Forum Discussion
Local Traffic Policy rule or irule to bypass the BIG-IP ASM
- Mar 05, 2025
You can go by this:
So first I select every Host that does not need ASM and any other Host gets ASM enabled.
But you can do something like this also:And for those two conditions I have selected "skip this condition if its missing from request"
Hi,
Can you share a sample LTM rule or irule for the above requirement.
You can go by this:
So first I select every Host that does not need ASM and any other Host gets ASM enabled.
But you can do something like this also:
And for those two conditions I have selected "skip this condition if its missing from request"
- CHRISTY_THOMASMar 10, 2025
Cirrus
Hi,
Thank you ,
I have created the LTM rule that you have shared. and also i have created a iRule also: The irule worked.
Is there any possibility of fine-tuning the following iRule with a header name condition in addition to the URL? Can you help me with this?
when HTTP_REQUEST {
if {[HTTP::uri] contains "/sxx/xxx/cron"} {
ASM::disable
log local0. "ASM disabled"
} else {
ASM::enable /Common/SEC_Policy
log local0. " ASM ENABLED. Current ASM policy is [ASM::policy]"
}
}
- P_KueppersMar 10, 2025
MVP
Sure can you fine-tune this with more conditions. Header Based would look like this:
when HTTP_REQUEST { if {[HTTP::uri] contains "/sxx/xxx/cron" OR [HTTP::header exists "DISABLE_ASM"] } { ASM::disable [...]
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
