Bug ID 1223309: Populate new option “Stage all Attack Signatures in the Signature Set" for Attack Signature settings

Last Modified: Feb 28, 2025

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
14.1.4, 14.1.4.1, 14.1.4.2, 14.1.4.3, 14.1.4.4, 14.1.4.5, 14.1.4.6, 14.1.5, 14.1.5.1, 14.1.5.2, 14.1.5.3, 14.1.5.4, 14.1.5.6

Fixed In:
17.5.0

Opened: Jan 11, 2023

Severity: 0-Unspecified

Symptoms

After adding new signature set to the policy, the signatures status in this set may be enforced because the staging period calculation does not take into consideration the time the signatures were added to the policy.

Impact

The signatures status is enforced

Conditions

A policy was created and after the staging period was over, the user added new signature set to the policy.

Workaround

Put the new signatures into staging via rest

Fix Information

A new GUI option has been added: "Stage all Attack Signatures in the Signature Set". Now you can choose this option for the set and all the signatures in that set will be in staging.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips