Manual :
BIG-IP Application Security Manager: Attack and Bot Signatures
Applies To:
Show VersionsBIG-IP ASM
- 15.0.1, 15.0.0, 14.1.2, 14.1.0
Original Publication Date: 05/25/2019
-
Assigning Attack Signatures to Security Policies
- About attack signatures
-
Overview: Creating and assigning attack signature sets
- About attack signature sets
- List of attack signature sets
- Creating a set of attack signatures
- Assigning signature sets to a security policy
- Viewing the attack signatures in a security policy
- Enabling or disabling a specific attack signature
- Enabling or disabling staging for attack signatures
- Overriding attack signatures based on content
- Creating Bot Defense Profiles
- Updating Attack and Bot Signatures
- Writing Custom Attack Signatures
- Writing Custom Bot Signatures
- Signature Options
-
Signature Syntax
- The content rule option
- The uricontent rule option
- The headercontent rule option
- The valuecontent rule option
- The reference rule option
- The nocase modifier
- The offset modifier
- The plaintextonly modifier
- The depth modifier
- The distance modifier
- The within modifier
- The objonly modifier
- The norm modifier
- The escape character (|)
- The not character
- The re2 rule option
- The pcre rule option
- The ipp rule option
- Scope modifiers for re2, pcre, and ipp
- Matching action modifiers for re2 and pcre
- Legal Notices