To configure ASE to automatically fetch and block ABS detected attacks, complete the following steps:

  1. Enable ASE Security. Enter the following command:
    /opt/pingidentity/ase/bin/cli.sh -u admin -p admin enable_firewall
  2. Enable ASE to send API traffic information to ABS. Enter the following command:
    /opt/pingidentity/ase/bin/cli.sh -u admin -p admin enable_abs
  3. Enable ASE to fetch and block ABS detected attacks. Enter the following command:
    /opt/pingidentity/ase/bin/cli.sh -u admin -p admin enable_abs_attack

After enabling automated attack blocking, ASE periodically fetches the attack list from ABS and blocks the identified connections. To set the time interval at which ASE fetches the attack list from ABS, configure the abs_attack_request_minute parameter in ase.conf file.

; This value determines how often ASE will query ABS.
abs_attack_request_minutes=10

Disable attack list fetching from ABS

To disable ASE from fetching the ABS attack list, entering the following CLI command:
/opt/pingidentity/ase/bin/cli.sh -u admin -p admin disable_abs_attack

After entering the above command, ASE will no longer fetch the attack list from ABS. However, ABS continues generating the attack list and stores it locally. The ABS attack list can be viewed using ABS APIs and used to manually configured an attack list on ASE. For more information on ABS APIs, see ABS Admin Guide.

To stop an ASE cluster from sending log files to ABS, enter the following ASE CLI command.
/opt/pingidentity/ase/bin/cli.sh -u admin -p admin disable_abs

After entering this command, ABS will not receive any logs from ASE. Refer to the ABS documentation for information on types of attacks.