ltm rule command BOTDEFENSE disable
iRule(1) BIG-IP TMSH Manual iRule(1)
BOTDEFENSE::disable
Disables processing by Bot Defense on the connection.
SYNOPSIS
BOTDEFENSE::disable
DESCRIPTION
Disables processing and blocking of the request by Bot Defense for the duration of the current TCP connection, or until
BOTDEFENSE::enable is called. When called from events that occur before Bot Defense processing such as HTTP_REQUEST then
the commands takes effect on the current request. Otherwise, if invoked in the BOTDEFENSE_REQUEST, BOTDEFENSE_ACTION or any
other event that occurs after Bot Defense processing then the command will take effect only on the following request on the
same connection.
Syntax
BOTDEFENSE::disable
RETURN VALUE
VALID DURING
ALL_EVENTS, CLIENT_ACCEPTED, HTTP_REQUEST
EXAMPLES
# EXAMPLE: Disabling Bot Defense for a netmask of client IP addresses
when CLIENT_ACCEPTED {
if {[IP::addr [IP::client_addr] equals 10.10.10.0/24]} {
BOTDEFENSE::disable
}
}
HINTS
SEE ALSO
CHANGE LOG
@BIGIP-12.1 --First introduced the command.
BIG-IP 2022-04-12 iRule(1)