ltm rule command BOTDEFENSE disable
iRule(1) BIG-IP TMSH Manual iRule(1)
BOTDEFENSE::disable
Disables processing by Bot Defense on the connection.
SYNOPSIS
BOTDEFENSE::disable
DESCRIPTION
Disables processing and blocking of the request by Bot Defense for the
duration of the current TCP connection, or until BOTDEFENSE::enable is
called. When called from events that occur before Bot Defense
processing such as HTTP_REQUEST then the commands takes effect on the
current request. Otherwise, if invoked in the BOTDEFENSE_REQUEST,
BOTDEFENSE_ACTION or any other event that occurs after Bot Defense
processing then the command will take effect only on the following
request on the same connection.
Syntax
BOTDEFENSE::disable
RETURN VALUE
VALID DURING
ALL_EVENTS, CLIENT_ACCEPTED, HTTP_REQUEST
EXAMPLES
# EXAMPLE: Disabling Bot Defense for a netmask of client IP addresses
when CLIENT_ACCEPTED {
if {[IP::addr [IP::client_addr] equals 10.10.10.0/24]} {
BOTDEFENSE::disable
}
}
HINTS
SEE ALSO
CHANGE LOG
@BIGIP-12.1 --First introduced the command.
BIG-IP 2019-05-10 iRule(1)