Manual Chapter :
Configuring Response and Blocking Pages for Leaked
Credentials
Applies To:
Show Versions
BIG-IP ASM
- 17.5.0, 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0
Configuring Response and Blocking Pages for Leaked
Credentials
BIG-IP ASM with Leaked Credentials Check supports one of the following configuration
options when leaked credentials are detected.
- Alarm and Blocking Page: Report the Leaked Credentials Detection violation in event log and send the Blocking Response Page.
- Alarm and Honeypot Page: Report the Leaked Credentials Detection violation in event log and send the Honeypot Response Page.
- Alarm and Leaked Credentials Page: Report the Leaked Credentials Detection violation in event log and send the Leaked Credentials Page.
You must evaluate the most likely scenarios for your organization. If Leaked
Credentials Check is to detect an attack, you may want to select Alarm and Honeypot
Page. The Failed Login Honeypot page is used for attacker deception. The page should
look like an application failed login response from a mitigation. As a result, the
attacker will not change identity (Source IP or Device ID) and the brute force
attack will be rendered ineffective. The Honeypot page is recommended when
mitigation is request blocking.
If Leaked Credentials Check is primarily to detect legitimate users who are trying to
log in with a leaked password, you may want to select Alarm and Leaked Credentials
Page instead. The Leaked Credentials page is the system response used when presented
with credentials matching those in the leaked credentials dictionary. You can
redirect the user to a new page where they are notified that their password has been
compromised and ask them to reset their password or use MFA to log in
For more information on configuring Response Pages, see the F5
BIG-IP Application Security Manager Implementation Guide and the Response and
Blocking Pages online help.
- On the Main tab, clickand select the desired policy from the list.
- Select theResponse and Blocking Pagestab.
- Select theFailed Login Honeypotresponse.
- Select theLeaked Credentialsresponse.
- ClickSave.