@robinmordasiewicz/f5xc-terraform-mcp 2.6.1 → 2.6.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/docs/data-sources/addon_subscription.md +85 -2
- package/dist/docs/data-sources/address_allocator.md +85 -2
- package/dist/docs/data-sources/advertise_policy.md +85 -2
- package/dist/docs/data-sources/alert_policy.md +85 -2
- package/dist/docs/data-sources/alert_receiver.md +85 -2
- package/dist/docs/data-sources/allowed_tenant.md +85 -2
- package/dist/docs/data-sources/api_crawler.md +85 -2
- package/dist/docs/data-sources/api_credential.md +85 -2
- package/dist/docs/data-sources/api_definition.md +85 -2
- package/dist/docs/data-sources/api_discovery.md +85 -2
- package/dist/docs/data-sources/api_testing.md +85 -2
- package/dist/docs/data-sources/apm.md +85 -2
- package/dist/docs/data-sources/app_api_group.md +85 -2
- package/dist/docs/data-sources/app_firewall.md +85 -2
- package/dist/docs/data-sources/app_setting.md +85 -2
- package/dist/docs/data-sources/app_type.md +85 -2
- package/dist/docs/data-sources/authentication.md +85 -2
- package/dist/docs/data-sources/aws_tgw_site.md +85 -2
- package/dist/docs/data-sources/aws_vpc_site.md +85 -2
- package/dist/docs/data-sources/azure_vnet_site.md +85 -2
- package/dist/docs/data-sources/bgp.md +85 -2
- package/dist/docs/data-sources/bgp_asn_set.md +85 -2
- package/dist/docs/data-sources/bgp_routing_policy.md +85 -2
- package/dist/docs/data-sources/bigip_irule.md +85 -2
- package/dist/docs/data-sources/bot_defense_app_infrastructure.md +85 -2
- package/dist/docs/data-sources/cdn_cache_rule.md +85 -2
- package/dist/docs/data-sources/cdn_loadbalancer.md +85 -2
- package/dist/docs/data-sources/certificate.md +85 -2
- package/dist/docs/data-sources/certificate_chain.md +85 -2
- package/dist/docs/data-sources/child_tenant.md +85 -2
- package/dist/docs/data-sources/child_tenant_manager.md +85 -2
- package/dist/docs/data-sources/cloud_connect.md +85 -2
- package/dist/docs/data-sources/cloud_credentials.md +85 -2
- package/dist/docs/data-sources/cloud_elastic_ip.md +85 -2
- package/dist/docs/data-sources/cloud_link.md +85 -2
- package/dist/docs/data-sources/cluster.md +85 -2
- package/dist/docs/data-sources/cminstance.md +85 -2
- package/dist/docs/data-sources/code_base_integration.md +85 -2
- package/dist/docs/data-sources/contact.md +85 -2
- package/dist/docs/data-sources/container_registry.md +85 -2
- package/dist/docs/data-sources/crl.md +85 -2
- package/dist/docs/data-sources/customer_support.md +85 -2
- package/dist/docs/data-sources/data_group.md +85 -2
- package/dist/docs/data-sources/data_type.md +85 -2
- package/dist/docs/data-sources/dc_cluster_group.md +85 -2
- package/dist/docs/data-sources/discovery.md +85 -2
- package/dist/docs/data-sources/dns_compliance_checks.md +85 -2
- package/dist/docs/data-sources/dns_domain.md +85 -2
- package/dist/docs/data-sources/dns_lb_health_check.md +85 -2
- package/dist/docs/data-sources/dns_lb_pool.md +85 -2
- package/dist/docs/data-sources/dns_load_balancer.md +85 -2
- package/dist/docs/data-sources/dns_zone.md +85 -2
- package/dist/docs/data-sources/endpoint.md +85 -2
- package/dist/docs/data-sources/enhanced_firewall_policy.md +85 -2
- package/dist/docs/data-sources/external_connector.md +85 -2
- package/dist/docs/data-sources/fast_acl.md +85 -2
- package/dist/docs/data-sources/fast_acl_rule.md +85 -2
- package/dist/docs/data-sources/filter_set.md +85 -2
- package/dist/docs/data-sources/fleet.md +85 -2
- package/dist/docs/data-sources/forward_proxy_policy.md +85 -2
- package/dist/docs/data-sources/forwarding_class.md +85 -2
- package/dist/docs/data-sources/gcp_vpc_site.md +85 -2
- package/dist/docs/data-sources/geo_location_set.md +85 -2
- package/dist/docs/data-sources/global_log_receiver.md +85 -2
- package/dist/docs/data-sources/healthcheck.md +85 -2
- package/dist/docs/data-sources/http_loadbalancer.md +85 -2
- package/dist/docs/data-sources/ike1.md +85 -2
- package/dist/docs/data-sources/ike2.md +85 -2
- package/dist/docs/data-sources/ike_phase1_profile.md +85 -2
- package/dist/docs/data-sources/ike_phase2_profile.md +85 -2
- package/dist/docs/data-sources/infraprotect_asn.md +85 -2
- package/dist/docs/data-sources/infraprotect_asn_prefix.md +85 -2
- package/dist/docs/data-sources/infraprotect_deny_list_rule.md +85 -2
- package/dist/docs/data-sources/infraprotect_firewall_rule.md +85 -2
- package/dist/docs/data-sources/infraprotect_firewall_rule_group.md +85 -2
- package/dist/docs/data-sources/infraprotect_internet_prefix_advertisement.md +85 -2
- package/dist/docs/data-sources/infraprotect_tunnel.md +85 -2
- package/dist/docs/data-sources/ip_prefix_set.md +85 -2
- package/dist/docs/data-sources/irule.md +85 -2
- package/dist/docs/data-sources/k8s_cluster.md +85 -2
- package/dist/docs/data-sources/k8s_cluster_role.md +85 -2
- package/dist/docs/data-sources/k8s_cluster_role_binding.md +85 -2
- package/dist/docs/data-sources/k8s_pod_security_admission.md +85 -2
- package/dist/docs/data-sources/k8s_pod_security_policy.md +85 -2
- package/dist/docs/data-sources/log_receiver.md +85 -2
- package/dist/docs/data-sources/malicious_user_mitigation.md +85 -2
- package/dist/docs/data-sources/managed_tenant.md +85 -2
- package/dist/docs/data-sources/namespace.md +85 -2
- package/dist/docs/data-sources/nat_policy.md +85 -2
- package/dist/docs/data-sources/network_connector.md +85 -2
- package/dist/docs/data-sources/network_firewall.md +85 -2
- package/dist/docs/data-sources/network_interface.md +85 -2
- package/dist/docs/data-sources/network_policy.md +85 -2
- package/dist/docs/data-sources/network_policy_rule.md +85 -2
- package/dist/docs/data-sources/network_policy_view.md +85 -2
- package/dist/docs/data-sources/nfv_service.md +85 -2
- package/dist/docs/data-sources/oidc_provider.md +85 -2
- package/dist/docs/data-sources/origin_pool.md +85 -2
- package/dist/docs/data-sources/policer.md +85 -2
- package/dist/docs/data-sources/policy_based_routing.md +85 -2
- package/dist/docs/data-sources/protocol_inspection.md +85 -2
- package/dist/docs/data-sources/protocol_policer.md +85 -2
- package/dist/docs/data-sources/proxy.md +85 -2
- package/dist/docs/data-sources/quota.md +85 -2
- package/dist/docs/data-sources/rate_limiter.md +85 -2
- package/dist/docs/data-sources/rate_limiter_policy.md +85 -2
- package/dist/docs/data-sources/registration.md +85 -2
- package/dist/docs/data-sources/report_config.md +85 -2
- package/dist/docs/data-sources/role.md +85 -2
- package/dist/docs/data-sources/route.md +85 -2
- package/dist/docs/data-sources/secret_management_access.md +85 -2
- package/dist/docs/data-sources/secret_policy.md +85 -2
- package/dist/docs/data-sources/secret_policy_rule.md +85 -2
- package/dist/docs/data-sources/securemesh_site.md +85 -2
- package/dist/docs/data-sources/securemesh_site_v2.md +85 -2
- package/dist/docs/data-sources/segment.md +85 -2
- package/dist/docs/data-sources/sensitive_data_policy.md +85 -2
- package/dist/docs/data-sources/service_policy.md +85 -2
- package/dist/docs/data-sources/service_policy_rule.md +85 -2
- package/dist/docs/data-sources/site_mesh_group.md +85 -2
- package/dist/docs/data-sources/srv6_network_slice.md +85 -2
- package/dist/docs/data-sources/subnet.md +85 -2
- package/dist/docs/data-sources/tcp_loadbalancer.md +85 -2
- package/dist/docs/data-sources/tenant_configuration.md +85 -2
- package/dist/docs/data-sources/tenant_profile.md +85 -2
- package/dist/docs/data-sources/ticket_tracking_system.md +85 -2
- package/dist/docs/data-sources/token.md +85 -2
- package/dist/docs/data-sources/tpm_api_key.md +85 -2
- package/dist/docs/data-sources/tpm_category.md +85 -2
- package/dist/docs/data-sources/tpm_manager.md +85 -2
- package/dist/docs/data-sources/trusted_ca_list.md +85 -2
- package/dist/docs/data-sources/tunnel.md +85 -2
- package/dist/docs/data-sources/udp_loadbalancer.md +85 -2
- package/dist/docs/data-sources/usb_policy.md +85 -2
- package/dist/docs/data-sources/user_identification.md +85 -2
- package/dist/docs/data-sources/virtual_host.md +85 -2
- package/dist/docs/data-sources/virtual_k8s.md +85 -2
- package/dist/docs/data-sources/virtual_network.md +85 -2
- package/dist/docs/data-sources/virtual_site.md +85 -2
- package/dist/docs/data-sources/voltshare_admin_policy.md +85 -2
- package/dist/docs/data-sources/voltstack_site.md +85 -2
- package/dist/docs/data-sources/waf_exclusion_policy.md +85 -2
- package/dist/docs/data-sources/workload.md +85 -2
- package/dist/docs/data-sources/workload_flavor.md +85 -2
- package/dist/docs/resources/addon_subscription.md +87 -10
- package/dist/docs/resources/address_allocator.md +86 -3
- package/dist/docs/resources/advertise_policy.md +112 -57
- package/dist/docs/resources/alert_policy.md +91 -8
- package/dist/docs/resources/alert_receiver.md +94 -55
- package/dist/docs/resources/allowed_tenant.md +87 -10
- package/dist/docs/resources/api_crawler.md +86 -3
- package/dist/docs/resources/api_credential.md +88 -5
- package/dist/docs/resources/api_definition.md +89 -6
- package/dist/docs/resources/api_discovery.md +86 -3
- package/dist/docs/resources/api_testing.md +95 -52
- package/dist/docs/resources/apm.md +156 -519
- package/dist/docs/resources/app_api_group.md +90 -25
- package/dist/docs/resources/app_firewall.md +87 -6
- package/dist/docs/resources/app_setting.md +97 -66
- package/dist/docs/resources/app_type.md +86 -3
- package/dist/docs/resources/authentication.md +90 -27
- package/dist/docs/resources/aws_tgw_site.md +125 -222
- package/dist/docs/resources/aws_vpc_site.md +149 -352
- package/dist/docs/resources/azure_vnet_site.md +233 -860
- package/dist/docs/resources/bgp.md +103 -32
- package/dist/docs/resources/bgp_asn_set.md +86 -3
- package/dist/docs/resources/bgp_routing_policy.md +86 -3
- package/dist/docs/resources/bigip_irule.md +86 -3
- package/dist/docs/resources/bot_defense_app_infrastructure.md +86 -3
- package/dist/docs/resources/cdn_cache_rule.md +97 -120
- package/dist/docs/resources/cdn_loadbalancer.md +325 -1620
- package/dist/docs/resources/certificate.md +87 -10
- package/dist/docs/resources/certificate_chain.md +86 -3
- package/dist/docs/resources/child_tenant.md +88 -17
- package/dist/docs/resources/child_tenant_manager.md +88 -17
- package/dist/docs/resources/cloud_connect.md +98 -63
- package/dist/docs/resources/cloud_credentials.md +92 -39
- package/dist/docs/resources/cloud_elastic_ip.md +91 -8
- package/dist/docs/resources/cloud_link.md +90 -29
- package/dist/docs/resources/cluster.md +109 -66
- package/dist/docs/resources/cminstance.md +86 -3
- package/dist/docs/resources/code_base_integration.md +100 -87
- package/dist/docs/resources/contact.md +86 -3
- package/dist/docs/resources/container_registry.md +86 -3
- package/dist/docs/resources/crl.md +86 -3
- package/dist/docs/resources/customer_support.md +91 -8
- package/dist/docs/resources/data_group.md +86 -3
- package/dist/docs/resources/data_type.md +88 -9
- package/dist/docs/resources/dc_cluster_group.md +86 -3
- package/dist/docs/resources/discovery.md +115 -104
- package/dist/docs/resources/dns_compliance_checks.md +86 -3
- package/dist/docs/resources/dns_domain.md +86 -3
- package/dist/docs/resources/dns_lb_health_check.md +86 -3
- package/dist/docs/resources/dns_lb_pool.md +87 -10
- package/dist/docs/resources/dns_load_balancer.md +95 -40
- package/dist/docs/resources/dns_zone.md +111 -926
- package/dist/docs/resources/endpoint.md +101 -18
- package/dist/docs/resources/enhanced_firewall_policy.md +89 -32
- package/dist/docs/resources/external_connector.md +94 -29
- package/dist/docs/resources/fast_acl.md +100 -101
- package/dist/docs/resources/fast_acl_rule.md +101 -18
- package/dist/docs/resources/filter_set.md +86 -3
- package/dist/docs/resources/fleet.md +170 -541
- package/dist/docs/resources/forward_proxy_policy.md +90 -31
- package/dist/docs/resources/forwarding_class.md +87 -10
- package/dist/docs/resources/gcp_vpc_site.md +141 -328
- package/dist/docs/resources/geo_location_set.md +86 -3
- package/dist/docs/resources/global_log_receiver.md +116 -181
- package/dist/docs/resources/healthcheck.md +86 -3
- package/dist/docs/resources/http_loadbalancer.md +523 -2778
- package/dist/docs/resources/ike1.md +86 -3
- package/dist/docs/resources/ike2.md +86 -3
- package/dist/docs/resources/ike_phase1_profile.md +86 -3
- package/dist/docs/resources/ike_phase2_profile.md +86 -3
- package/dist/docs/resources/infraprotect_asn.md +86 -3
- package/dist/docs/resources/infraprotect_asn_prefix.md +87 -10
- package/dist/docs/resources/infraprotect_deny_list_rule.md +86 -3
- package/dist/docs/resources/infraprotect_firewall_rule.md +86 -3
- package/dist/docs/resources/infraprotect_firewall_rule_group.md +86 -3
- package/dist/docs/resources/infraprotect_internet_prefix_advertisement.md +86 -3
- package/dist/docs/resources/infraprotect_tunnel.md +90 -29
- package/dist/docs/resources/ip_prefix_set.md +86 -3
- package/dist/docs/resources/irule.md +86 -3
- package/dist/docs/resources/k8s_cluster.md +93 -58
- package/dist/docs/resources/k8s_cluster_role.md +87 -8
- package/dist/docs/resources/k8s_cluster_role_binding.md +87 -10
- package/dist/docs/resources/k8s_pod_security_admission.md +86 -3
- package/dist/docs/resources/k8s_pod_security_policy.md +87 -8
- package/dist/docs/resources/log_receiver.md +88 -15
- package/dist/docs/resources/malicious_user_mitigation.md +86 -3
- package/dist/docs/resources/managed_tenant.md +89 -12
- package/dist/docs/resources/namespace.md +86 -3
- package/dist/docs/resources/nat_policy.md +126 -43
- package/dist/docs/resources/network_connector.md +94 -51
- package/dist/docs/resources/network_firewall.md +90 -31
- package/dist/docs/resources/network_interface.md +93 -46
- package/dist/docs/resources/network_policy.md +96 -13
- package/dist/docs/resources/network_policy_rule.md +91 -8
- package/dist/docs/resources/network_policy_view.md +96 -13
- package/dist/docs/resources/nfv_service.md +153 -446
- package/dist/docs/resources/oidc_provider.md +86 -3
- package/dist/docs/resources/origin_pool.md +108 -145
- package/dist/docs/resources/policer.md +86 -3
- package/dist/docs/resources/policy_based_routing.md +100 -89
- package/dist/docs/resources/protocol_inspection.md +87 -10
- package/dist/docs/resources/protocol_policer.md +91 -8
- package/dist/docs/resources/proxy.md +154 -571
- package/dist/docs/resources/quota.md +86 -3
- package/dist/docs/resources/rate_limiter.md +91 -8
- package/dist/docs/resources/rate_limiter_policy.md +100 -23
- package/dist/docs/resources/registration.md +86 -3
- package/dist/docs/resources/report_config.md +87 -10
- package/dist/docs/resources/role.md +86 -3
- package/dist/docs/resources/route.md +113 -82
- package/dist/docs/resources/secret_management_access.md +127 -156
- package/dist/docs/resources/secret_policy.md +87 -4
- package/dist/docs/resources/secret_policy_rule.md +86 -3
- package/dist/docs/resources/securemesh_site.md +137 -380
- package/dist/docs/resources/securemesh_site_v2.md +289 -1204
- package/dist/docs/resources/segment.md +86 -3
- package/dist/docs/resources/sensitive_data_policy.md +87 -10
- package/dist/docs/resources/service_policy.md +115 -122
- package/dist/docs/resources/service_policy_rule.md +110 -59
- package/dist/docs/resources/site_mesh_group.md +92 -15
- package/dist/docs/resources/srv6_network_slice.md +86 -3
- package/dist/docs/resources/subnet.md +89 -20
- package/dist/docs/resources/tcp_loadbalancer.md +114 -185
- package/dist/docs/resources/tenant_configuration.md +86 -3
- package/dist/docs/resources/tenant_profile.md +87 -10
- package/dist/docs/resources/ticket_tracking_system.md +86 -3
- package/dist/docs/resources/token.md +86 -3
- package/dist/docs/resources/tpm_api_key.md +91 -8
- package/dist/docs/resources/tpm_category.md +91 -8
- package/dist/docs/resources/tpm_manager.md +86 -3
- package/dist/docs/resources/trusted_ca_list.md +86 -3
- package/dist/docs/resources/tunnel.md +91 -8
- package/dist/docs/resources/udp_loadbalancer.md +97 -80
- package/dist/docs/resources/usb_policy.md +86 -3
- package/dist/docs/resources/user_identification.md +86 -3
- package/dist/docs/resources/virtual_host.md +152 -177
- package/dist/docs/resources/virtual_k8s.md +92 -15
- package/dist/docs/resources/virtual_network.md +91 -8
- package/dist/docs/resources/virtual_site.md +86 -3
- package/dist/docs/resources/voltshare_admin_policy.md +86 -11
- package/dist/docs/resources/voltstack_site.md +380 -1365
- package/dist/docs/resources/waf_exclusion_policy.md +91 -28
- package/dist/docs/resources/workload.md +1189 -4148
- package/dist/docs/resources/workload_flavor.md +86 -3
- package/package.json +1 -1
|
@@ -2,12 +2,12 @@
|
|
|
2
2
|
page_title: "f5xc_service_policy Resource - terraform-provider-f5xc"
|
|
3
3
|
subcategory: "Security"
|
|
4
4
|
description: |-
|
|
5
|
-
|
|
5
|
+
Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
|
|
6
6
|
---
|
|
7
7
|
|
|
8
8
|
# f5xc_service_policy (Resource)
|
|
9
9
|
|
|
10
|
-
|
|
10
|
+
Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
|
|
11
11
|
|
|
12
12
|
~> **Note** Please refer to [Service Policy API docs](https://docs.cloud.f5.com/docs-v2/api/service-policy) to learn more.
|
|
13
13
|
|
|
@@ -15,7 +15,7 @@ description: |-
|
|
|
15
15
|
|
|
16
16
|
```terraform
|
|
17
17
|
# Service Policy Resource Example
|
|
18
|
-
#
|
|
18
|
+
# Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
|
|
19
19
|
|
|
20
20
|
# Basic Service Policy configuration
|
|
21
21
|
resource "f5xc_service_policy" "example" {
|
|
@@ -111,7 +111,7 @@ An [`allow_list`](#allow-list) block supports the following:
|
|
|
111
111
|
|
|
112
112
|
<a id="allow-list-prefix-list"></a>• [`prefix_list`](#allow-list-prefix-list) - Optional Block<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#allow-list-prefix-list) below.
|
|
113
113
|
|
|
114
|
-
<a id="allow-list-tls-fingerprint-classes"></a>• [`tls_fingerprint_classes`](#allow-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>
|
|
114
|
+
<a id="allow-list-tls-fingerprint-classes"></a>• [`tls_fingerprint_classes`](#allow-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>See [TLS Fingerprints](#common-tls-fingerprints)<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS Fingerprint Classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
|
|
115
115
|
|
|
116
116
|
<a id="allow-list-tls-fingerprint-values"></a>• [`tls_fingerprint_values`](#allow-list-tls-fingerprint-values) - Optional List<br>TLS Fingerprint Values. A list of exact TLS JA3 fingerprints to match the input TLS JA3 fingerprint against
|
|
117
117
|
|
|
@@ -123,23 +123,11 @@ An [`asn_list`](#allow-list-asn-list) block (within [`allow_list`](#allow-list))
|
|
|
123
123
|
|
|
124
124
|
#### Allow List Asn Set
|
|
125
125
|
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
<a id="allow-list-asn-set-name"></a>• [`name`](#allow-list-asn-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
129
|
-
|
|
130
|
-
<a id="allow-list-asn-set-namespace"></a>• [`namespace`](#allow-list-asn-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
131
|
-
|
|
132
|
-
<a id="allow-list-asn-set-tenant"></a>• [`tenant`](#allow-list-asn-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
126
|
+
<a id="objref-a23f21"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
|
|
133
127
|
|
|
134
128
|
#### Allow List IP Prefix Set
|
|
135
129
|
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
<a id="allow-list-ip-prefix-set-name"></a>• [`name`](#allow-list-ip-prefix-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
139
|
-
|
|
140
|
-
<a id="allow-list-ip-prefix-set-namespace"></a>• [`namespace`](#allow-list-ip-prefix-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
141
|
-
|
|
142
|
-
<a id="allow-list-ip-prefix-set-tenant"></a>• [`tenant`](#allow-list-ip-prefix-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
130
|
+
<a id="objref-c28920"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
|
|
143
131
|
|
|
144
132
|
#### Allow List Prefix List
|
|
145
133
|
|
|
@@ -167,7 +155,7 @@ A [`deny_list`](#deny-list) block supports the following:
|
|
|
167
155
|
|
|
168
156
|
<a id="deny-list-prefix-list"></a>• [`prefix_list`](#deny-list-prefix-list) - Optional Block<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#deny-list-prefix-list) below.
|
|
169
157
|
|
|
170
|
-
<a id="deny-list-tls-fingerprint-classes"></a>• [`tls_fingerprint_classes`](#deny-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>
|
|
158
|
+
<a id="deny-list-tls-fingerprint-classes"></a>• [`tls_fingerprint_classes`](#deny-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>See [TLS Fingerprints](#common-tls-fingerprints)<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS Fingerprint Classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
|
|
171
159
|
|
|
172
160
|
<a id="deny-list-tls-fingerprint-values"></a>• [`tls_fingerprint_values`](#deny-list-tls-fingerprint-values) - Optional List<br>TLS Fingerprint Values. A list of exact TLS JA3 fingerprints to match the input TLS JA3 fingerprint against
|
|
173
161
|
|
|
@@ -179,23 +167,11 @@ An [`asn_list`](#deny-list-asn-list) block (within [`deny_list`](#deny-list)) su
|
|
|
179
167
|
|
|
180
168
|
#### Deny List Asn Set
|
|
181
169
|
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
<a id="deny-list-asn-set-name"></a>• [`name`](#deny-list-asn-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
185
|
-
|
|
186
|
-
<a id="deny-list-asn-set-namespace"></a>• [`namespace`](#deny-list-asn-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
187
|
-
|
|
188
|
-
<a id="deny-list-asn-set-tenant"></a>• [`tenant`](#deny-list-asn-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
170
|
+
<a id="objref-39491c"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
|
|
189
171
|
|
|
190
172
|
#### Deny List IP Prefix Set
|
|
191
173
|
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
<a id="deny-list-ip-prefix-set-name"></a>• [`name`](#deny-list-ip-prefix-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
195
|
-
|
|
196
|
-
<a id="deny-list-ip-prefix-set-namespace"></a>• [`namespace`](#deny-list-ip-prefix-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
197
|
-
|
|
198
|
-
<a id="deny-list-ip-prefix-set-tenant"></a>• [`tenant`](#deny-list-ip-prefix-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
174
|
+
<a id="objref-9600e1"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
|
|
199
175
|
|
|
200
176
|
#### Deny List Prefix List
|
|
201
177
|
|
|
@@ -325,7 +301,7 @@ An [`item`](#rule-list-rules-spec-arg-matchers-item) block (within [`rule_list.r
|
|
|
325
301
|
|
|
326
302
|
<a id="values-8f2f21"></a>• [`regex_values`](#values-8f2f21) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
327
303
|
|
|
328
|
-
<a id="transformers-0078cd"></a>• [`transformers`](#transformers-0078cd) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
304
|
+
<a id="transformers-0078cd"></a>• [`transformers`](#transformers-0078cd) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
329
305
|
|
|
330
306
|
#### Rule List Rules Spec Asn List
|
|
331
307
|
|
|
@@ -341,17 +317,7 @@ An [`asn_matcher`](#rule-list-rules-spec-asn-matcher) block (within [`rule_list.
|
|
|
341
317
|
|
|
342
318
|
#### Rule List Rules Spec Asn Matcher Asn Sets
|
|
343
319
|
|
|
344
|
-
|
|
345
|
-
|
|
346
|
-
<a id="kind-5eb208"></a>• [`kind`](#kind-5eb208) - Optional String<br>Kind. When a configuration object(e.g. virtual_host) refers to another(e.g route) then kind will hold the referred object's kind (e.g. 'route')
|
|
347
|
-
|
|
348
|
-
<a id="name-15beb2"></a>• [`name`](#name-15beb2) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
349
|
-
|
|
350
|
-
<a id="namespace-92a7ae"></a>• [`namespace`](#namespace-92a7ae) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
351
|
-
|
|
352
|
-
<a id="tenant-98502e"></a>• [`tenant`](#tenant-98502e) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
353
|
-
|
|
354
|
-
<a id="uid-648ca9"></a>• [`uid`](#uid-648ca9) - Optional String<br>UID. When a configuration object(e.g. virtual_host) refers to another(e.g route) then uid will hold the referred object's(e.g. route's) uid
|
|
320
|
+
<a id="deep-8752e9"></a>Deeply nested **Sets** block collapsed for readability.
|
|
355
321
|
|
|
356
322
|
#### Rule List Rules Spec Body Matcher
|
|
357
323
|
|
|
@@ -361,7 +327,7 @@ A [`body_matcher`](#rule-list-rules-spec-body-matcher) block (within [`rule_list
|
|
|
361
327
|
|
|
362
328
|
<a id="values-156f80"></a>• [`regex_values`](#values-156f80) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
363
329
|
|
|
364
|
-
<a id="transformers-8d4f75"></a>• [`transformers`](#transformers-8d4f75) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
330
|
+
<a id="transformers-8d4f75"></a>• [`transformers`](#transformers-8d4f75) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
365
331
|
|
|
366
332
|
#### Rule List Rules Spec Bot Action
|
|
367
333
|
|
|
@@ -379,7 +345,7 @@ A [`client_name_matcher`](#matcher-ded25d) block (within [`rule_list.rules.spec`
|
|
|
379
345
|
|
|
380
346
|
<a id="values-4b3791"></a>• [`regex_values`](#values-4b3791) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
381
347
|
|
|
382
|
-
<a id="transformers-fd5b88"></a>• [`transformers`](#transformers-fd5b88) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
348
|
+
<a id="transformers-fd5b88"></a>• [`transformers`](#transformers-fd5b88) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
383
349
|
|
|
384
350
|
#### Rule List Rules Spec Client Selector
|
|
385
351
|
|
|
@@ -409,7 +375,7 @@ An [`item`](#item-ab8ab4) block (within [`rule_list.rules.spec.cookie_matchers`]
|
|
|
409
375
|
|
|
410
376
|
<a id="values-8e4fe5"></a>• [`regex_values`](#values-8e4fe5) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
411
377
|
|
|
412
|
-
<a id="transformers-c061db"></a>• [`transformers`](#transformers-c061db) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
378
|
+
<a id="transformers-c061db"></a>• [`transformers`](#transformers-c061db) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
413
379
|
|
|
414
380
|
#### Rule List Rules Spec Domain Matcher
|
|
415
381
|
|
|
@@ -419,7 +385,7 @@ A [`domain_matcher`](#rule-list-rules-spec-domain-matcher) block (within [`rule_
|
|
|
419
385
|
|
|
420
386
|
<a id="values-e318f7"></a>• [`regex_values`](#values-e318f7) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
421
387
|
|
|
422
|
-
<a id="transformers-f69aff"></a>• [`transformers`](#transformers-f69aff) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
388
|
+
<a id="transformers-f69aff"></a>• [`transformers`](#transformers-f69aff) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
423
389
|
|
|
424
390
|
#### Rule List Rules Spec Headers
|
|
425
391
|
|
|
@@ -443,7 +409,7 @@ An [`item`](#rule-list-rules-spec-headers-item) block (within [`rule_list.rules.
|
|
|
443
409
|
|
|
444
410
|
<a id="values-0db8b4"></a>• [`regex_values`](#values-0db8b4) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
445
411
|
|
|
446
|
-
<a id="transformers-a3008a"></a>• [`transformers`](#transformers-a3008a) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
412
|
+
<a id="transformers-a3008a"></a>• [`transformers`](#transformers-a3008a) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
447
413
|
|
|
448
414
|
#### Rule List Rules Spec HTTP Method
|
|
449
415
|
|
|
@@ -451,7 +417,7 @@ A [`http_method`](#rule-list-rules-spec-http-method) block (within [`rule_list.r
|
|
|
451
417
|
|
|
452
418
|
<a id="matcher-ea16cd"></a>• [`invert_matcher`](#matcher-ea16cd) - Optional Bool<br>Invert Method Matcher. Invert the match result
|
|
453
419
|
|
|
454
|
-
<a id="methods-7419c4"></a>• [`methods`](#methods-7419c4) - Optional List Defaults to `ANY`<br>
|
|
420
|
+
<a id="methods-7419c4"></a>• [`methods`](#methods-7419c4) - Optional List Defaults to `ANY`<br>See [HTTP Methods](#common-http-methods)<br> Method List. List of methods values to match against
|
|
455
421
|
|
|
456
422
|
#### Rule List Rules Spec IP Matcher
|
|
457
423
|
|
|
@@ -463,17 +429,7 @@ An [`ip_matcher`](#rule-list-rules-spec-ip-matcher) block (within [`rule_list.ru
|
|
|
463
429
|
|
|
464
430
|
#### Rule List Rules Spec IP Matcher Prefix Sets
|
|
465
431
|
|
|
466
|
-
|
|
467
|
-
|
|
468
|
-
<a id="kind-2cf0f9"></a>• [`kind`](#kind-2cf0f9) - Optional String<br>Kind. When a configuration object(e.g. virtual_host) refers to another(e.g route) then kind will hold the referred object's kind (e.g. 'route')
|
|
469
|
-
|
|
470
|
-
<a id="name-5f1c1f"></a>• [`name`](#name-5f1c1f) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
471
|
-
|
|
472
|
-
<a id="namespace-ff5432"></a>• [`namespace`](#namespace-ff5432) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
473
|
-
|
|
474
|
-
<a id="tenant-362f28"></a>• [`tenant`](#tenant-362f28) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
475
|
-
|
|
476
|
-
<a id="uid-38c7d3"></a>• [`uid`](#uid-38c7d3) - Optional String<br>UID. When a configuration object(e.g. virtual_host) refers to another(e.g route) then uid will hold the referred object's(e.g. route's) uid
|
|
432
|
+
<a id="deep-916df9"></a>Deeply nested **Sets** block collapsed for readability.
|
|
477
433
|
|
|
478
434
|
#### Rule List Rules Spec IP Prefix List
|
|
479
435
|
|
|
@@ -485,9 +441,7 @@ An [`ip_prefix_list`](#rule-list-rules-spec-ip-prefix-list) block (within [`rule
|
|
|
485
441
|
|
|
486
442
|
#### Rule List Rules Spec IP Threat Category List
|
|
487
443
|
|
|
488
|
-
|
|
489
|
-
|
|
490
|
-
<a id="categories-ff2d46"></a>• [`ip_threat_categories`](#categories-ff2d46) - Optional List Defaults to `SPAM_SOURCES`<br>Possible values are `SPAM_SOURCES`, `WINDOWS_EXPLOITS`, `WEB_ATTACKS`, `BOTNETS`, `SCANNERS`, `REPUTATION`, `PHISHING`, `PROXY`, `MOBILE_THREATS`, `TOR_PROXY`, `DENIAL_OF_SERVICE`, `NETWORK`<br>[Enum: SPAM_SOURCES|WINDOWS_EXPLOITS|WEB_ATTACKS|BOTNETS|SCANNERS|REPUTATION|PHISHING|PROXY|MOBILE_THREATS|TOR_PROXY|DENIAL_OF_SERVICE|NETWORK] List of IP Threat Categories to choose. The IP threat categories is obtained from the list and is used to auto-generate equivalent label selection expressions
|
|
444
|
+
<a id="deep-990965"></a>Deeply nested **List** block collapsed for readability.
|
|
491
445
|
|
|
492
446
|
#### Rule List Rules Spec Ja4 TLS Fingerprint
|
|
493
447
|
|
|
@@ -517,7 +471,7 @@ An [`item`](#rule-list-rules-spec-jwt-claims-item) block (within [`rule_list.rul
|
|
|
517
471
|
|
|
518
472
|
<a id="values-abf135"></a>• [`regex_values`](#values-abf135) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
519
473
|
|
|
520
|
-
<a id="transformers-365d8a"></a>• [`transformers`](#transformers-365d8a) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
474
|
+
<a id="transformers-365d8a"></a>• [`transformers`](#transformers-365d8a) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
521
475
|
|
|
522
476
|
#### Rule List Rules Spec Label Matcher
|
|
523
477
|
|
|
@@ -547,7 +501,7 @@ A [`path`](#rule-list-rules-spec-path) block (within [`rule_list.rules.spec`](#r
|
|
|
547
501
|
|
|
548
502
|
<a id="rule-list-rules-spec-path-suffix-values"></a>• [`suffix_values`](#rule-list-rules-spec-path-suffix-values) - Optional List<br>Suffix Values. A list of path suffix values to match the input HTTP path against
|
|
549
503
|
|
|
550
|
-
<a id="rule-list-rules-spec-path-transformers"></a>• [`transformers`](#rule-list-rules-spec-path-transformers) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
504
|
+
<a id="rule-list-rules-spec-path-transformers"></a>• [`transformers`](#rule-list-rules-spec-path-transformers) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
551
505
|
|
|
552
506
|
#### Rule List Rules Spec Port Matcher
|
|
553
507
|
|
|
@@ -579,7 +533,7 @@ An [`item`](#rule-list-rules-spec-query-params-item) block (within [`rule_list.r
|
|
|
579
533
|
|
|
580
534
|
<a id="values-b50c1e"></a>• [`regex_values`](#values-b50c1e) - Optional List<br>Regex Values. A list of regular expressions to match the input against
|
|
581
535
|
|
|
582
|
-
<a id="transformers-499060"></a>• [`transformers`](#transformers-499060) - Optional List Defaults to `TRANSFORMER_NONE`<br>
|
|
536
|
+
<a id="transformers-499060"></a>• [`transformers`](#transformers-499060) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
|
|
583
537
|
|
|
584
538
|
#### Rule List Rules Spec Request Constraints
|
|
585
539
|
|
|
@@ -653,41 +607,25 @@ A [`segment_policy`](#rule-list-rules-spec-segment-policy) block (within [`rule_
|
|
|
653
607
|
|
|
654
608
|
#### Rule List Rules Spec Segment Policy Dst Segments
|
|
655
609
|
|
|
656
|
-
|
|
657
|
-
|
|
658
|
-
<a id="segments-c03bbe"></a>• [`segments`](#segments-c03bbe) - Optional Block<br>Segments. Select list of segments<br>See [Segments](#segments-c03bbe) below.
|
|
610
|
+
<a id="deep-8c7969"></a>Deeply nested **Segments** block collapsed for readability.
|
|
659
611
|
|
|
660
612
|
#### Rule List Rules Spec Segment Policy Dst Segments Segments
|
|
661
613
|
|
|
662
|
-
|
|
663
|
-
|
|
664
|
-
<a id="name-218ae8"></a>• [`name`](#name-218ae8) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
665
|
-
|
|
666
|
-
<a id="namespace-42b54f"></a>• [`namespace`](#namespace-42b54f) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
667
|
-
|
|
668
|
-
<a id="tenant-9e07d0"></a>• [`tenant`](#tenant-9e07d0) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
614
|
+
<a id="deep-8de087"></a>Deeply nested **Segments** block collapsed for readability.
|
|
669
615
|
|
|
670
616
|
#### Rule List Rules Spec Segment Policy Src Segments
|
|
671
617
|
|
|
672
|
-
|
|
673
|
-
|
|
674
|
-
<a id="segments-7a67c9"></a>• [`segments`](#segments-7a67c9) - Optional Block<br>Segments. Select list of segments<br>See [Segments](#segments-7a67c9) below.
|
|
618
|
+
<a id="deep-0d1630"></a>Deeply nested **Segments** block collapsed for readability.
|
|
675
619
|
|
|
676
620
|
#### Rule List Rules Spec Segment Policy Src Segments Segments
|
|
677
621
|
|
|
678
|
-
|
|
679
|
-
|
|
680
|
-
<a id="name-bb44ac"></a>• [`name`](#name-bb44ac) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
681
|
-
|
|
682
|
-
<a id="namespace-e269e8"></a>• [`namespace`](#namespace-e269e8) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
683
|
-
|
|
684
|
-
<a id="tenant-29af01"></a>• [`tenant`](#tenant-29af01) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
622
|
+
<a id="deep-935983"></a>Deeply nested **Segments** block collapsed for readability.
|
|
685
623
|
|
|
686
624
|
#### Rule List Rules Spec TLS Fingerprint Matcher
|
|
687
625
|
|
|
688
626
|
A [`tls_fingerprint_matcher`](#matcher-95ee34) block (within [`rule_list.rules.spec`](#rule-list-rules-spec)) supports the following:
|
|
689
627
|
|
|
690
|
-
<a id="classes-8d3695"></a>• [`classes`](#classes-8d3695) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>
|
|
628
|
+
<a id="classes-8d3695"></a>• [`classes`](#classes-8d3695) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>See [TLS Fingerprints](#common-tls-fingerprints)<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS fingerprint classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
|
|
691
629
|
|
|
692
630
|
<a id="values-e523b3"></a>• [`exact_values`](#values-e523b3) - Optional List<br>Exact Values. A list of exact TLS JA3 fingerprints to match the input TLS JA3 fingerprint against
|
|
693
631
|
|
|
@@ -713,51 +651,23 @@ A [`waf_action`](#rule-list-rules-spec-waf-action) block (within [`rule_list.rul
|
|
|
713
651
|
|
|
714
652
|
#### Rule List Rules Spec WAF Action App Firewall Detection Control
|
|
715
653
|
|
|
716
|
-
|
|
717
|
-
|
|
718
|
-
<a id="contexts-37ecbb"></a>• [`exclude_attack_type_contexts`](#contexts-37ecbb) - Optional Block<br>Attack Types. Attack Types to be excluded for the defined match criteria<br>See [Exclude Attack Type Contexts](#contexts-37ecbb) below.
|
|
719
|
-
|
|
720
|
-
<a id="contexts-e1b02b"></a>• [`exclude_bot_name_contexts`](#contexts-e1b02b) - Optional Block<br>Bot Names. Bot Names to be excluded for the defined match criteria<br>See [Exclude Bot Name Contexts](#contexts-e1b02b) below.
|
|
721
|
-
|
|
722
|
-
<a id="contexts-2da85d"></a>• [`exclude_signature_contexts`](#contexts-2da85d) - Optional Block<br>Signature IDs. Signature IDs to be excluded for the defined match criteria<br>See [Exclude Signature Contexts](#contexts-2da85d) below.
|
|
723
|
-
|
|
724
|
-
<a id="contexts-716dd3"></a>• [`exclude_violation_contexts`](#contexts-716dd3) - Optional Block<br>Violations. Violations to be excluded for the defined match criteria<br>See [Exclude Violation Contexts](#contexts-716dd3) below.
|
|
654
|
+
<a id="deep-3d8491"></a>Deeply nested **Control** block collapsed for readability.
|
|
725
655
|
|
|
726
656
|
#### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Attack Type Contexts
|
|
727
657
|
|
|
728
|
-
|
|
729
|
-
|
|
730
|
-
<a id="context-db3d53"></a>• [`context`](#context-db3d53) - Optional String Defaults to `CONTEXT_ANY`<br>Possible values are `CONTEXT_ANY`, `CONTEXT_BODY`, `CONTEXT_REQUEST`, `CONTEXT_RESPONSE`, `CONTEXT_PARAMETER`, `CONTEXT_HEADER`, `CONTEXT_COOKIE`, `CONTEXT_URL`, `CONTEXT_URI`<br>[Enum: CONTEXT_ANY|CONTEXT_BODY|CONTEXT_REQUEST|CONTEXT_RESPONSE|CONTEXT_PARAMETER|CONTEXT_HEADER|CONTEXT_COOKIE|CONTEXT_URL|CONTEXT_URI] WAF Exclusion Context Options. The available contexts for Exclusion rules. - CONTEXT_ANY: CONTEXT_ANY Detection will be excluded for all contexts. - CONTEXT_BODY: CONTEXT_BODY Detection will be excluded for the request body. - CONTEXT_REQUEST: CONTEXT_REQUEST Detection will be excluded for the request. - CONTEXT_RESPONSE: CONTEXT_RESPONSE - CONTEXT_PARAMETER: CONTEXT_PARAMETER Detection will be excluded for the parameters. The parameter name is required in the Context name field. If the field is left empty, the detection will be excluded for all parameters. - CONTEXT_HEADER: CONTEXT_HEADER Detection will be excluded for the headers. The header name is required in the Context name field. If the field is left empty, the detection will be excluded for all headers. - CONTEXT_COOKIE: CONTEXT_COOKIE Detection will be excluded for the cookies. The cookie name is required in the Context name field. If the field is left empty, the detection will be excluded for all cookies. - CONTEXT_URL: CONTEXT_URL Detection will be excluded for the request URL. - CONTEXT_URI: CONTEXT_URI
|
|
731
|
-
|
|
732
|
-
<a id="name-dcda5a"></a>• [`context_name`](#name-dcda5a) - Optional String<br>Context Name. Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. Wildcard matching can be used by prefixing or suffixing the context name with an wildcard asterisk (*)
|
|
733
|
-
|
|
734
|
-
<a id="type-0b6341"></a>• [`exclude_attack_type`](#type-0b6341) - Optional String Defaults to `ATTACK_TYPE_NONE`<br>Possible values are `ATTACK_TYPE_NONE`, `ATTACK_TYPE_NON_BROWSER_CLIENT`, `ATTACK_TYPE_OTHER_APPLICATION_ATTACKS`, `ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE`, `ATTACK_TYPE_DETECTION_EVASION`, `ATTACK_TYPE_VULNERABILITY_SCAN`, `ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY`, `ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS`, `ATTACK_TYPE_BUFFER_OVERFLOW`, `ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION`, `ATTACK_TYPE_INFORMATION_LEAKAGE`, `ATTACK_TYPE_DIRECTORY_INDEXING`, `ATTACK_TYPE_PATH_TRAVERSAL`, `ATTACK_TYPE_XPATH_INJECTION`, `ATTACK_TYPE_LDAP_INJECTION`, `ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION`, `ATTACK_TYPE_COMMAND_EXECUTION`, `ATTACK_TYPE_SQL_INJECTION`, `ATTACK_TYPE_CROSS_SITE_SCRIPTING`, `ATTACK_TYPE_DENIAL_OF_SERVICE`, `ATTACK_TYPE_HTTP_PARSER_ATTACK`, `ATTACK_TYPE_SESSION_HIJACKING`, `ATTACK_TYPE_HTTP_RESPONSE_SPLITTING`, `ATTACK_TYPE_FORCEFUL_BROWSING`, `ATTACK_TYPE_REMOTE_FILE_INCLUDE`, `ATTACK_TYPE_MALICIOUS_FILE_UPLOAD`, `ATTACK_TYPE_GRAPHQL_PARSER_ATTACK`<br>[Enum: ATTACK_TYPE_NONE|ATTACK_TYPE_NON_BROWSER_CLIENT|ATTACK_TYPE_OTHER_APPLICATION_ATTACKS|ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE|ATTACK_TYPE_DETECTION_EVASION|ATTACK_TYPE_VULNERABILITY_SCAN|ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY|ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS|ATTACK_TYPE_BUFFER_OVERFLOW|ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION|ATTACK_TYPE_INFORMATION_LEAKAGE|ATTACK_TYPE_DIRECTORY_INDEXING|ATTACK_TYPE_PATH_TRAVERSAL|ATTACK_TYPE_XPATH_INJECTION|ATTACK_TYPE_LDAP_INJECTION|ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION|ATTACK_TYPE_COMMAND_EXECUTION|ATTACK_TYPE_SQL_INJECTION|ATTACK_TYPE_CROSS_SITE_SCRIPTING|ATTACK_TYPE_DENIAL_OF_SERVICE|ATTACK_TYPE_HTTP_PARSER_ATTACK|ATTACK_TYPE_SESSION_HIJACKING|ATTACK_TYPE_HTTP_RESPONSE_SPLITTING|ATTACK_TYPE_FORCEFUL_BROWSING|ATTACK_TYPE_REMOTE_FILE_INCLUDE|ATTACK_TYPE_MALICIOUS_FILE_UPLOAD|ATTACK_TYPE_GRAPHQL_PARSER_ATTACK] Attack Types. List of all Attack Types ATTACK_TYPE_NONE ATTACK_TYPE_NON_BROWSER_CLIENT ATTACK_TYPE_OTHER_APPLICATION_ATTACKS ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE ATTACK_TYPE_DETECTION_EVASION ATTACK_TYPE_VULNERABILITY_SCAN ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS ATTACK_TYPE_BUFFER_OVERFLOW ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION ATTACK_TYPE_INFORMATION_LEAKAGE ATTACK_TYPE_DIRECTORY_INDEXING ATTACK_TYPE_PATH_TRAVERSAL ATTACK_TYPE_XPATH_INJECTION ATTACK_TYPE_LDAP_INJECTION ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION ATTACK_TYPE_COMMAND_EXECUTION ATTACK_TYPE_SQL_INJECTION ATTACK_TYPE_CROSS_SITE_SCRIPTING ATTACK_TYPE_DENIAL_OF_SERVICE ATTACK_TYPE_HTTP_PARSER_ATTACK ATTACK_TYPE_SESSION_HIJACKING ATTACK_TYPE_HTTP_RESPONSE_SPLITTING ATTACK_TYPE_FORCEFUL_BROWSING ATTACK_TYPE_REMOTE_FILE_INCLUDE ATTACK_TYPE_MALICIOUS_FILE_UPLOAD ATTACK_TYPE_GRAPHQL_PARSER_ATTACK
|
|
658
|
+
<a id="deep-fc8b09"></a>Deeply nested **Contexts** block collapsed for readability.
|
|
735
659
|
|
|
736
660
|
#### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Bot Name Contexts
|
|
737
661
|
|
|
738
|
-
|
|
739
|
-
|
|
740
|
-
<a id="name-b71242"></a>• [`bot_name`](#name-b71242) - Optional String<br>Bot Name
|
|
662
|
+
<a id="deep-02ea7a"></a>Deeply nested **Contexts** block collapsed for readability.
|
|
741
663
|
|
|
742
664
|
#### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Signature Contexts
|
|
743
665
|
|
|
744
|
-
|
|
745
|
-
|
|
746
|
-
<a id="context-1d6f79"></a>• [`context`](#context-1d6f79) - Optional String Defaults to `CONTEXT_ANY`<br>Possible values are `CONTEXT_ANY`, `CONTEXT_BODY`, `CONTEXT_REQUEST`, `CONTEXT_RESPONSE`, `CONTEXT_PARAMETER`, `CONTEXT_HEADER`, `CONTEXT_COOKIE`, `CONTEXT_URL`, `CONTEXT_URI`<br>[Enum: CONTEXT_ANY|CONTEXT_BODY|CONTEXT_REQUEST|CONTEXT_RESPONSE|CONTEXT_PARAMETER|CONTEXT_HEADER|CONTEXT_COOKIE|CONTEXT_URL|CONTEXT_URI] WAF Exclusion Context Options. The available contexts for Exclusion rules. - CONTEXT_ANY: CONTEXT_ANY Detection will be excluded for all contexts. - CONTEXT_BODY: CONTEXT_BODY Detection will be excluded for the request body. - CONTEXT_REQUEST: CONTEXT_REQUEST Detection will be excluded for the request. - CONTEXT_RESPONSE: CONTEXT_RESPONSE - CONTEXT_PARAMETER: CONTEXT_PARAMETER Detection will be excluded for the parameters. The parameter name is required in the Context name field. If the field is left empty, the detection will be excluded for all parameters. - CONTEXT_HEADER: CONTEXT_HEADER Detection will be excluded for the headers. The header name is required in the Context name field. If the field is left empty, the detection will be excluded for all headers. - CONTEXT_COOKIE: CONTEXT_COOKIE Detection will be excluded for the cookies. The cookie name is required in the Context name field. If the field is left empty, the detection will be excluded for all cookies. - CONTEXT_URL: CONTEXT_URL Detection will be excluded for the request URL. - CONTEXT_URI: CONTEXT_URI
|
|
747
|
-
|
|
748
|
-
<a id="name-2c4afd"></a>• [`context_name`](#name-2c4afd) - Optional String<br>Context Name. Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. Wildcard matching can be used by prefixing or suffixing the context name with an wildcard asterisk (*)
|
|
749
|
-
|
|
750
|
-
<a id="signature-id-c5ea27"></a>• [`signature_id`](#signature-id-c5ea27) - Optional Number<br>SignatureID. The allowed values for signature ID are 0 and in the range of 200000001-299999999. 0 implies that all signatures will be excluded for the specified context
|
|
666
|
+
<a id="deep-f1d198"></a>Deeply nested **Contexts** block collapsed for readability.
|
|
751
667
|
|
|
752
668
|
#### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Violation Contexts
|
|
753
669
|
|
|
754
|
-
|
|
755
|
-
|
|
756
|
-
<a id="context-c1896e"></a>• [`context`](#context-c1896e) - Optional String Defaults to `CONTEXT_ANY`<br>Possible values are `CONTEXT_ANY`, `CONTEXT_BODY`, `CONTEXT_REQUEST`, `CONTEXT_RESPONSE`, `CONTEXT_PARAMETER`, `CONTEXT_HEADER`, `CONTEXT_COOKIE`, `CONTEXT_URL`, `CONTEXT_URI`<br>[Enum: CONTEXT_ANY|CONTEXT_BODY|CONTEXT_REQUEST|CONTEXT_RESPONSE|CONTEXT_PARAMETER|CONTEXT_HEADER|CONTEXT_COOKIE|CONTEXT_URL|CONTEXT_URI] WAF Exclusion Context Options. The available contexts for Exclusion rules. - CONTEXT_ANY: CONTEXT_ANY Detection will be excluded for all contexts. - CONTEXT_BODY: CONTEXT_BODY Detection will be excluded for the request body. - CONTEXT_REQUEST: CONTEXT_REQUEST Detection will be excluded for the request. - CONTEXT_RESPONSE: CONTEXT_RESPONSE - CONTEXT_PARAMETER: CONTEXT_PARAMETER Detection will be excluded for the parameters. The parameter name is required in the Context name field. If the field is left empty, the detection will be excluded for all parameters. - CONTEXT_HEADER: CONTEXT_HEADER Detection will be excluded for the headers. The header name is required in the Context name field. If the field is left empty, the detection will be excluded for all headers. - CONTEXT_COOKIE: CONTEXT_COOKIE Detection will be excluded for the cookies. The cookie name is required in the Context name field. If the field is left empty, the detection will be excluded for all cookies. - CONTEXT_URL: CONTEXT_URL Detection will be excluded for the request URL. - CONTEXT_URI: CONTEXT_URI
|
|
757
|
-
|
|
758
|
-
<a id="name-4dc87b"></a>• [`context_name`](#name-4dc87b) - Optional String<br>Context Name. Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. Wildcard matching can be used by prefixing or suffixing the context name with an wildcard asterisk (*)
|
|
759
|
-
|
|
760
|
-
<a id="violation-dfe3e0"></a>• [`exclude_violation`](#violation-dfe3e0) - Optional String Defaults to `VIOL_NONE`<br>Possible values are `VIOL_NONE`, `VIOL_FILETYPE`, `VIOL_METHOD`, `VIOL_MANDATORY_HEADER`, `VIOL_HTTP_RESPONSE_STATUS`, `VIOL_REQUEST_MAX_LENGTH`, `VIOL_FILE_UPLOAD`, `VIOL_FILE_UPLOAD_IN_BODY`, `VIOL_XML_MALFORMED`, `VIOL_JSON_MALFORMED`, `VIOL_ASM_COOKIE_MODIFIED`, `VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS`, `VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE`, `VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT`, `VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST`, `VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION`, `VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS`, `VIOL_EVASION_DIRECTORY_TRAVERSALS`, `VIOL_MALFORMED_REQUEST`, `VIOL_EVASION_MULTIPLE_DECODING`, `VIOL_DATA_GUARD`, `VIOL_EVASION_APACHE_WHITESPACE`, `VIOL_COOKIE_MODIFIED`, `VIOL_EVASION_IIS_UNICODE_CODEPOINTS`, `VIOL_EVASION_IIS_BACKSLASHES`, `VIOL_EVASION_PERCENT_U_DECODING`, `VIOL_EVASION_BARE_BYTE_DECODING`, `VIOL_EVASION_BAD_UNESCAPE`, `VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST`, `VIOL_ENCODING`, `VIOL_COOKIE_MALFORMED`, `VIOL_GRAPHQL_FORMAT`, `VIOL_GRAPHQL_MALFORMED`, `VIOL_GRAPHQL_INTROSPECTION_QUERY`<br>[Enum: VIOL_NONE|VIOL_FILETYPE|VIOL_METHOD|VIOL_MANDATORY_HEADER|VIOL_HTTP_RESPONSE_STATUS|VIOL_REQUEST_MAX_LENGTH|VIOL_FILE_UPLOAD|VIOL_FILE_UPLOAD_IN_BODY|VIOL_XML_MALFORMED|VIOL_JSON_MALFORMED|VIOL_ASM_COOKIE_MODIFIED|VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS|VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE|VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT|VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST|VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION|VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS|VIOL_EVASION_DIRECTORY_TRAVERSALS|VIOL_MALFORMED_REQUEST|VIOL_EVASION_MULTIPLE_DECODING|VIOL_DATA_GUARD|VIOL_EVASION_APACHE_WHITESPACE|VIOL_COOKIE_MODIFIED|VIOL_EVASION_IIS_UNICODE_CODEPOINTS|VIOL_EVASION_IIS_BACKSLASHES|VIOL_EVASION_PERCENT_U_DECODING|VIOL_EVASION_BARE_BYTE_DECODING|VIOL_EVASION_BAD_UNESCAPE|VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST|VIOL_ENCODING|VIOL_COOKIE_MALFORMED|VIOL_GRAPHQL_FORMAT|VIOL_GRAPHQL_MALFORMED|VIOL_GRAPHQL_INTROSPECTION_QUERY] App Firewall Violation Type. List of all supported Violation Types VIOL_NONE VIOL_FILETYPE VIOL_METHOD VIOL_MANDATORY_HEADER VIOL_HTTP_RESPONSE_STATUS VIOL_REQUEST_MAX_LENGTH VIOL_FILE_UPLOAD VIOL_FILE_UPLOAD_IN_BODY VIOL_XML_MALFORMED VIOL_JSON_MALFORMED VIOL_ASM_COOKIE_MODIFIED VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION VIOL_HTTP_PROTOCOL_CRLF_CHARACTERS_BEFORE_REQUEST_START VIOL_HTTP_PROTOCOL_NO_HOST_HEADER_IN_HTTP_1_1_REQUEST VIOL_HTTP_PROTOCOL_BAD_MULTIPART_PARAMETERS_PARSING VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS VIOL_HTTP_PROTOCOL_CONTENT_LENGTH_SHOULD_BE_A_POSITIVE_NUMBER VIOL_EVASION_DIRECTORY_TRAVERSALS VIOL_MALFORMED_REQUEST VIOL_EVASION_MULTIPLE_DECODING VIOL_DATA_GUARD VIOL_EVASION_APACHE_WHITESPACE VIOL_COOKIE_MODIFIED VIOL_EVASION_IIS_UNICODE_CODEPOINTS VIOL_EVASION_IIS_BACKSLASHES VIOL_EVASION_PERCENT_U_DECODING VIOL_EVASION_BARE_BYTE_DECODING VIOL_EVASION_BAD_UNESCAPE VIOL_HTTP_PROTOCOL_BAD_MULTIPART_FORMDATA_REQUEST_PARSING VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST VIOL_HTTP_PROTOCOL_HIGH_ASCII_CHARACTERS_IN_HEADERS VIOL_ENCODING VIOL_COOKIE_MALFORMED VIOL_GRAPHQL_FORMAT VIOL_GRAPHQL_MALFORMED VIOL_GRAPHQL_INTROSPECTION_QUERY
|
|
670
|
+
<a id="deep-5122ed"></a>Deeply nested **Contexts** block collapsed for readability.
|
|
761
671
|
|
|
762
672
|
#### Server Name Matcher
|
|
763
673
|
|
|
@@ -785,6 +695,89 @@ A [`timeouts`](#timeouts) block supports the following:
|
|
|
785
695
|
|
|
786
696
|
<a id="timeouts-update"></a>• [`update`](#timeouts-update) - Optional String (Defaults to `10 minutes`)<br>Used when updating the resource
|
|
787
697
|
|
|
698
|
+
---
|
|
699
|
+
|
|
700
|
+
## Common Types
|
|
701
|
+
|
|
702
|
+
The following type definitions are used throughout this resource. See the full definition here rather than repeated inline.
|
|
703
|
+
|
|
704
|
+
### Object Reference {#common-object-reference}
|
|
705
|
+
|
|
706
|
+
Object references establish a direct reference from one configuration object to another in F5 Distributed Cloud. References use the format `tenant/namespace/name`.
|
|
707
|
+
|
|
708
|
+
| Field | Type | Description |
|
|
709
|
+
| ----- | ---- | ----------- |
|
|
710
|
+
| `name` | String | Name of the referenced object |
|
|
711
|
+
| `namespace` | String | Namespace containing the referenced object |
|
|
712
|
+
| `tenant` | String | Tenant of the referenced object (system-managed) |
|
|
713
|
+
|
|
714
|
+
### Transformers {#common-transformers}
|
|
715
|
+
|
|
716
|
+
Transformers apply transformations to input values before matching. Multiple transformers can be applied in order.
|
|
717
|
+
|
|
718
|
+
| Value | Description |
|
|
719
|
+
| ----- | ----------- |
|
|
720
|
+
| `LOWER_CASE` | Convert to lowercase |
|
|
721
|
+
| `UPPER_CASE` | Convert to uppercase |
|
|
722
|
+
| `BASE64_DECODE` | Decode base64 content |
|
|
723
|
+
| `NORMALIZE_PATH` | Normalize URL path |
|
|
724
|
+
| `REMOVE_WHITESPACE` | Remove whitespace characters |
|
|
725
|
+
| `URL_DECODE` | Decode URL-encoded characters |
|
|
726
|
+
| `TRIM_LEFT` | Trim leading whitespace |
|
|
727
|
+
| `TRIM_RIGHT` | Trim trailing whitespace |
|
|
728
|
+
| `TRIM` | Trim both leading and trailing whitespace |
|
|
729
|
+
|
|
730
|
+
### HTTP Methods {#common-http-methods}
|
|
731
|
+
|
|
732
|
+
HTTP methods used for request matching.
|
|
733
|
+
|
|
734
|
+
| Value | Description |
|
|
735
|
+
| ----- | ----------- |
|
|
736
|
+
| `ANY` | Match any HTTP method |
|
|
737
|
+
| `GET` | HTTP GET request |
|
|
738
|
+
| `HEAD` | HTTP HEAD request |
|
|
739
|
+
| `POST` | HTTP POST request |
|
|
740
|
+
| `PUT` | HTTP PUT request |
|
|
741
|
+
| `DELETE` | HTTP DELETE request |
|
|
742
|
+
| `CONNECT` | HTTP CONNECT request |
|
|
743
|
+
| `OPTIONS` | HTTP OPTIONS request |
|
|
744
|
+
| `TRACE` | HTTP TRACE request |
|
|
745
|
+
| `PATCH` | HTTP PATCH request |
|
|
746
|
+
| `COPY` | HTTP COPY request (WebDAV) |
|
|
747
|
+
|
|
748
|
+
### TLS Fingerprints {#common-tls-fingerprints}
|
|
749
|
+
|
|
750
|
+
TLS fingerprint categories for malicious client detection.
|
|
751
|
+
|
|
752
|
+
| Value | Description |
|
|
753
|
+
| ----- | ----------- |
|
|
754
|
+
| `TLS_FINGERPRINT_NONE` | No fingerprint matching |
|
|
755
|
+
| `ANY_MALICIOUS_FINGERPRINT` | Match any known malicious fingerprint |
|
|
756
|
+
| `ADWARE` | Adware-associated fingerprints |
|
|
757
|
+
| `DRIDEX` | Dridex malware fingerprints |
|
|
758
|
+
| `GOOTKIT` | Gootkit malware fingerprints |
|
|
759
|
+
| `RANSOMWARE` | Ransomware-associated fingerprints |
|
|
760
|
+
| `TRICKBOT` | Trickbot malware fingerprints |
|
|
761
|
+
|
|
762
|
+
### IP Threat Categories {#common-ip-threat-categories}
|
|
763
|
+
|
|
764
|
+
IP address threat categories for security filtering.
|
|
765
|
+
|
|
766
|
+
| Value | Description |
|
|
767
|
+
| ----- | ----------- |
|
|
768
|
+
| `SPAM_SOURCES` | Known spam sources |
|
|
769
|
+
| `WINDOWS_EXPLOITS` | Windows exploit sources |
|
|
770
|
+
| `WEB_ATTACKS` | Web attack sources |
|
|
771
|
+
| `BOTNETS` | Known botnet IPs |
|
|
772
|
+
| `SCANNERS` | Network scanner IPs |
|
|
773
|
+
| `REPUTATION` | Poor reputation IPs |
|
|
774
|
+
| `PHISHING` | Phishing-related IPs |
|
|
775
|
+
| `PROXY` | Anonymous proxy IPs |
|
|
776
|
+
| `MOBILE_THREATS` | Mobile threat sources |
|
|
777
|
+
| `TOR_PROXY` | Tor exit nodes |
|
|
778
|
+
| `DENIAL_OF_SERVICE` | DoS attack sources |
|
|
779
|
+
| `NETWORK` | Known bad network ranges |
|
|
780
|
+
|
|
788
781
|
## Import
|
|
789
782
|
|
|
790
783
|
Import is supported using the following syntax:
|