Manual :
BIG-IP Application Security Manager: Attack and Bot Signatures
Applies To:
Show VersionsBIG-IP ASM
- 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1, 12.1.0
-
Assigning Attack Signatures to Security Policies
- About attack signatures
-
Overview: Creating and assigning attack signature sets
- About attack signature sets
- List of attack signature sets
- Creating a set of attack signatures
- Assigning signature sets to a security policy
- Viewing the attack signatures in a security policy
- Enabling or disabling a specific attack signature
- Enabling or disabling staging for all attack signatures
- Overriding attack signatures based on content
- Assigning Bot Signatures to Security Policies
- Updating Attack and Bot Signatures
- Writing Custom Attack Signatures
- Writing Custom Bot Signatures
- Signature Options
-
Signature Syntax
- The content rule option
- The uricontent rule option
- The headercontent rule option
- The valuecontent rule option
- The reference rule option
- The nocase modifier
- The offset modifier
- The plaintextonly modifier
- The depth modifier
- The distance modifier
- The within modifier
- The objonly modifier
- The norm modifier
- The escape character (|)
- The not character
- The re2 rule option
- The pcre rule option
- The ipp rule option
- Scope modifiers for re2, pcre, and ipp
- Matching action modifiers for re2 and pcre
- Legal Notices