Introduced : BIG-IP_v11.4.0
You can use the interception-endpoint interface to configure interception-endpoint definitions for the Policy Enforcement Manager. The interception-endpoint is used to clone all traffic. The endpoint will always point to a single pool. According to source-ip or destination-ip, the subsequent traffic can be directed to the same pool member, which is called persistence. The persistence feature can be disabled. Note: Before you create a cloning-endpoint you have to create a valid pool.


Method Description Introduced
create Creates a set of PEM interception-endpoints. BIG-IP_v11.4.0
delete_all_interception_endpoints Deletes all user defined interception-endpoints. BIG-IP_v11.4.0
delete_interception_endpoint Deletes the specified interception-endpoints. BIG-IP_v11.4.0
get_list Gets a list of all interception-endpoints. BIG-IP_v11.4.0
get_persistence_type Gets the persistence types of the specified interception-endpoints. BIG-IP_v11.4.0
get_pool Gets the pools for the specified interception-endpoints. BIG-IP_v11.4.0
get_version Gets the version information for this interface. BIG-IP_v11.4.0
set_persistence_type Sets the persistence types of the specified interception-endpoints which specifies whether traffic persists with pool members. If you want specific traffic to go to the same pool member, set the persistence type to source or destination IP address. BIG-IP_v11.4.0
set_pool Sets the pools for the specified interception-endpoints. BIG-IP_v11.4.0


Structure Description


Enumeration Description


Exception Description


Constant Type Value Description


Alias Type Description

See Also


The links to the sample code below are remnants of the old DevCentral wiki and will result in a 404 error. For best results, please copy the link text and search the codeshare directly on DevCentral.

Sample Code

The BIG-IP API Reference documentation contains community-contributed content. F5 does not monitor or control community code contributions. We make no guarantees or warranties regarding the available code, and it may contain errors, defects, bugs, inaccuracies, or security vulnerabilities. Your access to and use of any code available in the BIG-IP API reference guides is solely at your own risk.