security bot-defense templateΒΆ

security bot-defense template(1)			BIG-IP TMSH Manual			  security bot-defense template(1)

NAME
       template - Shows the template for the profile. The template determines default values for the mitigation settings and some
       other settings

MODULE
       security bot-defense

SYNTAX
       Shows the template component within the security bot-defense module using the syntax shown in the following sections.

   DISPLAY
	list template

DESCRIPTION
       You can use the template component to display a Bot Defense Template

EXAMPLES
       list template

       Displays the properties of all Bot Defense Templates

OPTIONS
       api-access-strict-mitigation
	    Determines, when enabled, whether to apply the strict mitigation settings on API access requests in this template.

       deviceid-mode
	    Specifies how the Device ID will be collected in this template.

	    The options are:

	    generate-after-access
		 Device ID is collected by injecting a JavaScript in the response.  This is less intrusive and has less of a
		 latency impact. Use when sensitive to response time or time-to-first-byte.  Note that some requests at the
		 beginning of the session will have no Device ID until the handshake is complete and the Device ID is generated.

	    generate-before-access
		 Device ID is collected by generating a JavaScript challenge before forwarding the HTTP request to the
		 application.  This guarantees that every request that reaches the application has a Device ID.  This has more of
		 a latency impact that Generate After Access.  Bots that present as browsers and are unable to execute JavaScript
		 will be blocked.

	    none
       dos-attack-strict-mitigation
	    Determines, when enabled, whether to apply strict mitigation settings during DoS attacks in this template.

SEE ALSO
       list, security, security bot-defense, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
       photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's personal
       use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2014, 2018. All rights reserved.

BIG-IP							    2018-10-20				  security bot-defense template(1)