BIG-IP LTM v12.1.0¶
Commands Introduced in BIG-IP LTM 12.1.0¶
- ACCESS::perflow - String of perflow variable; empty if value isn’t set
- ADM::health - Return health value as integer. Lower values are good health
- ADM::is_ip_slowdown - Returns TRUE if source IP exists in greylist table
- ADM::is_mitigated - Returns TRUE if certain HTTP request was mitigated by ADM
- ANTIFRAUD::alert_defined_value - returns defined (configured) value.
- ANTIFRAUD::alert_resolved_value - returns resolved (actual) value.
- ASM::signature - returns the list of signatures
- BOTDEFENSE::action - Returns the action to be taken by Bot Defense
- BOTDEFENSE::captcha_age - Returns the age of the CAPTCHA challenge in seconds
- BOTDEFENSE::captcha_status - Returns the status of the user’s answer to the CAPTCHA challenge
- BOTDEFENSE::cookie_age - Returns the age of the Bot Defense cookie in seconds
- BOTDEFENSE::cookie_status - Returns the status of the Bot Defense cookie
- BOTDEFENSE::cs_allowed - Returns or sets if the client-side actions are allowed
- BOTDEFENSE::cs_attribute - Queries for or sets attributes for the client-side challenge
- BOTDEFENSE::cs_possible - Returns “true” or “false” based on whether it is possible to take one of the client-side actions
- BOTDEFENSE::device_id - Returns a number, representing the Device ID of the client, as retrieved from the request
- BOTDEFENSE::disable - Disables processing and blocking of the request by Bot Defense
- BOTDEFENSE::enable - Enables processing and blocking of the request by Bot Defense
- BOTDEFENSE::previous_action - returns the action taken by the previous request
- BOTDEFENSE::reason - Returns the reason that lead Bot Defense to decide on the action to be taken
- CATEGORY::result - Returns a list of categories or safe search parameters
- DOSL7::health - returns the DOSL7 server health value for current virtual server
- DOSL7::is_ip_slowdown - returns TRUE if source IP exists in greylist table
- DOSL7::is_mitigated - returns TRUE if certain HTTP request was mitigated
- ip_addr - Returns the IP address of a tmm, tmm interface, localhost, etc
- NSH::context - get or set context for NSH
- NSH::md1 - sets/gets the MD1 context for NSH
- NSH::mimic - Set mimic options for NSH.
- NSH::path_id - gets/sets the path id for NSH
- NSH::service_index - gets/sets the service index for NSH
- SIP::message - Returns content of the current message
- SSL::allow_dynamic_record_sizing - Returns the currently set value for allowing dynamic record sizing
- SSL::maximum_record_size - set or get the maximum egress record size
- TCP::analytics - enables or disables AVR TCP stat reporting
- TCP::recvwnd - sets the TCP receive window
- TCP::rexmt_thresh - gets or sets the retransmission threshold of a TCP connection
- TCP::sendbuf - sets the TCP send buffer size
- WS::collect - Collects the Websocket frame payload
- WS::disconnect - The Websocket connection is disconnected by sending a close frame to both end-points when the current frame is done
- WS::enabled - used to determine whether the Websocket processing is enabled or disabled for a particular connection
- WS::frame - various websocket frame tasks
- WS::masking - masking options for websocket payload
- WS::message - Drop an entire Websocket message.
- WS::payload - websocket payload manipulation
- WS::release - Releases the data collected via WS::collect
- WS::request - websocket request header access
- WS::response - websocket response header access
Events Introduced in BIG-IP LTM 12.1.0¶
- ACCESS_PER_REQUEST_AGENT_EVENT - allows admin to execute an iRule logic (inside TMM) at a desired point in the per-request access policy execution
- BOTDEFENSE_ACTION - Triggered immediately prior to taking an action on a transaction
- BOTDEFENSE_REQUEST - Triggered on an HTTP request (before the payload), after Bot Defense finished processing the request, but before a decision is made on a possible action
- WS_CLIENT_DATA - raised when the system collects the specified amount of data via the WS::collect command
- WS_CLIENT_FRAME - raised to indicate the start of a Websocket frame received from the client
- WS_CLIENT_FRAME_DONE - aised to indicate the end of a Websocket frame received from the client
- WS_REQUEST - raised when certain headers are present in the client request
- WS_RESPONSE - raised when certain headers are present in the server response
- WS_SERVER_DATA - raised when the system collects the specified amount of data via the WS::collect command
- WS_SERVER_FRAME - raised to indicate the start of a Websocket frame received from the server.
- WS_SERVER_FRAME_DONE - raised to indicate the end of a Websocket frame received from the server
The BIG-IP API Reference documentation contains community-contributed content. F5 does not monitor or control community code contributions. We make no guarantees or warranties regarding the available code, and it may contain errors, defects, bugs, inaccuracies, or security vulnerabilities. Your access to and use of any code available in the BIG-IP API reference guides is solely at your own risk.