waf bot-mitigation-exception
You can use this command to create exception policy to omit bot mitigation attack scans when you know that some parameters or URLs may trigger positives during normal use. The exception policy can be applied in Bot Mitigation policy, Biometrics Based Detection, Threshold Based Detection, and Bot Deception.
Syntax
config waf bot-mitigate-exception
edit edit "<bot_excetpion_policy-name>"
config exception-element-list
edit <index>
set match-target CLIENT_IP
set operator {EQ |NE}
set ip-range <IP_range>
set concatenate-type {AND | OR}
next
edit <index>
set match-target host
set operator {STRING_MATCH | REGEXP_MATCH}
set value <string>
set concatenate-type {AND | OR}
next
edit <index>
set match-target URI
set operator {STRING_MATCH | REGEXP_MATCH}
set value <string>
set concatenate-type {AND | OR}
next
edit <index>
set match-target FULL_URL
set operator {STRING_MATCH | REGEXP_MATCH}
set value <string>
set concatenate-type {AND | OR}
next
edit <index>
set match-target PARAMETER
set operator {STRING_MATCH | REGEXP_MATCH}
set value-name <string>
set value-check {enable | disable}
set value <string>
set concatenate-type {AND | OR}
next
edit <index>
set match-target COOKIE
set operator {STRING_MATCH | REGEXP_MATCH}
set value-name <string>
set value-check {enable | disable}
set value <string>
set concatenate-type {AND | OR}
next
end
next
end
Variable | Description | Default |
|
Enter the name of the bot mitigation exception policy. |
No default |
|
Enter the index number of the exception element. |
No default |
match-target CLIENT_IP | ||
operator {EQ |NE}
|
|
EQ |
CLIENT_IP <ip>
|
Specify the client IP addres that FortiWeb uses to determine whether or not to perform a bot mitigation attack scan for the request. | No default |
|
Specify the client IP address or IP range that FortiWeb uses to determine whether or not to perform a bot mitigation attack scan for the request. |
No default |
match-target host |
||
operator {STRING_MATCH | REGEXP_MATCH}
|
|
REGEXP_MATCH |
|
Specifies the |
No default |
match-target URI |
||
operator {STRING_MATCH | REGEXP_MATCH}
|
|
REGEXP_MATCH |
|
Specifies a URL value to match. You can use up to 2048 characters in regex configuration for signature. The value does not include parameters. For example, |
No default |
match-target FULL_URL |
||
operator {STRING_MATCH | REGEXP_MATCH}
|
|
REGEXP_MATCH |
|
Specifies a URL value that includes parameters to match. For example, |
No default |
match-target PARAMETER |
||
|
|
REGEXP_MATCH |
|
Specifies the name of the parameter to match. |
No default |
|
Enable to specify a parameter value to match in addition to the parameter name. |
disable |
|
Specifies the parameter value to match. |
No default |
match-target COOKIE |
||
|
|
REGEXP_MATCH |
|
Specifies the name of the cookie to match. |
No default |
|
Select to specify a cookie value to match in addition to the cookie name. |
disable |
|
Specifies the cookie value to match. |
No default |
|
Later, you can use the exception list options to adjust the matching sequence for entries. The lower the index number, the earlier it will be processed. |
and |
Related topics