Forum Discussion
manjunath_sing1
Nov 27, 2016Nimbostratus
I Agree with the point, i too was looking for the same function. It is very difficult to identify which signature to enable to mitigate specific vulnerability with CVE code. There is no way to conform if the CVE that we are trying to mitigate has a valid signature in ASM or not, and also if it has whether we have used it or not.
Relating between CVE and ASM signature is a very much required function and F5 should take the inactivate to involve this feature at the earliest.