Bug ID 756269: A new CLI command added to retrieve DoS vector stats

Last Modified: Jan 07, 2020

Bug Tracker

Affected Product:  See more info
BIG-IP AFM(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.4, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 15.0.0, 15.0.1, 15.0.1.1

Fixed In:
15.1.0

Opened: Jan 22, 2019
Severity: 3-Major

Symptoms

Given a attack vector name or partial name, CLI command is not able to query matched attack vector information.

Impact

There is no CLI command to query for matched attack vector information.

Conditions

This is a description of missing functionality. It happens under all conditions.

Workaround

All attack vector information for a given context (virtual server) can be queried using existing tmsh commands, then they need to filter out the specific attack vectors by writing scripts or filtering program.

Fix Information

Given a attack vector name or partial name, there is now a CLI command provided to query matched attack vector information directly: list security presentation tmui attack-list XXXX XXXX is vector name or partial name.

Behavior Change

This release introduces a new tmsh command: list security presentation tmui attack-list XXXX This command enables you to query attack information based on attack vector full name (or partial name). Existing CLI commands are not impacted by this change.