Bug ID 756269: A new CLI command added to retrieve DoS vector stats

Last Modified: Sep 14, 2023

Affected Product(s):
BIG-IP AFM(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 14.1.4, 14.1.4.1, 14.1.4.2, 14.1.4.3, 14.1.4.4, 14.1.4.5, 14.1.4.6, 14.1.5, 14.1.5.1, 14.1.5.2, 14.1.5.3, 14.1.5.4, 14.1.5.6, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2, 15.0.1.3, 15.0.1.4

Fixed In:
15.1.0

Opened: Jan 22, 2019

Severity: 3-Major

Symptoms

Given a attack vector name or partial name, CLI command is not able to query matched attack vector information.

Impact

There is no CLI command to query for matched attack vector information.

Conditions

This is a description of missing functionality. It happens under all conditions.

Workaround

All attack vector information for a given context (virtual server) can be queried using existing tmsh commands, then they need to filter out the specific attack vectors by writing scripts or filtering program.

Fix Information

Given a attack vector name or partial name, there is now a CLI command provided to query matched attack vector information directly: list security presentation tmui attack-list XXXX XXXX is vector name or partial name.

Behavior Change

This release introduces a new tmsh command: list security presentation tmui attack-list XXXX This command enables you to query attack information based on attack vector full name (or partial name). Existing CLI commands are not impacted by this change.

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips