security bot-defense templateΒΆ

security bot-defense template(BIG-IP TMSH Manusecurity bot-defense template(1)



NAME
       template - Shows the template for the profile. The template determines
       default values for the mitigation settings and some other settings

MODULE
       security bot-defense

SYNTAX
       Shows the template component within the security bot-defense module
       using the syntax shown in the following sections.

   DISPLAY
	list template

DESCRIPTION
       You can use the template component to display a Bot Defense Template

EXAMPLES
       list template

       Displays the properties of all Bot Defense Templates

OPTIONS
       api-access-strict-mitigation
	    Determines, when enabled, whether to apply the strict mitigation
	    settings on API access requests in this template.

       deviceid-mode
	    Specifies how the Device ID will be collected in this template.

	    The options are:

	    generate-after-access
		 Device ID is collected by injecting a JavaScript in the
		 response.  This is less intrusive and has less of a latency
		 impact. Use when sensitive to response time or time-to-first-
		 byte.	Note that some requests at the beginning of the
		 session will have no Device ID until the handshake is
		 complete and the Device ID is generated.

	    generate-before-access
		 Device ID is collected by generating a JavaScript challenge
		 before forwarding the HTTP request to the application.  This
		 guarantees that every request that reaches the application
		 has a Device ID.  This has more of a latency impact that
		 Generate After Access.  Bots that present as browsers and are
		 unable to execute JavaScript will be blocked.

	    none
       dos-attack-strict-mitigation
	    Determines, when enabled, whether to apply strict mitigation
	    settings during DoS attacks in this template.

SEE ALSO
       list, security, security bot-defense, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or
       by any means, electronic or mechanical, including photocopying,
       recording, or information storage and retrieval systems, for any
       purpose other than the purchaser's personal use, without the express
       written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2014, 2018. All rights
       reserved.



BIG-IP				  2018-10-20  security bot-defense template(1)