security bot-defense templateΒΆ

security bot-defense template(1)		  BIG-IP TMSH Manual		     security bot-defense template(1)

NAME
       template - Shows the template for the profile. The template determines default values for the mitigation
       settings and some other settings

MODULE
       security bot-defense

SYNTAX
       Shows the template component within the security bot-defense module using the syntax shown in the following
       sections.

   DISPLAY
	list template

DESCRIPTION
       You can use the template component to display a Bot Defense Template

EXAMPLES
       list template

       Displays the properties of all Bot Defense Templates

OPTIONS
       api-access-strict-mitigation
	    Determines, when enabled, whether to apply the strict mitigation settings on API access requests in this
	    template.

       deviceid-mode
	    Specifies how the Device ID will be collected in this template.

	    The options are:

	    generate-after-access
		 Device ID is collected by injecting a JavaScript in the response.  This is less intrusive and has
		 less of a latency impact. Use when sensitive to response time or time-to-first-byte.  Note that some
		 requests at the beginning of the session will have no Device ID until the handshake is complete and
		 the Device ID is generated.

	    generate-before-access
		 Device ID is collected by generating a JavaScript challenge before forwarding the HTTP request to
		 the application.  This guarantees that every request that reaches the application has a Device ID.
		 This has more of a latency impact that Generate After Access.	Bots that present as browsers and are
		 unable to execute JavaScript will be blocked.

	    none
       dos-attack-strict-mitigation
	    Determines, when enabled, whether to apply strict mitigation settings during DoS attacks in this
	    template.

SEE ALSO
       list, security, security bot-defense, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2014, 2018. All rights reserved.

BIG-IP						      2018-10-20		     security bot-defense template(1)