Change ASE default settings
You can change the default settings in ASE by editing the ase-defaults.yml file.
The following table lists the variables that you can set for ASE.
| Variable | Description | 
|---|---|
| 
 | Sets the mode in which ASE is deployed. The default value is  | 
| 
 | Data port used for HTTP or WebSocket protocol. The default value is 8000. | 
| 
 | Data port used for HTTPS or secure WebSocket protocol. The default value is 8443. | 
| 
 | Management port used for CLI and REST API management. The default value is 8010. | 
| 
 | ASE node uses this port number to communicate with other ASE nodes in the cluster. The default value is 8020. | 
| 
 | The password for ASE keystore. The default password is  | 
| 
 | This key is used for authentication among ASE cluster node. All the nodes of the cluster must have the same  | 
| 
 | This key is used to enable ASE to block auto detected attacks. Set this value to  | 
| 
 | This key is used to enable ASE to fetch attack list from ABS. Set this value to  | 
| 
 | This key is used only in ASE sideband mode. If set to  | 
| 
 | Configure the following settings: 
 | 
| 
 | The default value for CLI admin is  | 
| 
 | Determines whether the API Security Enforcer fetches the published API list from ABS. Default:  | 
| 
 | Determines in minutes how often API Security Enforcer will get the published API list from ABS. Default:  | 
| 
 | Determines whether ASE parsing blocks requests with invalid header starts. Default:  | 
| Make sure to take a backup of the  | 
The following is a sample ase-defaults.yml file.
--- ase: # Deployment mode for ASE. Valid values are inline or sideband mode: inline # Define ports for the PingIntelligence API Security Enforcer # Make sure ports are not same for single server installation http_ws_port: 8000 https_wss_port: 8443 management_port: 8010 cluster_manager_port: 8020 # Password for ASE keystore keystore_password: asekeystore # cluster_secret_key for ASE cluster cluster_secret_key: yourclusterkey # Set this value to true, to allow API Security Enforcer to block auto detected attacks. enable_ase_detected_attack: false # Set this value to true, to allow API Security Enforcer to fetch attack list from ABS. enable_abs_attack: true # enable keepalive for ASE in sideband mode enable_sideband_keepalive: false # Set this value to true, to allow API Security Enforcer to fetch published API list from ABS. enable_abs_publish: true #This value determines how often API Security Enforcer will get published API list from ABS. abs_publish_request_minutes: 10 # enable strict parsing checks for client requests # If enabled, ASE will block request with invalid header start # If disabled, it will allow requests enable_strict_request_parser: true # Configure Email Alert. Set enable_emails to true to configure # email settings for ASE enable_emails: false smtp_host: smtp.example.com smtp_port: 587 sender_email: sender@example.com email_password: password receiver_email: receiver@example.com # CLI admin password current_admin_password: admin new_admin_password: admin