ltm rule command BOTDEFENSE disableΒΆ

iRule(1)						BIG-IP TMSH Manual						  iRule(1)

BOTDEFENSE::disable
       Disables processing by Bot Defense on the connection.

SYNOPSIS
       BOTDEFENSE::disable

DESCRIPTION
       Disables processing and blocking of the request by Bot Defense for the duration of the current TCP connection, or until
       BOTDEFENSE::enable is called.  When called from events that occur before Bot Defense processing such as HTTP_REQUEST then
       the commands takes effect on the current request. Otherwise, if invoked in the BOTDEFENSE_REQUEST, BOTDEFENSE_ACTION or any
       other event that occurs after Bot Defense processing then the command will take effect only on the following request on the
       same connection.

       Syntax

       BOTDEFENSE::disable

RETURN VALUE
VALID DURING
       ALL_EVENTS, CLIENT_ACCEPTED, HTTP_REQUEST

EXAMPLES
	# EXAMPLE: Disabling Bot Defense for a netmask of client IP addresses
	when CLIENT_ACCEPTED {
	    if {[IP::addr [IP::client_addr] equals 10.10.10.0/24]} {
		BOTDEFENSE::disable
	    }
	}

HINTS
SEE ALSO
CHANGE LOG
       @BIGIP-12.1 --First introduced the command.

BIG-IP							    2022-04-12							  iRule(1)