security dos bot-signature
security dos bot-signature(1) BIG-IP TMSH Manual security dos bot-signature(1)
NAME
bot-signature - Configures the Bot Signatures.
MODULE
security dos
SYNTAX
Configure the bot-signature component within the security dos module
using the syntax shown in the following sections.
CREATE/MODIFY
create bot-signature [string]
modify bot-signature [name]
options:
category [name]
domains [none | add | delete | replace-all-with] { [string] ... }
risk [high | low | medium]
rule [string]
signature-references [string]
url {
match-type [contains | regexp]
search-string [string]
}
user-agent {
match-type [contains | regexp]
search-string [string]
}
DISPLAY
list bot-signature
DELETE
delete bot-signature [name]
DESCRIPTION
You can use the bot-signature component to create, modify, display, or
delete a Bot Signature.
EXAMPLES
create bot-signature my_signature
Creates a custom Bot Signature named my_signature with initial
settings.
list bot-signature
Displays the properties of all Bot Signatures.
OPTIONS
category
Specifies the bot signature category.
domains
Specifies the bot signature domain names.
risk Specifies the bot signature risk. The possible values are high,
low and medium.
rule Specifies the bot signature rule.
signature-references
Specifies the bot signature references.
url Specifies the bot signature's url matching rule. The following
options are available:
match-type
Specifies the bot signature's url rule match type. The
possible values are contains or regexp.
search-string
Specifies the bot signature's url string that should be
matched.
user-agent
Specifies the bot signature's user-agent matching rule. The
following options are available:
match-type
Specifies the bot signature's user-agent rule match type. The
possible values are contains or regexp.
search-string
Specifies the bot signature's user-agent string that should
be matched.
SEE ALSO
edit, list, modify, security, security dos, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or
by any means, electronic or mechanical, including photocopying,
recording, or information storage and retrieval systems, for any
purpose other than the purchaser's personal use, without the express
written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2008-2014. All rights reserved.
BIG-IP 2014-11-27 security dos bot-signature(1)