23.02.2013 Views

TEC Workbook - IBM

TEC Workbook - IBM

TEC Workbook - IBM

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IBM</strong> Software<br />

2.9 Summary<br />

In this lab, you learned:<br />

● That there are three service processing phases that occur each time a message arrives.<br />

The client-side processing performs all protocol related processing as well as shielding<br />

against a variety of malicious attacks. The service processing phase contains all of the<br />

specific rules and actions that you define. The server-side processing phase is where any<br />

backside protocol tasks are performed before the message is forwarded to the intended<br />

destination.<br />

● WebSphere DataPower configurations are built using a pure object-oriented design. Every<br />

configuration object, such as a SSL Proxy Profile or a Processing Policy, can be reused.<br />

● How to configure a Multi-Protocol Gateway service, along with an HTTP Front Side<br />

protocol handler, and a Processing Policy.<br />

● A Processing Policy contains a set of Processing Rules; each rule begins with a Match<br />

Action that is evaluated to determine whether the rule should be executed. Each<br />

processing rule contains a list of processing actions that are executed against the<br />

message.<br />

● Match rules can match on various aspects of a message, including the URL, HTTP<br />

headers, error codes, or an XPath that inspects the XML payload of a message.<br />

● Clicking the Save Config link in the top navigation area will save your running<br />

configuration (for your domain) to the flash memory. The running configuration and the<br />

saved configuration are independent.<br />

● How to add a schema validate action to the processing rule by dragging it from the action<br />

palette onto the processing rule. WebSphere DataPower appliances can perform schema<br />

validation against messages at near wire-speed, adding minimal latency to the overall<br />

transaction time.<br />

● SOAP requests and responses are automatically checked against a SOAP schema,<br />

assuring that the SOAP envelope is well-formed and correct.<br />

● Request and response XML documents are checked to assure they are well-formed.<br />

Malformed XML is rejected which assures backend applications receive only well-formed<br />

XML.<br />

● Custom Filters can be used for content-based message filtering and SQL injection threat<br />

protection.<br />

● How to transform an XML document using a Transform action.<br />

● XSD and XSL stylesheets are compiled and cached.<br />

Page 52 WebSphere Lab Jam

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!