You are on page 1of 2

Using Shun with Layer 7

DoS................................................................................
.................. 49
Overview: Using Shun with Layer 7
DoS......................................................................... 49
About the DoS shun
list...............................................................................
..........49
Shun List system
variables..........................................................................
..........50
Configuring DoS protection for
applications..........................................................50
Using an IP Intelligence policy with L7
DoS..........................................................51
Associating a DoS profile and IP intelligence policy with a virtual
server............. 51
Result of using shun list with Layer 7
DoS............................................................ 52
Creating Login Pages for Secure Application
Access.......................................................... 53
About login
pages..............................................................................
.............................. 53
About creating login and logout
pages.............................................................................5
3
Creating login pages
automatically......................................................................
. 53
Creating login pages
manually...........................................................................
...54
Enforcing login
pages..............................................................................
..............56
Creating logout
pages .............................................................................
............. 57
Mitigating Brute Force
Attacks............................................................................
....................59
About brute force
attacks............................................................................
..................... 59
About configuring brute force
protection.........................................................................
. 59
Overview: Mitigating brute force
attacks..........................................................................
59
Creating login pages
automatically......................................................................
. 60
Creating login pages
manually...........................................................................
...60
Configuring automatic brute force
protection........................................................ 62
Creating a custom brute force
protection.............................................................. 62
Viewing brute force attack
reports.........................................................................65
Displaying brute force event
logs.......................................................................... 66
Detecting and Preventing Web
Scraping...........................................................................
.....67
Overview: Detecting and preventing web
scraping.......................................................... 67
Prerequisites for configuring web
scraping........................................................... 67
Adding allowed search
engines............................................................................
.68
Detecting web scraping based on bot
detection....................................................69
Detecting web scraping based on session
opening.............................................. 70
Detecting web scraping based on session
transactions........................................72
Using fingerprinting to detect web
scraping.......................................................... 73
Displaying web scraping event
logs...................................................................... 74
Viewing web scraping
statistics.........................................................................
....77
Implementation
Result.............................................................................
........................ 78
Setting Up IP Address Intelligence
Blocking.........................................................................
81
Overview: Setting up IP address intelligence
blocking.....................................................81
Downloading the IP address intelligence
database...............................................81
Blocking IP addresses with bad
reputations..........................................................82
Reviewing IP address intelligence
statistics..........................................................83
Creating an iRule to log IP address intelligence
information.................................83
Creating an iRule to reject requests with questionable IP
addresses................... 84
IP address intelligence
categories.........................................................................
.......... 84
Managing IP Address
Exceptions.........................................................................
.................. 87
Overview: Managing IP address
exceptions....................................................................

You might also like