F5 firewall
Use the F5 Firewall integration to manage your F5 firewall rules.
Configure F5 Firewall on Demisto
- Navigate to Settings > Integrations > Servers & Services.
- Search for F5 firewall.
- Click Add instance to create and configure a new integration instance.
Parameter | Description | Required |
---|---|---|
url | URL | True |
port | Port | True |
credentials | Credentials | True |
advancedLogin | Advanced login - set to true to authenticate via LDAP, AD etc | False |
insecure | Trust any certificate (not secure) | False |
proxy | Use system proxy settings | False |
- Click Test to validate the URLs, token, and connection.
Commands
You can execute these commands from the Demisto CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
Create a firewall policy
Creates an F5 firewall policy.
Base Command
f5-create-policy
Input
Argument Name | Description | Required |
---|
Context Output
There is no context output for this command.
Command Example
Human Readable Output
f5-create-rule
Creates a rule in a specific policy
Base Command
f5-create-rule
Input
Argument Name | Description | Required |
---|---|---|
policy-name | The policy name the rule will be associated with | Required |
Context Output
There is no context output for this command.
Command Example
Human Readable Output
List all rules for a policy
Lists all the rules of a specific policy
Base Command
f5-list-rules
Input
Argument Name | Description | Required |
---|---|---|
policy-name | The policy name that the rules displayed are associated with. | Required |
Context Output
There is no context output for this command.
Command Example
Modify the rule for a policy
Modifies an F5 rule in a specific policy.
Base Command
f5-modify-rule
Input
Argument Name | Description | Required |
---|---|---|
policy-name | The policy name the rule is associated with. | Required |
rule-name | The rule name to modify. | Required |
Context Output
There is no context output for this command.
Command Example
Human Readable Output
Delete a rule
Delete an F5 rule.
Base Command
f5-del-rule
Input
Argument Name | Description | Required |
---|---|---|
policy-name | The policy name the rule is associated with. | Required |
rule-name | The name of the rule to delete. | Required |
Context Output
There is no context output for this command.
Command Example
Add a policy to a global policy
Adds the specified policy to a global policy.
Base Command
f5-modify-global-policy
Input
Argument Name | Description | Required |
---|---|---|
enforcedPolicy | The new enforced policy to add to the global policy. | Required |
Context Output
There is no context output for this command.
Command Example
Human Readable Output
Get a global policy
Display global policy.
Base Command
f5-show-global-policy
Input
There are no input arguments for this command.
Context Output
There is no context output for this command.
Command Example
Delete a policy
Deletes a policy.
Base Command
f5-del-policy
Input
Argument Name | Description | Required |
---|---|---|
policy-name | The name of the policy to delete. | Required |
Context Output
There is no context output for this command.
Command Example
Human Readable Output
Get a list of all user sessions
Lists all the sessions with client IP for the given username.
Base Command
f5-list-all-user-sessions
Input
Argument Name | Description | Required |
---|---|---|
resource-ip | Client IP address. | Required |
Context Output
There is no context output for this command.
Command Example