Forum Discussion
R_Marc
Nov 02, 2015Nimbostratus
You can do that using the DDoS profiles (just learned that myself). You can also do it in an iRule, but I think the DDoS configuration would be more predictable, efficient and supportable.
It's pretty flexible. They went over this at the F5 Agility break out (I saw it at a Users Group), and I think that presentation is available online.