Applies To:
Show VersionsBIG-IP ASM
- 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1, 12.1.0
Setting Up IP Address Intelligence Blocking
Overview: Setting up IP address intelligence blocking
In Application Security Manager, you can use IP address intelligence blocking in a security policy to block requests from IP addresses that have questionable reputations. IP addresses from which attacks or spam have originated are included in an IP intelligence database, along with the category describing the problem. The BIG-IP system must connect to the IP intelligence database before you can use IP address intelligence blocking.
You can configure a security policy to log (alarm) or block requests from IP addresses of questionable reputation, and to perform different actions depending on the categories of problems. For example, you can block requests from IP addresses associated with Windows exploits and log requests from scanners.
You can create a whitelist of IP addresses that might be in the database, and allow them to access the web application regardless of their IP reputation. This is a way to ensure that traffic from known sources is not blocked because of IP address intelligence data.
You can also use iRules to instruct the system how to use IP address intelligence information.
Downloading the IP address intelligence database
- The system must have an IP Intelligence license.
- The system must have an Internet connection either directly or through an HTTP proxy server (see proxy configuration values in Step 5).
- The system must have DNS configured (go to ).
Blocking IP addresses with bad reputations
Reviewing IP address intelligence statistics
Creating an iRule to log IP address intelligence information
Creating an iRule to reject requests with questionable IP addresses
IP address intelligence categories
Along with the IP address, the IP intelligence database stores the category that explains the reason that the IP address is considered untrustworthy.
Category Name | Description |
---|---|
Additional | IP addresses that are added from additional categories not more explicitly defined. |
Anonymous Proxy | IP addresses that are associated with web proxies that shield the originator's IP address (such as proxy and anonymization services). This category also includes TOR anonymizer addresses. |
Application Denial of Service | IP addresses involved in application DoS Attacks, or anomalous traffic detection. |
Botnets | IP addresses of computers that are infected with malicious software (Botnet Command and Control channels, and infected zombie machines) and are controlled as a group by a Bot master, and are now part of a botnet. Hackers can exploit botnets to send spam messages, launch various attacks, or cause target systems to behave in other unpredictable ways. |
Cloud Provider Networks Cloud-based Services | IP addresses and networks that belong to cloud providers, which offer services hosted on their servers via the Internet. |
Denial-of-Service | IP addresses that have launched denial-of-service (DoS) attacks, distributed denial-of-service (DDoS) attacks, anomalous SYN flood attacks, or anomalous traffic detection. These attacks are usually requests for legitimate services, but occur at such a fast rate that targeted systems cannot respond quickly enough and become bogged down or unable to service legitimate clients. |
Illegal Websites | IP addresses that contain criminally obscene or potentially criminal internet copyright and intellectual property violations. |
Infected Sources | Active IP addresses that issue HTTP requests with a low reputation index score, or that are known malicious web sites offering or distributing malware, shell code, rootkits, worms, or viruses. |
Phishing Proxies | IP addresses that host phishing sites, and other kinds of fraud activities, such as ad click fraud or gaming fraud. |
Proxy | IP addresses that are associated with web proxies that shield the originator's IP address (such as proxy and anonymization services). This category also includes TOR anonymizer addresses. |
Scanners | IP addresses that are involved in reconnaissance, such as probes, host scan, domain scan, and password brute force, typically to identify vulnerabilities for later exploits. |
Spam Sources | IP addresses tunneling spam messages through proxy, anomalous SMTP activities and forum spam activities. |
Web Attacks | IP addresses involved in cross site scripting, iFrame injection, SQL injection, cross domain injection, or domain password brute force. |
Windows Exploits | Active IP addresses that have exercised various exploits against Windows resources by offering or distributing malware, shell code, rootkits, worms, or viruses using browsers, programs, downloaded files, scripts, or operating system vulnerabilities. |