waf advanced-bot-protection
FortiGuard Advanced Bot Protection is a SaaS (Software as a Service) solution designed to protect your online applications from malicious bots and automated attacks.
By incorporating FortiGuard Advanced Bot Protection (FortiGuard ABP) into FortiWeb's server policy, client traffic will be directed to the FortiGuard ABP service deployed on Google Cloud. It can analyze the traffic to identify any malicious bot behavior and suggest appropriate actions in response.
FortiGuard ABP builds up a machine learning model to protect against a wide range of threats, including Data harvesting, Credential stuffing attacks, Account takeover attempts, and DDoS attacks.
This topic introduces the FortiGuard ABP related CLI commands in FortiWeb. For the whole process of the FortiGuard ABP integration configuration, refer to "Configuring Advanced Bot Protection policy" in FortiWeb Administration Guide.
Syntax
config waf advanced-bot-protection
edit waf advanced-bot-protection
set action {alert | deny_no_log | alert_deny | block-period | block-period-client}
set severity {High | Medium | Low | Info}
set trigger <trigger-policy_name>
set exception {exception-policy-id}
set bot-confirmation {enable | disble}
set bot-recognition {captcha-enforcement | recaptcha-enforcement}
set recaptcha <recaptcha_server_name>
set validation-timeout <validation-timeout_int>
next
end
Variable | Description | Default |
"<advanced-bot-protection_name>" | Enter a name for the Advanced Bot Protection policy. You can reference it in the Web Protection Profile. | No default |
application-id <string> |
Enter the Application ID assigned to your FortiGuard ABP Application. The Application ID is used to bind this Advanced Bot Protection policy to the FortiGuard ABP Application. To obtain the ID, go to Application page of FortiGuard ABP, click the Settings icon in the Action column, then click Copy Application ID. |
No default |
action {alert | deny_no_log | alert_deny | block-period | block-period-client} |
Select which action FortiWeb will take when FortiGuard ABP suggests a request is from a bot:
|
alert |
Enter the number of seconds that you want to block subsequent requests from an IP or client ID after FortiWeb detects content scraping activities. The valid range is 1–3,600 seconds. Available only if action {alert | deny_no_log | alert_deny | block-period | block-period-client} is set to |
600 |
|
severity {High | Medium | Low | Info} |
When policy violations are recorded in the attack log, each log message contains a Severity Level (
|
Medium |
Select the trigger, if any, that FortiWeb will use when it logs and/or sends an alert email when FortiGuard ABP suggests a request is from a bot. For details, see Viewing log messages. |
No default. |
|
Select the exception policy which specifies the elements to be exempted from the FortiGuard ABP scan. |
No default |
|
Enable to confirm if the client is indeed a bot. The system sends RBE (Real Browser Enforcement) JavaScript or CAPTCHA to the client to double check if it's a bot. |
enable |
|
bot-recognition {captcha-enforcement | recaptcha-enforcement} |
|
|
Enter the reCAPTCHA server you have created through user recaptcha-user |
No default. |
|
If |
|
|
Enter the maximum amount of time (in seconds) that FortiWeb waits for results from the client. |
20 |
Related topics