ltm rule command BOTDEFENSE disableΒΆ

iRule(1)		      BIG-IP TMSH Manual		      iRule(1)



BOTDEFENSE::disable
       Disables processing by Bot Defense on the connection.

SYNOPSIS
       BOTDEFENSE::disable

DESCRIPTION
       Disables processing and blocking of the request by Bot Defense for the
       duration of the current TCP connection, or until BOTDEFENSE::enable is
       called.	When called from events that occur before Bot Defense
       processing such as HTTP_REQUEST then the commands takes effect on the
       current request. Otherwise, if invoked in the BOTDEFENSE_REQUEST,
       BOTDEFENSE_ACTION or any other event that occurs after Bot Defense
       processing then the command will take effect only on the following
       request on the same connection.

       Syntax

       BOTDEFENSE::disable

RETURN VALUE
VALID DURING
       ALL_EVENTS, CLIENT_ACCEPTED, HTTP_REQUEST

EXAMPLES
	# EXAMPLE: Disabling Bot Defense for a netmask of client IP addresses
	when CLIENT_ACCEPTED {
	    if {[IP::addr [IP::client_addr] equals 10.10.10.0/24]} {
		BOTDEFENSE::disable
	    }
	}

HINTS
SEE ALSO
CHANGE LOG
       @BIGIP-12.1 --First introduced the command.



BIG-IP				  2019-05-10			      iRule(1)