ltm rule command BOTDEFENSE disableΒΆ

iRule(1)					  BIG-IP TMSH Manual					     iRule(1)

BOTDEFENSE::disable
       Disables processing by Bot Defense on the connection.

SYNOPSIS
       BOTDEFENSE::disable

DESCRIPTION
       Disables processing and blocking of the request by Bot Defense for the duration of the current TCP connection,
       or until BOTDEFENSE::enable is called.  When called from events that occur before Bot Defense processing such
       as HTTP_REQUEST then the commands takes effect on the current request. Otherwise, if invoked in the
       BOTDEFENSE_REQUEST, BOTDEFENSE_ACTION or any other event that occurs after Bot Defense processing then the
       command will take effect only on the following request on the same connection.

       Syntax

       BOTDEFENSE::disable

RETURN VALUE
VALID DURING
       ALL_EVENTS, CLIENT_ACCEPTED, HTTP_REQUEST

EXAMPLES
	# EXAMPLE: Disabling Bot Defense for a netmask of client IP addresses
	when CLIENT_ACCEPTED {
	    if {[IP::addr [IP::client_addr] equals 10.10.10.0/24]} {
		BOTDEFENSE::disable
	    }
	}

HINTS
SEE ALSO
CHANGE LOG
       @BIGIP-12.1 --First introduced the command.

BIG-IP						      2020-06-23					     iRule(1)