ASM/WAF rate limit and block clients by source ip (or device_id fingerprint) if there are too many violations
Problem this snippet solves:
For attackers that cause too many violations it is better to block them at the start of the HTTP_REQUEST or CLIENT_ACCEPTED events as the ASM/WAF processing causes too ...
Updated Jan 31, 2023
Version 3.0Nikoolayy1
MVP
NGFW and WAF Tech Expert with more than 5 years of experience in the field of Cybersecurity, Automation, Orchestration and over 10 years in IT.Nikoolayy1
MVP
NGFW and WAF Tech Expert with more than 5 years of experience in the field of Cybersecurity, Automation, Orchestration and over 10 years in IT.Daniel_Wolf
MVP
Jul 15, 2021Hi ,
nice iRule. How would you compare this solution with Session Awareness as described in https://support.f5.com/csp/article/K02212345? Session Awareness gives additional categories for blocking based on Device IP or Session.
KR
Daniel
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)