Forum Discussion
Blocking Traffic from Single IP with block page on ASM
- Aug 06, 2015
The following extensions I hope will make the rule more efficient:
when ASM_REQUEST_DONE { if { [ASM::violation count] > 0 } { if { not([class match[IP::client_addr] == "black-list-data-group"]) } { ASM::unblock } } }- You can check sources against the data group.
- Apply ASM::unblock action only if there were violations.
Hope this helps.
And do not forget to enable "Trigger ASM iRule Events" option in your policy.
If you're using v11:
Security -> Application Security -> IP Addresses -> IP Address Exceptions
You can use the section above to define explicitly trusted or explicitly non-trusted IP addresses. The link is creted between the IP address(es) defined and a particular security policy. Unfortunately, you can not create a granular setup where the IP address (trusted or non-trusted) is linked to a particular Signature ID without the use of iRules.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com