In the BIG-IP® Network Firewall, you can configure profiles to inspect traffic against protocol inspection items. Protocol inspection items are arranged in categories by the Service type. You can assign protocol inpsection items individualy or in groups. You can add a new inspection item by writing a valid Snort rule and defining matching characteristics. You can assign protocol inspection items to a firewall rule, or directly to a virtual server.
This document includes the Snort commands that are currently supported when writing Snort rules.
Protocol Anomaly Inspection supports a subset of Snort rules. See the Snort users manual for more information. Snort rules can be written as pcre (perl-compatible regular expressions). Negotiation (!) is not supported.
The following parameters are supported when using the content and pcre commands. See content and pcre.
All parameters for byte_test are supported except dce and bitmask. See the byte_test.
All parameters for byte_jump are supported except dce, multiplier, align, post_offset, and bitmask. See byte_jump.
The following parameters are supported in metadata. See metadata.
The following parameters are supported in reference. See reference.
The following additional commands are supported.
The following parameters are added: