a10_ddos_template_http

Synopsis

HTTP template Configuration

Parameters

Parameters

Choices/Defaults

Comment

state

str/required

[‘noop’, ‘present’, ‘absent’]

State of the object to be created.

ansible_host

str/required

Host for AXAPI authentication

ansible_username

str/required

Username for AXAPI authentication

ansible_password

str/required

Password for AXAPI authentication

ansible_port

int/required

Port for AXAPI authentication

a10_device_context_id

int

[‘1-8’]

Device ID for aVCS configuration

a10_partition

str

Destination/target partition for object/command

http_tmpl_name

str/required

DDOS HTTP Template Name

multi_pu_threshold_distribution

dict

Field multi_pu_threshold_distribution

multi_pu_threshold_distribution_value

int

Destination side rate limit only. Default= 0

multi_pu_threshold_distribution_disable

str

‘disable’= Destination side rate limit only. Default= Enable;

action

str

‘drop’= Drop packets for the connection; ‘reset’= Send RST for the connection;

disable

bool

Disable this template

mss_cfg

dict

Field mss_cfg

mss_timeout

bool

Configure DDOS detection based on mss and packet size

mss_percent

int

Configure percentage of mss such that if a packet size is below the mss times mss-percent, packet is considered bad.

number_packets

int

Specify percentage of mss. Default is 0, mss-timeout is not enabled.

disallow_connect_method

bool

Do not allow HTTP Connect method (asymmetric mode only)

challenge_method

str

‘http-redirect’= http-redirect; ‘javascript’= javascript;

challenge_redirect_code

str

‘302’= 302 Found; ‘307’= 307 Temporary Redirect;

challenge_uri_encode

bool

Encode the challenge phrase in uri instead of in http cookie. Default encoded in http cookie

challenge_cookie_name

str

Set the cookie name used to send back to client. Default is sto-idd

challenge_keep_cookie

bool

Keep the challenge cookie from client and forward to backend. Default is do not keep

challenge_interval

int

Specify the challenge interval. Default is 8 seconds

non_http_bypass

bool

Bypass non-http traffic instead of dropping

malformed_http

dict

Field malformed_http

malformed_http_enabled

bool

Enabling ddos malformed http protection. Default value is disabled.

malformed_http_max_line_size

int

Set the maximum line size. Default value is 32512

malformed_http_max_num_headers

int

Set the maximum number of headers. Default value is 90

malformed_http_max_req_line_size

int

Set the maximum request line size. Default value is 32512

malformed_http_max_header_name_size

int

Set the maxinum header name length. Default value is 64.

malformed_http_max_content_length

int

Set the maximum content-length header. Default value is 4294967295 bytes

malformed_http_bad_chunk_mon_enabled

bool

Enabling bad chunk monitoring. Default is disabled

use_hdr_ip_cfg

dict

Field use_hdr_ip_cfg

use_hdr_ip_as_source

bool

Mitigate on src ip specified by http header for example X-Forwarded-For header. Default is disabled

l7_hdr_name

str

Set the http header name to parse for client ip. Default is X-Forwarded-For

request_header

dict

Field request_header

timeout

int

Field timeout

post_rate_limit

int

Configure rate limiting for HTTP POST request

request_rate_limit

dict

Field request_rate_limit

request_rate

int

HTTP request rate limit

uri

list

Field uri

response_rate_limit

dict

Field response_rate_limit

obj_size

dict

Field obj_size

slow_read_drop

dict

Field slow_read_drop

min_window_size

int

minimum window size

min_window_count

int

Number of packets

idle_timeout

int

Set the the idle timeout value in seconds for HTTP connections

ignore_zero_payload

bool

Don’t reset idle timer on packets with zero payload length from clients

out_of_order_queue_size

int

Set the number of packets for the out-of-order HTTP queue (asym mode only)

out_of_order_queue_timeout

int

Set the timeout value in seconds for out-of-order queue in HTTP (asym mode only)

referer_filter

dict

Field referer_filter

ref_filter_blacklist

bool

Blacklist the source if the referer matches

referer_equals_cfg

list

Field referer_equals_cfg

referer_contains_cfg

list

Field referer_contains_cfg

referer_starts_cfg

list

Field referer_starts_cfg

referer_ends_cfg

list

Field referer_ends_cfg

agent_filter

dict

Field agent_filter

agent_filter_blacklist

bool

Blacklist the source if the user-agent matches

agent_equals_cfg

list

Field agent_equals_cfg

agent_contains_cfg

list

Field agent_contains_cfg

agent_starts_cfg

list

Field agent_starts_cfg

agent_ends_cfg

list

Field agent_ends_cfg

uuid

str

uuid of the object

user_tag

str

Customized tag

filter_header_list

list

Field filter_header_list

http_filter_header_seq

int

Sequence number

http_filter_header_regex

str

Regex Expression

http_filter_header_unmatched

bool

action taken when it does not match

http_filter_header_blacklist

bool

Also blacklist the source when action is taken

http_filter_header_whitelist

bool

Whitelist the source after filter passes, packets are dropped until then

http_filter_header_count_only

bool

Take no action and continue processing the next filter

uuid

str

uuid of the object

user_tag

str

Customized tag

Examples


Return Values

modified_values (changed, dict, )

Values modified (or potential changes if using check_mode) as a result of task operation

axapi_calls (always, list, )

Sequential list of AXAPI calls made by the task

endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])

The AXAPI endpoint being accessed.

http_method (, str, [‘POST’, ‘GET’])

HTTP method being used by the primary task to interact with the AXAPI endpoint.

request_body (, complex, )

Params used to query the AXAPI

response_body (, complex, )

Response from the AXAPI

Status

  • This module is not guaranteed to have a backwards compatible interface. [preview]

  • This module is maintained by community.

Authors

  • A10 Networks