 592supporting, 769validating, 96, 696XML, 735-736

SCM (Source ConfigurationManagement), 406

Page 49: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

906 Index

SCP (Secure Copy), 382scripts, 843-844SDLC (Software Development

Life Cycle), 401searching

domain configuration, 53italics, 60LDAP, 486

secondary addresses, 48Secure Copy (SCP), 382Secure FTP (SFTP), 382Secure Shell (SSH), 45Secure Sockets Layer. See SSLSecured Hash Algorithm

(SHA1), 549security, 630

AAAAU, 441-442AZ, 447-449configuring, 450-460EI, 440ER, 443-446examples, 461LDAP integration,

465-469MC, 442-443MR, 446-447overview of, 437-438policy stages, 439-450PP, 439, 449-450real-world policies,

471-474simple on-box AAA,

461-464appliances, uses of, 6-8cryptography, 508-512deployment checklists, 874form-based authentication,

316-319headers, 631history of DataPower, 878Java EE, 612last mile, 632layers, 618perimeters, 8, 301programming, 484SSL

configuring, 516-530CRLs, 530

customizing, 532-540device certificates, 531handshakes, 512-514troubleshooting, 541-544

TAM, 495-505targets, 391tokens, 95, 631-632WAF, 122, 302-304WAS, 612-615

integrating, 616-626,629-633

Web services, 615Web services, 629-632

AAA, 547confidentiality, 546-547cryptography, 547-548decryption, 565-577digital signatures,

549-558, 561-564encryption, 550, 565-577integrity, 546message exchanges, 546nonrepudiation, 547overview of, 545, 551-552SSL, 551TLS, 551WS-Policy, 553-554

WS-Security, 9XML, 579-582

categories of, 582-594Security Gateways, 92-93technology adoption

curve, 580threat protection, 96,

594-608types of attacks, 581

XML Firewall (XMLFW),117, 159

actions, 173-181backends, 182-192creating, 160-163navigating, 169-173Processing Policy,

173, 181rules, 173, 181testing, 165-168

Security Assertion MarkupLanguage (SAML), 95, 476,552, 615, 633

Security Policy specification, 576selecting

commands, 342entities, 282event codes, 387Fetch actions, 176groups, 330hosts, aliases, 164keys, 792loopback-proxy options, 162paths, 352remote authentication, 336services, 301

MPGW, 304WAF, 302, 304

static backends, 266templates, 480

selective decryption, 572self-inflicted wounds, 583sending

messages, 807requests, 166SNMP traps, 396-397

sensitive connections, 62sequence of processing,

troubleshooting, 114serial numbers, 353serializing XML, 675-677server-side (back) processing, 113servers

components, 7DNS

configuring, 36general network settings,

52-54viewing, 351

down messaging objects, 793external, 336LDAP

AAA integration, 465-469authentication, 337

MQ Server, 219paths, 352performance, 10-11proxy. See proxy serversremote, 352roles, 512security, 6-8TCO, 8-9

Page 50: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 907

WAS, 611integrating security,

616-626, 629-633overview of, 611-612security, 612-615stack products, 612Web services security, 615

Service Integration Bus (SIB), 231

Service Level Monitoring. SeeSLM

service promotion, 430-433service-level agreements

(SLAs), 873services, 111

backend types, 125-126dynamic, 126-128loopbacks, 128static, 126

BookQueryServiceconfiguring, 174Processing Policy, 202testing, 202-203

client-side (front) processing,112-113

comparing, 121connections, 97-104domains, 788dynamic routing, 707Echo, 166FTP, 213hosts, 404HTTP, 834monitoring, 397MPGW, 193, 304

configuring, 194-204,206-216

ESB, 193-194NFS support example,

238-240WebSphere JMS, 231-237WebSphere MQ (WMQ)

system examples,217-231

Multi-Protocol Gateway, 118naming, 162, 865objects, 128

hierarchies, 115status, 164

URL Rewrite policies,128-130

XML Manager, 131-141overview of, 111-116parameters, 304-308Probe, 667Processing Policy, 113, 143

actions, 145-147contexts, 155creating, 150-151editing, 143error handling, 155-157Matching Rules, 147, 150priority, 152rules, 144, 153-154

programming, 657-659protocol handlers, 141-142response processing, 114selecting, 301server-side (back)

processing, 113types, 117, 866

HTTP Service, 123Multi-Protocol Gateway,

120-121WAF, 122WSP, 118XML Firewall

(XMLFW), 117XSL Coprocessor, 123

viewing, 786WAF, 302, 304Web Services

Management, 104WSP, 243

creating, 248-253FSH configuration,

257-261Processing Policy,

253-255Proxy Settings tab,

263-267reusable rules, 262-263SLM, 285-296UDDI, 270-273user policies, 256-257viewing, 296-297Web service overview,

243-244

WSDL, 244-248, 267-270WSRR, 273-284

XML Firewall (XMLFW), 159actions, 173-181backends, 182-192creating, 160-163navigating, 169-173Processing Policy,

173, 181rules, 173, 181testing, 165-168

sessions, 302Set Variable action, 659, 663set-config operation, 370-371Set-Variable Extension

function, 659setDynamicRoute.xsl

stylesheet, 651SetErrorVariable rules, 700sets, creating, 856setup. See configuringSFTP (Secure FTP), 382SGML (Standard Generalized

Markup Language), 643SHA1 (Secured Hash

Algorithm), 549show command, 349show web-mgmt command, 350shutdown, 361SIB (Service Integration

Bus), 231Sign action configuration, 559signatures

digital, 510Web service security, 549WS-Security, 555-564

verifying, 563-564signing

attachments, 562cookies, 302CSRs, 531customizing, 563documents, 555-557fields, 558

Signing Mode, 382Simple API for XML (SAX), 877simple appliances, 3simple network captures, 839

Page 51: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

908 Index

Simple Network ManagementProtocol (SNMP), 429

Simple Object Access Protocol.See SOAP

simple on-box AAA, 461-464simplicity, 630single devices, zone

configuration, 88Single Sign On (SSO), 8,

552, 613single-message DoS attacks,

583-586SLAs (service-level

agreements), 873SLM (Service Level

Management), 401, 438policies, 608

SLM (Service LevelMonitoring), 104, 112, 285-290

actions, 254customizing, 290, 292, 294service priority, 295-296

sniffingmessages, 840networks, 589

SNMP (Simple NetworkManagement Protocol), 429

polling, 394, 396target logs, 383traps, 396-397

snoopingapplication requests, 624message attacks, 589

SOAP (Simple Object AccessProtocol)

Action Policy, 266-267attachments, 594common management

operations, 366-371enabling, 363Fault message, 704messages, 594requests, 251, 364target logs, 383

Soap-Action Policy, 140SoapUI, 819-820, 830-833Softerra LDAP Administrator, 828software architecture, 14

Software Development LifeCycle (SDLC), 401

Source ConfigurationManagement (SCM), 406

spoofing backends, 829-834spraying messages, 126SSH (Secure Shell), 45

enabling, 346login, 347

SSL (Secure Sockets Layer), 507ciphers, 839client-side (front)

processing, 112configuring, 516-530connections, 840CRLs, 530cryptography, 508-512customizing, 532-540debugging, 542-544device certificates, 531handshakes, 512-514internal, 588overview of, 507packet captures, 839Proxy object, 116proxy profiles, 870Proxy Service, 538-539terminations, 94troubleshooting, 541-544Web services security, 551

SSL over HTTP. See HTTPSSSL Proxy Profile, 523-526SSL Proxy Profile Policy, 140SSO (Single Sign On), 8,

552, 613stack products, WAS and, 612stages

AAA policies, 439-450AU, 483-487AZ, 492-493EI, 478-480, 482ER, 490MC, 488-489MR, 490-491

Standard Generalized MarkupLanguage (SGML), 643

startingappliances, 21-24sessions, 302

state, 787-788statements, creating, 290static backends, 125

configuring, 126defining, 183-184selecting, 266

static hostsconfiguring, 53defining, 192DNS, 405

static MQMD header injection, 228

static NFS mounts, 240static routes, 48-49status

domains, 788-790endpoints, 250environmental sensors, 34log targets, viewing, 810networks, 54-56objects, 786-792routing tables, 55service objects, 164WSPs, 296-297WSRR subscription, 279

Stevens, Richard, 60storage, 23Storage Area Networks

(SANs), 879streams, TCP, 838stripping security headers, 631style policies, 662stylesheets

caching, 132setDynamicRoute.xsl, 651XML in AAA flow, 477-495XSL, 643-644

submitting SOAP requests, 364subnetworks, 70-73subscriptions

events, 384-385multiple, 385UDDI, 272WSRR, 276-279

substituting schemas, 592suites, troubleshooting, 541summaries, 409

Page 52: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 909

supportingobjects

URL Rewrite policies,128-130

XML Manager, 131-141schemas, 769

suppressing events, 387svrsslcfg command, 499symmetric keys, 508syslog targets, 384System ID, 498systems

administrators, 331compromise attacks, 593-594logs, 799-801programming, 657-659

Ttables

ARP, 56routing, 706

multiple interfaces, 85status, 55TCP/IP, 74-75troubleshooting, 82

TAI (Trust AssociationInterceptor), 613-614

TAM (Tivoli Access Manager),353, 495-505

objects, 797-798targets, 87, 379

applications, 390-391logs, 810-811, 853, 870operations, 390security, 391

TCO (total cost of ownership),3, 8-9

TCP (Transmission ControlProtocol), 66

headers, 69ports, 55, 353streams, 838testing, 799

tcp.port eq 389 field, 838tcp.port eq 7000 field, 838

TCP/IP (Transmission ControlProtocol/Internet Protocol), 67

address resolution, 70packets, 67-69routing, 74-75subnetworks, 70-73VLANs, 75-76

TCP/IP Illustrated: Volume 1:The Protocols, 60

technology adoption curve,XML, 580

templatescheckOutOfServiceSchedule,

719range testing, 721selecting, 480

TEP (Tivoli’s Enterprise Portal), 844

terminations, SSL, 94test environment, 431testing

Analyst, 758-759applications, 816

AAA, 826-828backend spoofing,

829-834browser tools, 821-823cURL, 816-819non-HTTP tools, 823-826remote data collection, 834SoapUI, 819-820XSLT debugging, 829

BookQueryService, 180-181connections, 840-841deployment, 873-874FTP, 208, 213HTML, 309HTTP

to JMS MPGW, 238to MQ Service, 224

listeners, 353messages, 807mock services, 832MPGW, 202-203NFS, 240ping tests, 352, 798QA environments, 324

ranges, 720single-message attacks, 598TCP, 799URL Rewrite Policies, 131Virtual Ephemeral

Filesystem, 216XML Firewall (XMLFW),

165-168text, editing, 639, 728-729, 736TFIM (Tivoli Federated Identity

Manager), 439third-party tools, 756-760threats

protection, 300-301XML, 579-582

categories of, 582-594protection, 594-608technology adoption

curve, 580types of attacks, 581

XML, 8, 96ThreeStrikesYoureOut reject

counter, 608Thresholds/Filters settings, 608Throttle, 670Tibco EMS, 100, 826timeouts

idle values, 38sessions, 302

timestamps, 374Tivoli Access Manager. See TAMTivoli Federated Identity

Manager (TFIM), 439Tivoli ITCAM for SOA, 18Tivoli’s Enterprise Portal

(TEP), 844TLS (Transport Layer Security),

535, 551tokens

LTPA, 450PP, 439security, 631-632transformation, 95

toolsAAA Post Processing Reject

Counter Tool, 606browsers, 821-823

Page 53: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

910 Index

built-in, 785applications, 799-810configuration, 785-799operations, 810-813

configuration migration, 409external, 433high availability and

consistency, 424-433importing/exporting

packages, 410-419methods, 410-423XML management

methods, 423-424connections, 840-841cryptography, 532cURL, 542development, 727-738external, 815-834multiple device

management, 843ITCAMSEDP, 844-853scripts, 843-844WAS, 854, 858

non-HTTP, 823-826non-XML data, 755-760plugins, 739

Eclipse (RAD)Management Plugin,745-749

Eclipse XSLT CoprocPlugin, 739-744

XML Spy (Altova),749-750

Reject Counter Tool, 607sniffing, 589XML file capture, 809XPath, 187, 737XPath Expression

Builder, 730topology deployment, 91-92

authentication, 94authorization, 94dynamic content rendering,

107-108enabling legacy

applications, 106ESB, 97-104multiple datatypes, 101-103multiple protocols, 99-100

resource masking, 97routing and orchestration,

103-104schema validation, 96SSL termination, 94token transformation, 95Web Services

Management, 104XML

Security Gateways, 92-93threat protection, 96

total cost of ownership (TCO),3, 8-9

traceroute command, 799traffic, 594transactions, 375

based on content of protocolheaders, 686-691

Filter action, 679integrity, 611latency graphs for, 288logs, 375, 391-393probes, 802-804viewing, 622, 809WAS, 622

transcoding, 107Transform Action, 154, 239,

647, 650Transform Binary (xformbin)

action, 754Transform Binary action, 781transforming

non-XML data, 753common formats/

scenarios, 753-754creating, 760-778customizing binary

features, 779-782tools, 755-760

routing, 707tokens, 95XSLT, 871

Transmission Control Protocol.See TCP

Transmission Control Protocol/Internet Protocol. See TCP/IP

transparent filesystems,password AAA policies, 209

Transport layer, 66

Transport Layer Security (TLS), 535

traps, SNMP, 396-397trees, creating, 764triggers, Probe, 668troubleshooting

appliances, 6performance, 10-11platform integration,

11-12security, 6-8TCO, 8-9

built-in tools, 785applications, 799-810configuration, 785-795,

797-799operations, 810-813

configuring, 785-799connections, 798, 834-840context mismatches, 804-805critical events, 811down handlers, 790-792file and configuration

management commands,360-361

handlers, 794hardware, 812help command, 348-349last resorts, 812-813list members, 806listeners, 795load and monitoring

commands, 355-356load balancing, 712, 714-725logs, 387, 810-811Match rules, 805-806networks, 794-795, 834

configuration commands,349-351

packet captures, 835-840troubleshooting

commands, 351-353objects, 357-360performance, 10-11ping tests, 352ports, 795processing, 114product defects, 812RAD, 729

Page 54: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 911

requests, 801routing tables, 82show command, 349SSL, 541-542, 544system information

commands, 353-354TAM, 499Web services, 807XML Firewall (XMLFW),

165-168trust, 522Trust Association Interceptor

(TAI), 613-614tunneling, 507, 539-540types

backend, 125-126elements, 644-646entities, 282firewalls, 162logs, 374, 380-387services, 117-123, 866tokens, 95trees, 764values, 210

UUDDI (Universal Description

Discovery and Integration),270-273

UDP (User Datagram Protocol), 66

UNICS system, 59unit for environment

promotions, 324Unix, 59unpacking appliances, 2124UNT (Username Token), 95,

440, 633updating appliance firmware,

40-41upgrading firmware, 361URI (Uniform Resource

Identifier), 680URLs (Uniform Resource

Locators), 648backends, 196configuring, 233dqmq, 218

Match Rule, 642Open, 681, 683Rewrite policies, 128-130routing, 681

usage patterns, SSL, 526User Agent, 139, 141, 206User Datagram Protocol

(UDP), 66user policies, 256-257Username Token (UNT), 95,

440, 633usernames, 329, 820users, 453

agents, 868authentication, 336-341caching policies, 340creating, 329-330credentials, 338-340, 455groups, 330-336managing, 329variables, 658

VValidate Action, 153, 177-179validating

credentials, 520, 564crypto profiles, 869Crypto Validation Credentials

object, 520-522naming conventions, 869requests, 600schemas, 96, 696trust, 522

values, 38, 210Variable Builder button, 660variable length subnet masking

(VLSM), 71variables

Probe, 667-669programming, 655-661XSLT, 691-695

verifying signatures, 563-564versions, Methods and Versions

tab, 305viewing

actions, 358cache log targets, 381captured files, 809

communities, 395default logs, 377DN, 804DNS servers, 351domains, 789down FSHs, 792errors, 797fields, 374headers, 821LDAP authentication

calls, 803logs, 389, 791, 801

parsing, 676targets, 810

match rules, 806messages, 226network status information,

54-56packets, 837queue managers, 793services, 786transactions, 622, 802, 809variables, 667-669Web Management

Interfaces, 350WSDL, 248WSPs, 296-297XML Firewall (XMLFW),

169, 171-173views, Control Panel, 33Virtual Ephemeral Filesystem,

214-216Virtual Local Area Networks.

See VLANsVirtual Machines, 323Virtual Router Redundancy

Protocol (VRRP), 844viruses, 593, 605Visible Domains property, 325VLANs (Virtual Local Area

Networks), 75-76VLSM (variable length subnet

masking), 71VRRP (Virtual Router

Redundancy Protocol), 844vulnerabilities, message

exchanges and, 546

Page 55: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

912 Index

WW3C (World Wide Web

Consortium), 549WAF (Web Application

Firewall), 122, 302-305WAS (WebSphere Application

Server), 8, 579, 611overview of, 611-612plugin, 319security, 612-615

integration, 616-626,629-633

Web services, 615stack products, 612

Web applicationscookies, 313-315form-based authentication,

316-319overview of, 299-300perimeter security, 301plugins, 319request processing, 308-310response processing, 311-313services, 301-308threat protection, 300-301

Web Management Interface, 350Web Service Operation

metrics, 297Web Service Proxy. See WSPWeb services

overview of, 243-244pseudo frontends, 754security, 629-632. See also

securitySoapUI, 819-820troubleshooting, 807

Web Services DescriptionLanguage. See WSDL

Web Services Management,104-106

web-mgmt command, 30WebGUI

Admin Console, 15Guide, 217methods, 410-423navigating, 31-34User Guide, 22

WebSphere Application Server.See WAS

WebSphere Enterprise ServiceBus. See WESB

WebSphere JMS, 100, 826WebSphere Message Broker

(WMB), 13WebSphere MQ, 100. See

also MQWebSphere Portal Server, 612WebSphere Process Server, 612WebSphere Service Registry and

Repository. See WSRRWebSphere Transformation

Extender (WTX), 756-764,768-777

WESB (WebSphere EnterpriseService Bus), 13

wildcard character (*), 314Windows Networking dialog

box, 72Wireless Markup Language

(WML), 107wizards

AAA, 619AAA Policy, 452-457authorization, 458Functional Map Wizard, 773XMLFW, 160

WMB (WebSphere MessageBroker), 13

WML (Wireless MarkupLanguage), 107

World Wide Web Consortium(W3C), 549

worms, 579write mem command, 30writing

documents to file systems,670-672

messages to logs, 662,665-666

WS-Addressing, 9WS-Policy, 553-554WS-SC (WS-

SecureConversation), 631

WS-Security, 9, 95AAA, 547confidentiality, 546-547cryptography, 547-548decryption, 565-577digital signatures, 549-558,

561-564encryption, 550, 565-577integrity, 546message exchanges, 546nonrepudiation, 547overview of, 545, 551-552SSL, 551TLS, 551WS-Policy, 553-554

WSDL (Web ServicesDescription Language),244-248, 267

adding, 248, 267-268cache policies, 269-270documents, 279enumeration, 591

WSP (Web Service Proxy),118, 243

creating, 248-253FSH configuration, 257-261Processing policy, 253-255Proxy Settings tab, 263-267reusable rules, 262-263SLM, 285-296UDDI, 270-273user policies, 256-257viewing, 296-297Web service overview,

243-244WSDL, 244-248, 267-270WSRR, 273-284

wsp-sp-1-1-was-wssecurity-default.xml, 632

wsp-sp-1-1-was-wssecurity-username-default.xml, 632

WSRR (WebSphere ServiceRegistry and Repository),273-284, 612

WTX (WebSphereTransformation Extender),756-764, 768-777

Page 56: consequential damages in connection with or arising …ptgmedia.pearsoncmg.com/images/9780137148196/samplepages/...When learning IBM DataPower, there is one thing that may be more

Index 913

X–ZXACML (eXtensible Access

Control Markup Language), 473XML (Extensible Markup

Language)configuration files, 871documents

labels, 639modifying, 673-675requests, 165signing, 557

elements, 644-647encapsulation, 593extension functions, 644-647file capture tools, 809Firewall (XMLFW), 117, 628Flood attacks, 587management methods,

423-424namespaces, 641overview of, 638-647parsing, 675-677regular expressions, 642-643schemas, 735-736serializing, 675-677threats, 96, 579-582, 596-608

categories of, 582-594protection, 594-608technology adoption

curve, 580types of attacks, 581

viruses, 593, 604XPath expressions, 639, 641XSL stylesheets, 643-644

XML Aware Network layer, 12XML Digital Signatures

(XMLDSIG), 549XML Encryption (XMLENC)

protocol, 550XML Firewall (XMLFW), 159

actions, 173-181backends, 182-192creating, 160-163loopback, 833navigating, 169-173Processing Policy, 173, 181rules, 173, 181testing, 165-168

XML Management Interface,15, 363

common SOAP managementoperations, 366-371

defining, 364-365SOAP Management Interface,

363-364XML Manager, 116

naming conventions, 867objects, 131-141threat protection, 595User Agent, 206

XML Path Language. See XPathXML Schema Definitions

(XSD), 138XML Security Gateways, 92-93XML Spy (Altova), 736-738,

749-750XMLDSIG (XML Digital

Signatures), 549XMLENC (XML Encryption)

protocol, 550XMLSpy Plugin, 22XPath, 187, 548

Expression Builder, 730expressions, 188, 639-641injection attacks, 591Matching Rules, 148tools, 737

XQuery injection attacks, 591XSD (XML Schema

Definitions), 138xset-target routing, 680XSL (Extensible Stylesheet

Language), 123, 643-644,662, 755

XSLT (XSL Transformations), 107change requests, 673code, 312cookies, 315debugging, 734, 738, 829DNS, 406-409Eclipse (RAD) Management

Plugin, 745-749Eclipse XSLT Coproc Plugin,

739-744elements, 644-646

executing, 738filters, 871IDEs, 727non-XML data, transforming,

755-756programming

dynamic routing, 705-711error processing and

control, 695-705examples of, 685-691passing variables to,

691-695troubleshooting load

balancing, 712-725runtime, 732transforms, 871XML Spy (Altova), 749-750

XXS (Cross Site Scripting), 302

zonesnetworks, 85-86, 88-89target environments, 87