security ip-intelligence blacklist-category
security ip-intelligence blacklist-category(1) BIG-IP TMSH Manual security ip-intelligence blacklist-category(1)
NAME
blacklist-category - Global list of ip-intelligence blacklist categories. These ip-intelligence blacklist
categories are used to configure ip-intelligence policies.
MODULE
security ip-intelligence
SYNTAX
Configure the blacklist-category component within the security ip-intelligence module using the syntax shown
in the following sections.
CREATE/MODIFY
create blacklist-category [name]
modify blacklist-category [[name] | all]
options:
app-service [name]
description [string]
bl-match-direction [destination | source | source-and-destination]
edit blacklist-category
options:
all-properties
non-default-properties
one-line
partition
recursive
DISPLAY
list blacklist-category
show running-config blacklist-category
options:
all-properties
non-default-properties
one-line
partition
recursive
DESCRIPTION
You can use the blacklist-category component to configure a shareable and reusable blacklist category which
can be configured with specific enforcement and logging settings under ip-intelligence policies.
EXAMPLES
modify blacklist-category Malware description "A variety of forms of hostile or intrusive software."
Modifies the blacklist-category description.
list blacklist-category
Displays the current list of blacklist categories.
OPTIONS
app-service
Specifies the application service to which the object belongs. The default value is none. Note: If the
strict-updates option is enabled on the Application Service that owns the object, you cannot modify or
delete the object. Only the Application Service can modify or delete the object.
description
User defined description.
bl-match-direction
Indicates whether to match source IPs, destination IPs, or both.
partition
Displays the administrative partition within which the component resides.
SEE ALSO
create, edit, list, modify, security ip-intelligence feed-list, security ip-intelligence policy, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2008, 2012-2013, 2015. All rights reserved.
BIG-IP 2015-07-22 security ip-intelligence blacklist-category(1)