Removing F5 Leaked Credential Check (LCC) config from BIG-IP AWAF
The below provide a guideline to remove the F5 Leaked Credentials Check (LCC) configuration.
Leaked Credential Check
The F5 Leaked Credential Check feature is configured as an add-on service to F5 BIG-IP Advanced WAF.
- On the Main tab, click Security > Application Security > Security Policies.
- You need to do the following for every policy with configured Leaked Credential Check
- Select the security policy you want to work on. Select Advanced Protection > Brute Force Prevention on the left side of the screen.
- Click on every login page in the list and do the following:
- In the Leaked Credentials Detection section, disable Detection.
- In the Distributed Brute Force Protection section, for Detect Credential Stuffing Attack, select Never.
Cloud Service removal
In the Distributed Cloud Services ›› Cloud Services: Cloud Security Services Applications, select your custom f5-credential-stuffing-cloud-app and press delete.
If you have added a load balancer, a route, gateway etc. to enable this service and these are not needed anymore, please remove these as well.
Optional:
In the Application Security: Policy Building: Learning and Blocking Settings, remove the alarm and block from the Leaked Credentials Detection violation.
Published Jun 20, 2024
Version 1.0Patrick_Zoller
Employee
Joined May 16, 2019
No CommentsBe the first to comment