Manual Chapter : Distributed Brute Force Protection functionality

Applies To:

Show Versions Show Versions

BIG-IP ASM

  • 17.5.0, 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0
Manual Chapter

Distributed Brute Force Protection functionality

If you have not added the Leaked Credential Check application to Cloud Services, configuration of the Distributed Brute Force Protection's Detect Leaked Credential Stuffing Attack will not be operational.
When the Leaked Credential Check Cloud Service is configured, the Detect Credential Stuffing option uses the Leaked Credential Check API to detect a credential stuffing attack.
  1. On the Main tab, click
    Security
    Application Security
    Brute Force Attack Prevention
    and select a Login URL.
  2. In the
    Distributed Brute Force Protection
    section, for
    Detect Leaked Credential Stuffing Attack
    , select:
    • Never
      : There is no credential stuffing detection
    • After X login attempts that match known leaked credentials dictionary
      : A credential stuffing attack is reported when the configured condition is met.