ltm rule command BOTDEFENSE disable
iRule(1) BIG-IP TMSH Manual iRule(1)
BOTDEFENSE::disable
Disables processing by Bot Defense on the connection.
SYNOPSIS
BOTDEFENSE::disable
DESCRIPTION
Disables processing and blocking of the request by Bot Defense for the duration of the current TCP connection,
or until BOTDEFENSE::enable is called. When called from events that occur before Bot Defense processing such
as HTTP_REQUEST then the commands takes effect on the current request. Otherwise, if invoked in the
BOTDEFENSE_REQUEST, BOTDEFENSE_ACTION or any other event that occurs after Bot Defense processing then the
command will take effect only on the following request on the same connection.
Syntax
BOTDEFENSE::disable
RETURN VALUE
VALID DURING
ALL_EVENTS, CLIENT_ACCEPTED, HTTP_REQUEST
EXAMPLES
# EXAMPLE: Disabling Bot Defense for a netmask of client IP addresses
when CLIENT_ACCEPTED {
if {[IP::addr [IP::client_addr] equals 10.10.10.0/24]} {
BOTDEFENSE::disable
}
}
HINTS
SEE ALSO
CHANGE LOG
@BIGIP-12.1 --First introduced the command.
BIG-IP 2020-06-23 iRule(1)