security dos bot-signature
security dos bot-signature(1) BIG-IP TMSH Manual security dos bot-signature(1)
NAME
bot-signature - Configures the Bot Signatures.
MODULE
security dos
SYNTAX
Configure the bot-signature component within the security dos module using the syntax shown in the following
sections.
CREATE/MODIFY
create bot-signature [string]
modify bot-signature [name]
options:
category [name]
domains [none | add | delete | replace-all-with] { [string] ... }
risk [high | low | medium]
rule [string]
signature-references [string]
url {
match-type [contains | regexp]
search-string [string]
}
user-agent {
match-type [contains | regexp]
search-string [string]
}
DISPLAY
list bot-signature
DELETE
delete bot-signature [name]
DESCRIPTION
You can use the bot-signature component to create, modify, display, or delete a Bot Signature.
EXAMPLES
create bot-signature my_signature
Creates a custom Bot Signature named my_signature with initial settings.
list bot-signature
Displays the properties of all Bot Signatures.
OPTIONS
category
Specifies the bot signature category.
domains
Specifies the bot signature domain names.
risk Specifies the bot signature risk. The possible values are high, low and medium.
rule Specifies the bot signature rule.
signature-references
Specifies the bot signature references.
url Specifies the bot signature's url matching rule. The following options are available:
match-type
Specifies the bot signature's url rule match type. The possible values are contains or regexp.
search-string
Specifies the bot signature's url string that should be matched.
user-agent
Specifies the bot signature's user-agent matching rule. The following options are available:
match-type
Specifies the bot signature's user-agent rule match type. The possible values are contains or
regexp.
search-string
Specifies the bot signature's user-agent string that should be matched.
SEE ALSO
edit, list, modify, security, security dos, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2008-2014. All rights reserved.
BIG-IP 2014-11-27 security dos bot-signature(1)