Bug ID 497681: Tuning of Application DoS URL qualification criteria

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
11.5.1 HF1, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.1 HF10, 11.5.1 HF11, 11.5.2 HF1, 11.5.3 HF1, 11.5.3 HF2, 11.5.4 HF1, 11.5.4 HF2, 11.5.4 HF3, 11.5.4 HF4, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0, 11.6.0 HF5, 11.5.3

Opened: Dec 19, 2014

Severity: 3-Major

Symptoms

Application DoS can not be tuned in order to tell which transactions are qualified for client side mitigation.

Impact

URL will be detected as non-qualified. AVR does not qualify URLs according to the system's qualification criteria.

Conditions

This occurs in response to the following scenario: 1. Create new L7-DoS profile, enable CS injection prevention. 2. Send more than 10 requests to a qualified URL. Make sure that URL is detected as qualified. 3. Send 1 request with HEAD or TRACE methods.

Workaround

None.

Fix Information

This release provides tuning for the Application DoS URL qualification criteria.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips