a10_waf_global
Synopsis
WAF global stats
Parameters
Parameters |
Choices/Defaults |
Comment |
|
---|---|---|---|
state str/required |
[‘noop’, ‘present’, ‘absent’] |
State of the object to be created. |
|
ansible_host str/required |
Host for AXAPI authentication |
||
ansible_username str/required |
Username for AXAPI authentication |
||
ansible_password str/required |
Password for AXAPI authentication |
||
ansible_port int/required |
Port for AXAPI authentication |
||
a10_device_context_id int |
[‘1-8’] |
Device ID for aVCS configuration |
|
a10_partition str |
Destination/target partition for object/command |
||
immediate_action bool |
Disable the violation aggregation, take action on first violation |
||
uuid str |
uuid of the object |
||
sampling_enable list |
Field sampling_enable |
||
counters1 str |
‘all’= all; ‘total_req’= Total Requests; ‘req_allowed’= Requests Allowed; ‘req_denied’= Requests Denied; ‘resp_denied’= Responses Denied; ‘brute_force_success’= Brute-Force checks passed; ‘brute_force_violation’= Brute-Force checks violation; ‘brute_force_challenge_cookie_sent’= Cookie Challenge Sent; ‘brute_force_challenge_cookie_success’= Cookie Challenge check passed; ‘brute_force_challenge_cookie_violation’= Cookie challenge violation; ‘brute_force_challenge_javascript_sent’= JavaScript challenge sent; ‘brute_force_challenge_javascript_success’= JavaScript challenge check passed; ‘brute_force_challenge_javascript_violation’= JavaScript challenge violation; ‘brute_force_challenge_captcha_sent’= Captcha challenge sent; ‘brute_force_challenge_captcha_success’= Captcha challenge check passed; ‘brute_force_challenge_captcha_violation’= Captcha challenge violation; ‘brute_force_lockout_limit_success’= Lockout limit check passed; ‘brute_force_lockout_limit_violation’= Lockout limit violation; ‘brute_force_challenge_limit_success’= Lockout limit check passed; ‘brute_force_challenge_limit_violation’= Lockout limit violation; ‘brute_force_response_codes_triggered’= Response Codes Triggered; ‘brute_force_response_headers_triggered’= Brute Force Response Headers Triggered; ‘brute_force_response_string_triggered’= Brute Force Response string Triggered; ‘cookie_security_encrypt_success’= Cookie Security - encrypt successful; ‘cookie_security_encrypt_violation’= Cookie Security - encrypt violation; ‘cookie_security_encrypt_limit_exceeded’= Cookie Security - encrypt limit exceeded; ‘cookie_security_encrypt_skip_rcache’= Cookie Security - encrypt skipped - RAM cache; ‘cookie_security_decrypt_success’= Cookie Security - decrypt successful; ‘cookie_security_decrypt_violation’= Cookie Security - decrypt violation; ‘cookie_security_sign_success’= Cookie Security - signing successful; ‘cookie_security_sign_violation’= Cookie Security - signing violation; ‘cookie_security_sign_limit_exceeded’= Cookie Security - signing limit exceeded; ‘cookie_security_sign_skip_rcache’= Cookie Security - signing skipped - RAM cache; ‘cookie_security_signature_check_success’= Cookie Security - signature check successful; ‘cookie_security_signature_check_violation’= Cookie Security - signature check failed; ‘cookie_security_add_http_only_success’= Cookie Security - http-only flag added successfully; ‘cookie_security_add_http_only_violation’= Cookie Security - http-only flag violation; ‘cookie_security_add_secure_success’= Cookie Security - secure flag added successfully; ‘cookie_security_add_secure_violation’= Cookie Security - secure flag violation; ‘cookie_security_missing_cookie_success’= Cookie Security - request with missing cookie; ‘cookie_security_missing_cookie_violation’= Cookie Security - missing cookie violation; ‘cookie_security_unrecognized_cookie_success’= Cookie Security - request with unrecognized cookie; ‘cookie_security_unrecognized_cookie_violation’= Cookie Security - unrecognized cookie violation; ‘cookie_security_cookie_policy_success’= Cookie Security - cookie policy passed; ‘cookie_security_cookie_policy_violation’= Cookie Security - cookie policy violation; ‘cookie_security_persistent_cookies’= Cookie Security - persistent cookies; ‘cookie_security_persistent_cookies_encrypted’= Cookie Security - encrypted persistent cookies; ‘cookie_security_persistent_cookies_signed’= Cookie Security - signed persistent cookies; ‘cookie_security_session_cookies’= Cookie Security - session cookies; ‘cookie_security_session_cookies_encrypted’= Cookie Security - encrypted session cookies; ‘cookie_security_session_cookies_signed’= Cookie Security - signed session cookies; ‘cookie_security_allowed_session_cookies’= Cookie Security - allowed session cookies; ‘cookie_security_allowed_persistent_cookies’= Cookie Security - allowed persistent cookies; ‘cookie_security_disallowed_session_cookies’= Cookie Security - disallowed session cookies; ‘cookie_security_disallowed_persistent_cookies’= Cookie Security - disallowed persistent cookies; ‘cookie_security_allowed_session_set_cookies’= Cookie Security - allowed session Set-Cookies; ‘cookie_security_allowed_persistent_set_cookies’= Cookie Security - allowed persistent Set-Cookies; ‘cookie_security_disallowed_session_set_cookies’= Cookie Security - disallowed session Set-Cookies; ‘cookie_security_disallowed_persistent_set_cookies’= Cookie Security - disallowed persistent Set-Cookies; ‘csp_header_violation’= CSP header_missing; ‘csp_header_success’= CSP header found; ‘csp_header_inserted’= CSP header Inserted; ‘form_csrf_tag_success’= Form CSRF tag passed; ‘form_csrf_tag_violation’= Form CSRF tag violation; ‘form_consistency_success’= Form Consistency passed; ‘form_consistency_violation’= Form Consistency violation; ‘form_tag_inserted’= Form A10 Tag Inserted; ‘form_non_ssl_success’= Form Non SSL check passed; ‘form_non_ssl_violation’= Form Non SSL violation; ‘form_request_non_post_success’= Form Method being Non Post in Request passed; ‘form_request_non_post_violation’= Form Method being Non Post in Request violation; ‘form_check_success’= Post Form Check passed; ‘form_check_violation’= Post Form Check violation; ‘form_check_sanitize’= Post Form Check Sanitized; ‘form_non_masked_password_success’= Form Non Masked Password check passed; ‘form_non_masked_password_violation’= Form Non Masked Password violation; ‘form_non_ssl_password_success’= Form Non SSL Password check passed; ‘form_non_ssl_password_violation’= Form Non SSL Password violation; ‘form_password_autocomplete_success’= Form Password Autocomplete check passed; ‘form_password_autocomplete_violation’= Form Password Autocomplete violation; ‘form_set_no_cache_success’= Form Set No Cache check passed; ‘form_set_no_cache’= Form Set No Cache violation; ‘dlp_ccn_success’= Credit Card Number check passed; ‘dlp_ccn_amex_violation’= Amex Credit Card Number Detected; ‘dlp_ccn_amex_masked’= Amex Credit Card Number Masked; ‘dlp_ccn_diners_violation’= Diners Club Credit Card Number Detected; ‘dlp_ccn_diners_masked’= Diners Club Credit Card Number Masked; ‘dlp_ccn_visa_violation’= Visa Credit Card Number Detected; ‘dlp_ccn_visa_masked’= Visa Credit Card Number Masked; ‘dlp_ccn_mastercard_violation’= MasterCard Credit Card Number Detected; ‘dlp_ccn_mastercard_masked’= MasterCard Credit Card Number Masked; ‘dlp_ccn_discover_violation’= Discover Credit Card Number Detected; ‘dlp_ccn_discover_masked’= Discover Credit Card Number Masked; ‘dlp_ccn_jcb_violation’= JCB Credit Card Number Detected; ‘dlp_ccn_jcb_masked’= JCB Credit Card Number Masked; ‘dlp_ssn_success’= Social Security Number Mask check passed; ‘dlp_ssn_violation’= Social Security Number Mask violation; ‘dlp_pcre_success’= PCRE Mask check passed; ‘dlp_pcre_violation’= PCRE Mask violation; ‘dlp_pcre_masked’= PCRE Mask violation; ‘evasion_check_apache_whitespace_success’= Apache Whitespace check passed; ‘evasion_check_apache_whitespace_violation’= Apache Whitespace check violation; ‘evasion_check_decode_entities_success’= Decode Entities check passed; ‘evasion_check_decode_entities_violation’= Decode Entities check violation; ‘evasion_check_decode_escaped_chars_success’= Decode Escaped Chars check passed; ‘evasion_check_decode_escaped_chars_violation’= Decode Escaped Chars check violation; ‘evasion_check_decode_unicode_chars_success’= Decode Unicode Chars check passed; ‘evasion_check_decode_unicode_chars_violation’= Decode Unicode Chars check violation; ‘evasion_check_dir_traversal_success’= Dir traversal check passed; ‘evasion_check_dir_traversal_violation’= Dir traversal check violation; |
||
counters2 str |
‘evasion_check_high_ascii_bytes_success’= High Ascii Bytes check passed; ‘evasion_check_high_ascii_bytes_violation’= High Ascii Bytes check violation; ‘evasion_check_invalid_hex_encoding_success’= Invalid Hex Encoding check passed; ‘evasion_check_invalid_hex_encoding_violation’= Invalid Hex Encoding check violation; ‘evasion_check_multiple_encoding_levels_success’= Multiple Encoding Levels check passed; ‘evasion_check_multiple_encoding_levels_violation’= Multiple Encoding Levels check violation; ‘evasion_check_multiple_slashes_success’= Multiple Slashes check passed; ‘evasion_check_multiple_slashes_violation’= Multiple Slashes check violation; ‘evasion_check_max_levels_success’= Max Levels check passed; ‘evasion_check_max_levels_violation’= Max Levels check violation; ‘evasion_check_remove_comments_success’= Remove Comments check passed; ‘evasion_check_remove_comments_violation’= Remove Comments check violation; ‘evasion_check_remove_spaces_success’= Remove Spaces check passed; ‘evasion_check_remove_spaces_violation’= Remove Spaces check violation; ‘http_limit_max_content_length_success’= MAX content-length check passed; ‘http_limit_max_content_length_violation’= MAX content-length check violation; ‘http_limit_max_cookie_header_length_success’= MAX cookie header length check passed; ‘http_limit_max_cookie_header_length_violation’= MAX cookie header length violation; ‘http_limit_max_cookie_name_length_success’= MAX cookie name length check passed; ‘http_limit_max_cookie_name_length_violation’= MAX cookie name length violation; ‘http_limit_max_cookie_value_length_success’= MAX cookie value length check passed; ‘http_limit_max_cookie_value_length_violation’= MAX cookie value length violation; ‘http_limit_max_cookies_success’= Max Cookies check passed; ‘http_limit_max_cookies_violation’= Max Cookies violation; ‘http_limit_max_cookies_length_success’= MAX cookies length check passed; ‘http_limit_max_cookies_length_violation’= MAX cookies length violation; ‘http_limit_max_data_parse_success’= Buffer Overflow - Max Data Parse check passed; ‘http_limit_max_data_parse_violation’= Buffer Overflow - Max Data Parse violation; ‘http_limit_max_entities_success’= Max Entities check passed; ‘http_limit_max_entities_violation’= Max Entities violation; ‘http_limit_max_header_length_success’= MAX header length check passed; ‘http_limit_max_header_length_violation’= MAX header length check violation; ‘http_limit_max_header_name_length_success’= MAX header name length check passed; ‘http_limit_max_header_name_length_violation’= MAX header name length check violation; ‘http_limit_max_header_value_length_success’= MAX header value length check passed; ‘http_limit_max_header_value_length_violation’= MAX header value length check violation; ‘http_limit_max_headers_success’= MAX headers count check passed; ‘http_limit_max_headers_violation’= Max Headers violation; ‘http_limit_max_headers_length_success’= MAX headers length check passed; ‘http_limit_max_headers_length_violation’= MAX headers length check violation; ‘http_limit_max_param_name_length_success’= Limit check - MAX parameter name length check passed; ‘http_limit_max_param_name_length_violation’= Limit check - MAX parameter name length violation; ‘http_limit_max_param_value_length_success’= Limit check - MAX parameter value length check passed; ‘http_limit_max_param_value_length_violation’= Limit check - MAX parameter value length violation; ‘http_limit_max_params_success’= Limit check - MAX parameters check passed; ‘http_limit_max_params_violation’= Limit check - MAX parameters violation; ‘http_limit_max_params_length_success’= Limit check - MAX parameters total length check passed; ‘http_limit_max_params_length_violation’= Limit check - MAX parameters total length violation; ‘http_limit_max_post_length_success’= MAX POST length check passed; ‘http_limit_max_post_length_violation’= MAX POST length violation; ‘http_limit_max_query_length_success’= Limit check - MAX query length check passed; ‘http_limit_max_query_length_violation’= Limit check - MAX query length violation; ‘http_limit_max_request_length_success’= Limit check - MAX request length check passed; ‘http_limit_max_request_length_violation’= Limit check - MAX request length violation; ‘http_limit_max_request_line_length_success’= Limit check - MAX request line length check passed; ‘http_limit_max_request_line_length_violation’= Limit check - MAX request line length violation; ‘max_url_length_success’= Limit check - MAX URL length check passed; ‘max_url_length_violation’= Limit check - MAX URL length violation; ‘http_protocol_allowed_headers_success’= HTTP headers check passed; ‘http_protocol_allowed_headers_violation’= HTTP headers check violation; ‘http_protocol_allowed_versions_success’= HTTP versions check passed; ‘http_protocol_allowed_versions_violation’= HTTP versions check violation; ‘http_protocol_allowed_method_check_success’= HTTP Method Check passed; ‘http_protocol_allowed_method_check_violation’= HTTP Method Check violation; ‘http_protocol_bad_multipart_request_success’= Bad multi-part request check passed; ‘http_protocol_bad_multipart_request_violation’= Bad multi-part request check violation; ‘http_protocol_get_with_content_success’= GET with content check passed; ‘http_protocol_get_with_content_violation’= GET with content check violation; ‘http_protocol_head_with_content_success’= HEAD with content check passed; ‘http_protocol_head_with_content_violation’= HEAD with content check violation; ‘http_protocol_host_header_with_ip_success’= Host header with IP check passed; ‘http_protocol_host_header_with_ip_violation’= Host header with IP check violation; ‘http_protocol_invalid_url_encoding_success’= Invalid url encoding check passed; ‘http_protocol_invalid_url_encoding_violation’= Invalid url encoding check violation; ‘http_protocol_malformed_content_length_success’= Malformed content-length check passed; ‘http_protocol_malformed_content_length_violation’= Malformed content-length check violation; ‘http_protocol_malformed_header_success’= Malformed header check passed; ‘http_protocol_malformed_header_violation’= Malformed header check passed; ‘http_protocol_malformed_parameter_success’= Malformed parameter check passed; ‘http_protocol_malformed_parameter_violation’= Malformed parameter check violation; ‘http_protocol_malformed_request_success’= Malformed request check passed; ‘http_protocol_malformed_request_violation’= Malformed request check violation; ‘http_protocol_malformed_request_line_success’= Malformed request line check passed; ‘http_protocol_malformed_request_line_violation’= Malformed request line check violation; ‘http_protocol_missing_header_value_success’= Missing header value check violation; ‘http_protocol_missing_header_value_violation’= Missing header value check violation; ‘http_protocol_missing_host_header_success’= Missing host header check passed; ‘http_protocol_missing_host_header_violation’= Missing host header check violation; ‘http_protocol_multiple_content_length_success’= Multiple content-length headers check passed; ‘http_protocol_multiple_content_length_violation’= Multiple content-length headers check violation; ‘http_protocol_post_with_0_content_success’= POST with 0 content check passed; ‘http_protocol_post_with_0_content_violation’= POST with 0 content check violation; ‘http_protocol_post_without_content_success’= POST without content check passed; ‘http_protocol_post_without_content_violation’= POST without content check violation; ‘http_protocol_success’= HTTP Check passed; ‘http_protocol_violation’= HTTP Check violation; ‘json_check_format_success’= JSON Check passed; |
||
counters3 str |
‘json_check_format_violation’= JSON Check violation; ‘json_check_max_array_value_count_success’= JSON Limit Array Value Count check passed; ‘json_check_max_array_value_count_violation’= JSON Limit Array Value Count violation; ‘json_check_max_depth_success’= JSON Limit Depth check passed; ‘json_check_max_depth_violation’= JSON Limit Depth violation; ‘json_check_max_object_member_count_success’= JSON Limit Object Number Count check passed; ‘json_check_max_object_member_count_violation’= JSON Limit Object Number Count violation; ‘json_check_max_string_success’= JSON Limit String check passed; ‘json_check_max_string_violation’= JSON Limit String violation; ‘request_check_bot_success’= Bot check passed; ‘request_check_bot_violation’= Bot check violation; ‘request_check_redirect_wlist_success’= Redirect Whitelist passed; ‘request_check_redirect_wlist_violation’= Redirect Whitelist violation; ‘request_check_redirect_wlist_learn’= Redirect Whitelist Learn; ‘request_check_referer_success’= Referer Check passed; ‘request_check_referer_violation’= Referer Check violation; ‘request_check_referer_redirect’= Referer Check Redirect; ‘request_check_session_check_none’= Session Created; ‘request_check_session_check_success’= Session Check passed; ‘request_check_session_check_violation’= Session Check violation; ‘request_check_sqlia_url_success’= SQLIA Check URL passed; ‘request_check_sqlia_url_violation’= SQLIA Check URL violation; ‘request_check_sqlia_url_sanitize’= SQLIA Check URL Sanitized; ‘request_check_sqlia_post_body_success’= SQLIA Check Post passed; ‘request_check_sqlia_post_body_violation’= SQLIA Check Post violation; ‘request_check_sqlia_post_body_sanitize’= SQLIA Check Post Sanitized; ‘request_check_url_list_success’= URL Check passed; ‘request_check_url_list_violation’= URL Check violation; ‘request_check_url_list_learn’= URL Check Learn; ‘request_check_url_whitelist_success’= URI White List passed; ‘request_check_url_whitelist_violation’= URI White List violation; ‘request_check_url_blacklist_success’= URI Black List passed; ‘request_check_url_blacklist_violation’= URI Black List violation; ‘request_check_xss_cookie_success’= XSS Check Cookie passed; ‘request_check_xss_cookie_violation’= XSS Check Cookie violation; ‘request_check_xss_cookie_sanitize’= XSS Check Cookie Sanitized; ‘request_check_xss_url_success’= XSS Check URL passed; ‘request_check_xss_url_violation’= XSS Check URL violation; ‘request_check_xss_url_sanitize’= XSS Check URL Sanitized; ‘request_check_xss_post_body_success’= XSS Check Post passed; ‘request_check_xss_post_body_violation’= XSS Check Post violation; ‘request_check_xss_post_body_sanitize’= XSS Check Post Sanitized; ‘response_cloaking_hide_status_code_success’= Response Hide Code check passed; ‘response_cloaking_hide_status_code_violation’= Response Hide Code violation; ‘response_cloaking_filter_headers_success’= Response Headers Filter check passed; ‘response_cloaking_filter_headers_violation’= Response Headers Filter violation; ‘soap_check_success’= Soap Check passed; ‘soap_check_violation’= Soap Check violation; ‘xml_check_format_success’= XML Check passed; ‘xml_check_format_violation’= XML Check violation; ‘xml_check_max_attr_success’= XML Limit Attribute check passed; ‘xml_check_max_attr_violation’= XML Limit Attribute violation; ‘xml_check_max_attr_name_len_success’= XML Limit Name Length check passed; ‘xml_check_max_attr_name_len_violation’= XML Limit Name Length violation; ‘xml_check_max_attr_value_len_success’= XML Limit Value Length check passed; ‘xml_check_max_attr_value_len_violation’= XML Limit Value Length violation; ‘xml_check_max_cdata_len_success’= XML Limit CData Length check passed; ‘xml_check_max_cdata_len_violation’= XML Limit CData Length violation; ‘xml_check_max_elem_success’= XML Limit Element check passed; ‘xml_check_max_elem_violation’= XML Limit Element violation; ‘xml_check_max_elem_child_success’= XML Limit Element Child check passed; ‘xml_check_max_elem_child_violation’= XML Limit Element Child violation; ‘xml_check_max_elem_depth_success’= XML Limit Element Depth check passed; ‘xml_check_max_elem_depth_violation’= XML Limit Element Depth violation; ‘xml_check_max_elem_name_len_success’= XML Limit Element Name Length check passed; ‘xml_check_max_elem_name_len_violation’= XML Limit Element Name Length violation; ‘xml_check_max_entity_exp_success’= XML Limit Entity Expansions check passed; ‘xml_check_max_entity_exp_violation’= XML Limit Entity Expansions violation; ‘xml_check_max_entity_exp_depth_success’= XML Limit Entities Depth check passed; ‘xml_check_max_entity_exp_depth_violation’= XML Limit Entities Depth violation; ‘xml_check_max_namespace_success’= XML Limit Namespace check passed; ‘xml_check_max_namespace_violation’= XML Limit Namespace violation; ‘xml_check_namespace_uri_len_success’= XML Limit Namespace URI Length check passed; ‘xml_check_namespace_uri_len_violation’= XML Limit Namespace URI Length violation; ‘xml_check_sqlia_success’= XML Sqlia Check passed; ‘xml_check_sqlia_violation’= XML Sqlia Check violation; ‘xml_check_xss_success’= XML XSS Check passed; ‘xml_check_xss_violation’= XML XSS Check violation; ‘xml_content_check_schema_success’= XML Schema passed; ‘xml_content_check_schema_violation’= XML Schema violation; ‘xml_content_check_wsdl_success’= WSDL passed; ‘xml_content_check_wsdl_violation’= WSDL violation; ‘learning_list_full’= Learning list is full; ‘action_allow’= Request Action allowed; ‘action_deny_200’= Request Deny with 200; ‘action_deny_403’= Request Deny with 403; ‘action_deny_redirect’= Request Deny with Redirect; ‘action_deny_reset’= Request Deny with Resets; ‘action_drop’= Number of Dropped Requests; ‘action_deny_custom_response’= Request Deny with custom response; ‘action_learn’= Request Learning Updates; ‘action_log’= Log request violation; ‘policy_limit_exceeded’= Policy limit exceeded; ‘sessions_alloc’= Sessions allocated; ‘sessions_freed’= Sessions freed; ‘out_of_sessions’= Out of sessions; ‘too_many_sessions’= Too many sessions consumed; ‘regex_violation’= Regular expression failure; ‘request_check_command_injection_cookies_success’= Command Injection Check cookies passed; ‘request_check_command_injection_cookies_violation’= Command Injection Check cookies violation; ‘request_check_command_injection_headers_success’= Command Injection Check headers passed; ‘request_check_command_injection_headers_violation’= Command Injection Check headers violation; ‘request_check_command_injection_uri_query_success’= Command Injection Check url query arguments passed; ‘request_check_command_injection_uri_query_violation’= Command Injection Check url query arguments violation; ‘request_check_command_injection_form_body_success’= Command Injection Check form body arguments passed; ‘request_check_command_injection_form_body_violation’= Command Injection Check form body arguments violation; ‘cookie_security_decrypt_in_grace_period_violation’= Cookie Decrypt violation but in grace period; ‘form_response_non_post_success’= Response form method was POST; ‘form_response_non_post_violation’= Response form method was not POST; ‘form_response_non_post_sanitize’= Changed response form method to POST; ‘xml_check_max_entity_decl_success’= XML Limit Entity Decl check passed; ‘xml_check_max_entity_decl_violation’= XML Limit Entity Decl violation; ‘xml_check_max_entity_depth_success’= XML Limit Entity Depth check passed; ‘xml_check_max_entity_depth_violation’= XML Limit Entity Depth violation; ‘action_response_allow’= Response Action allowed; ‘action_response_deny_200’= Response Deny with 200; |
||
counters4 str |
‘action_response_deny_403’= Response Deny with 403; ‘action_response_deny_redirect’= Response Deny with Redirect; ‘action_response_deny_reset’= Deny with Resets; ‘action_response_drop’= Number of Dropped Responses; ‘action_response_deny_custom_response’= Response Deny with custom response; ‘action_response_learn’= Response Learning Updates; ‘action_response_log’= Log response violation; ‘http_protocol_post_without_content_type_success’= POST without content type check passed; ‘http_protocol_post_without_content_type_violation’= POST without content type check violation; ‘http_protocol_body_without_content_type_success’= Body without content type check passed; ‘http_protocol_body_without_content_type_violation’= Body without content type check violation; ‘http_protocol_non_ssl_cookie_prefix_success’= Cookie Name Prefix check passed; ‘http_protocol_non_ssl_cookie_prefix_violation’= Cookie Name Prefix check violation; ‘cookie_security_add_samesite_success’= Cookie Security - samesite attribute added successfully; ‘cookie_security_add_samesite_violation’= Cookie Security - samesite attribute violation; ‘rule_set_request’= Requests hanlded by WAF rule set; ‘rule_set_response’= Responses hanlded by WAF rule set; ‘phase1_pass’= WAF rule set pass hits in phase 1; ‘phase1_allow’= WAF rule set allow hits in phase 1; ‘phase1_deny’= WAF rule set deny hits in phase 1; ‘phase1_drop’= WAF rule set drop hits in phase 1; ‘phase1_redirect’= WAF rule set redirect hits in phase 1; ‘phase1_other’= WAF rule set other hits in phase 1; ‘phase2_pass’= WAF rule set pass hits in phase 2; ‘phase2_allow’= WAF rule set allow hits in phase 2; ‘phase2_deny’= WAF rule set deny hits in phase 2; ‘phase2_drop’= WAF rule set drop hits in phase 2; ‘phase2_redirect’= WAF rule set redirect hits in phase 2; ‘phase2_other’= WAF rule set other hits in phase 2; ‘phase3_pass’= WAF rule set pass hits in phase 3; ‘phase3_allow’= WAF rule set allow hits in phase 3; ‘phase3_deny’= WAF rule set deny hits in phase 3; ‘phase3_drop’= WAF rule set drop hits in phase 3; ‘phase3_redirect’= WAF rule set redirect hits in phase 3; ‘phase3_other’= WAF rule set other hits in phase 3; ‘phase4_pass’= WAF rule set pass hits in phase 4; ‘phase4_allow’= WAF rule set allow hits in phase 4; ‘phase4_deny’= WAF rule set deny hits in phase 4; ‘phase4_drop’= WAF rule set drop hits in phase 4; ‘phase4_redirect’= WAF rule set redirect hits in phase 4; ‘phase4_other’= WAF rule set other hits in phase 4; |
||
stats dict |
Field stats |
||
total_req str |
Total Requests |
||
req_allowed str |
Requests Allowed |
||
req_denied str |
Requests Denied |
||
resp_denied str |
Responses Denied |
||
brute_force_success str |
Brute-Force checks passed |
||
brute_force_violation str |
Brute-Force checks violation |
||
brute_force_challenge_cookie_sent str |
Cookie Challenge Sent |
||
brute_force_challenge_cookie_success str |
Cookie Challenge check passed |
||
brute_force_challenge_cookie_violation str |
Cookie challenge violation |
||
brute_force_challenge_javascript_sent str |
JavaScript challenge sent |
||
brute_force_challenge_javascript_success str |
JavaScript challenge check passed |
||
brute_force_challenge_javascript_violation str |
JavaScript challenge violation |
||
brute_force_challenge_captcha_sent str |
Captcha challenge sent |
||
brute_force_challenge_captcha_success str |
Captcha challenge check passed |
||
brute_force_challenge_captcha_violation str |
Captcha challenge violation |
||
brute_force_lockout_limit_success str |
Lockout limit check passed |
||
brute_force_lockout_limit_violation str |
Lockout limit violation |
||
brute_force_challenge_limit_success str |
Lockout limit check passed |
||
brute_force_challenge_limit_violation str |
Lockout limit violation |
||
brute_force_response_codes_triggered str |
Response Codes Triggered |
||
brute_force_response_headers_triggered str |
Brute Force Response Headers Triggered |
||
brute_force_response_string_triggered str |
Brute Force Response string Triggered |
||
cookie_security_encrypt_success str |
Cookie Security - encrypt successful |
||
cookie_security_encrypt_violation str |
Cookie Security - encrypt violation |
||
cookie_security_encrypt_limit_exceeded str |
Cookie Security - encrypt limit exceeded |
||
cookie_security_encrypt_skip_rcache str |
Cookie Security - encrypt skipped - RAM cache |
||
cookie_security_decrypt_success str |
Cookie Security - decrypt successful |
||
cookie_security_decrypt_violation str |
Cookie Security - decrypt violation |
||
cookie_security_sign_success str |
Cookie Security - signing successful |
||
cookie_security_sign_violation str |
Cookie Security - signing violation |
||
cookie_security_sign_limit_exceeded str |
Cookie Security - signing limit exceeded |
||
cookie_security_sign_skip_rcache str |
Cookie Security - signing skipped - RAM cache |
||
cookie_security_signature_check_success str |
Cookie Security - signature check successful |
||
cookie_security_signature_check_violation str |
Cookie Security - signature check failed |
||
cookie_security_add_http_only_success str |
Cookie Security - http-only flag added successfully |
||
cookie_security_add_http_only_violation str |
Cookie Security - http-only flag violation |
||
cookie_security_add_secure_success str |
Cookie Security - secure flag added successfully |
||
cookie_security_add_secure_violation str |
Cookie Security - secure flag violation |
||
cookie_security_missing_cookie_success str |
Cookie Security - request with missing cookie |
||
cookie_security_missing_cookie_violation str |
Cookie Security - missing cookie violation |
||
cookie_security_unrecognized_cookie_success str |
Cookie Security - request with unrecognized cookie |
||
cookie_security_unrecognized_cookie_violation str |
Cookie Security - unrecognized cookie violation |
||
cookie_security_cookie_policy_success str |
Cookie Security - cookie policy passed |
||
cookie_security_cookie_policy_violation str |
Cookie Security - cookie policy violation |
||
cookie_security_persistent_cookies str |
Cookie Security - persistent cookies |
||
cookie_security_persistent_cookies_encrypted str |
Cookie Security - encrypted persistent cookies |
||
cookie_security_persistent_cookies_signed str |
Cookie Security - signed persistent cookies |
||
cookie_security_session_cookies str |
Cookie Security - session cookies |
||
cookie_security_session_cookies_encrypted str |
Cookie Security - encrypted session cookies |
||
cookie_security_session_cookies_signed str |
Cookie Security - signed session cookies |
||
cookie_security_allowed_session_cookies str |
Cookie Security - allowed session cookies |
||
cookie_security_allowed_persistent_cookies str |
Cookie Security - allowed persistent cookies |
||
cookie_security_disallowed_session_cookies str |
Cookie Security - disallowed session cookies |
||
cookie_security_disallowed_persistent_cookies str |
Cookie Security - disallowed persistent cookies |
||
cookie_security_allowed_session_set_cookies str |
Cookie Security - allowed session Set-Cookies |
||
cookie_security_allowed_persistent_set_cookies str |
Cookie Security - allowed persistent Set-Cookies |
||
cookie_security_disallowed_session_set_cookies str |
Cookie Security - disallowed session Set-Cookies |
||
cookie_security_disallowed_persistent_set_cookies str |
Cookie Security - disallowed persistent Set-Cookies |
||
csp_header_violation str |
CSP header_missing |
||
csp_header_success str |
CSP header found |
||
csp_header_inserted str |
CSP header Inserted |
||
form_csrf_tag_success str |
Form CSRF tag passed |
||
form_csrf_tag_violation str |
Form CSRF tag violation |
||
form_consistency_success str |
Form Consistency passed |
||
form_consistency_violation str |
Form Consistency violation |
||
form_tag_inserted str |
Form A10 Tag Inserted |
||
form_non_ssl_success str |
Form Non SSL check passed |
||
form_non_ssl_violation str |
Form Non SSL violation |
||
form_request_non_post_success str |
Form Method being Non Post in Request passed |
||
form_request_non_post_violation str |
Form Method being Non Post in Request violation |
||
form_check_success str |
Post Form Check passed |
||
form_check_violation str |
Post Form Check violation |
||
form_check_sanitize str |
Post Form Check Sanitized |
||
form_non_masked_password_success str |
Form Non Masked Password check passed |
||
form_non_masked_password_violation str |
Form Non Masked Password violation |
||
form_non_ssl_password_success str |
Form Non SSL Password check passed |
||
form_non_ssl_password_violation str |
Form Non SSL Password violation |
||
form_password_autocomplete_success str |
Form Password Autocomplete check passed |
||
form_password_autocomplete_violation str |
Form Password Autocomplete violation |
||
form_set_no_cache_success str |
Form Set No Cache check passed |
||
form_set_no_cache str |
Form Set No Cache violation |
||
dlp_ccn_success str |
Credit Card Number check passed |
||
dlp_ccn_amex_violation str |
Amex Credit Card Number Detected |
||
dlp_ccn_amex_masked str |
Amex Credit Card Number Masked |
||
dlp_ccn_diners_violation str |
Diners Club Credit Card Number Detected |
||
dlp_ccn_diners_masked str |
Diners Club Credit Card Number Masked |
||
dlp_ccn_visa_violation str |
Visa Credit Card Number Detected |
||
dlp_ccn_visa_masked str |
Visa Credit Card Number Masked |
||
dlp_ccn_mastercard_violation str |
MasterCard Credit Card Number Detected |
||
dlp_ccn_mastercard_masked str |
MasterCard Credit Card Number Masked |
||
dlp_ccn_discover_violation str |
Discover Credit Card Number Detected |
||
dlp_ccn_discover_masked str |
Discover Credit Card Number Masked |
||
dlp_ccn_jcb_violation str |
JCB Credit Card Number Detected |
||
dlp_ccn_jcb_masked str |
JCB Credit Card Number Masked |
||
dlp_ssn_success str |
Social Security Number Mask check passed |
||
dlp_ssn_violation str |
Social Security Number Mask violation |
||
dlp_pcre_success str |
PCRE Mask check passed |
||
dlp_pcre_violation str |
PCRE Mask violation |
||
dlp_pcre_masked str |
PCRE Mask violation |
||
evasion_check_apache_whitespace_success str |
Apache Whitespace check passed |
||
evasion_check_apache_whitespace_violation str |
Apache Whitespace check violation |
||
evasion_check_decode_entities_success str |
Decode Entities check passed |
||
evasion_check_decode_entities_violation str |
Decode Entities check violation |
||
evasion_check_decode_escaped_chars_success str |
Decode Escaped Chars check passed |
||
evasion_check_decode_escaped_chars_violation str |
Decode Escaped Chars check violation |
||
evasion_check_decode_unicode_chars_success str |
Decode Unicode Chars check passed |
||
evasion_check_decode_unicode_chars_violation str |
Decode Unicode Chars check violation |
||
evasion_check_dir_traversal_success str |
Dir traversal check passed |
||
evasion_check_dir_traversal_violation str |
Dir traversal check violation |
||
evasion_check_high_ascii_bytes_success str |
High Ascii Bytes check passed |
||
evasion_check_high_ascii_bytes_violation str |
High Ascii Bytes check violation |
||
evasion_check_invalid_hex_encoding_success str |
Invalid Hex Encoding check passed |
||
evasion_check_invalid_hex_encoding_violation str |
Invalid Hex Encoding check violation |
||
evasion_check_multiple_encoding_levels_success str |
Multiple Encoding Levels check passed |
||
evasion_check_multiple_encoding_levels_violation str |
Multiple Encoding Levels check violation |
||
evasion_check_multiple_slashes_success str |
Multiple Slashes check passed |
||
evasion_check_multiple_slashes_violation str |
Multiple Slashes check violation |
||
evasion_check_max_levels_success str |
Max Levels check passed |
||
evasion_check_max_levels_violation str |
Max Levels check violation |
||
evasion_check_remove_comments_success str |
Remove Comments check passed |
||
evasion_check_remove_comments_violation str |
Remove Comments check violation |
||
evasion_check_remove_spaces_success str |
Remove Spaces check passed |
||
evasion_check_remove_spaces_violation str |
Remove Spaces check violation |
||
http_limit_max_content_length_success str |
MAX content-length check passed |
||
http_limit_max_content_length_violation str |
MAX content-length check violation |
||
http_limit_max_cookie_header_length_success str |
MAX cookie header length check passed |
||
http_limit_max_cookie_header_length_violation str |
MAX cookie header length violation |
||
http_limit_max_cookie_name_length_success str |
MAX cookie name length check passed |
||
http_limit_max_cookie_name_length_violation str |
MAX cookie name length violation |
||
http_limit_max_cookie_value_length_success str |
MAX cookie value length check passed |
||
http_limit_max_cookie_value_length_violation str |
MAX cookie value length violation |
||
http_limit_max_cookies_success str |
Max Cookies check passed |
||
http_limit_max_cookies_violation str |
Max Cookies violation |
||
http_limit_max_cookies_length_success str |
MAX cookies length check passed |
||
http_limit_max_cookies_length_violation str |
MAX cookies length violation |
||
http_limit_max_data_parse_success str |
Buffer Overflow - Max Data Parse check passed |
||
http_limit_max_data_parse_violation str |
Buffer Overflow - Max Data Parse violation |
||
http_limit_max_entities_success str |
Max Entities check passed |
||
http_limit_max_entities_violation str |
Max Entities violation |
||
http_limit_max_header_length_success str |
MAX header length check passed |
||
http_limit_max_header_length_violation str |
MAX header length check violation |
||
http_limit_max_header_name_length_success str |
MAX header name length check passed |
||
http_limit_max_header_name_length_violation str |
MAX header name length check violation |
||
http_limit_max_header_value_length_success str |
MAX header value length check passed |
||
http_limit_max_header_value_length_violation str |
MAX header value length check violation |
||
http_limit_max_headers_success str |
MAX headers count check passed |
||
http_limit_max_headers_violation str |
Max Headers violation |
||
http_limit_max_headers_length_success str |
MAX headers length check passed |
||
http_limit_max_headers_length_violation str |
MAX headers length check violation |
||
http_limit_max_param_name_length_success str |
Limit check - MAX parameter name length check passed |
||
http_limit_max_param_name_length_violation str |
Limit check - MAX parameter name length violation |
||
http_limit_max_param_value_length_success str |
Limit check - MAX parameter value length check passed |
||
http_limit_max_param_value_length_violation str |
Limit check - MAX parameter value length violation |
||
http_limit_max_params_success str |
Limit check - MAX parameters check passed |
||
http_limit_max_params_violation str |
Limit check - MAX parameters violation |
||
http_limit_max_params_length_success str |
Limit check - MAX parameters total length check passed |
||
http_limit_max_params_length_violation str |
Limit check - MAX parameters total length violation |
||
http_limit_max_post_length_success str |
MAX POST length check passed |
||
http_limit_max_post_length_violation str |
MAX POST length violation |
||
http_limit_max_query_length_success str |
Limit check - MAX query length check passed |
||
http_limit_max_query_length_violation str |
Limit check - MAX query length violation |
||
http_limit_max_request_length_success str |
Limit check - MAX request length check passed |
||
http_limit_max_request_length_violation str |
Limit check - MAX request length violation |
||
http_limit_max_request_line_length_success str |
Limit check - MAX request line length check passed |
||
http_limit_max_request_line_length_violation str |
Limit check - MAX request line length violation |
||
max_url_length_success str |
Limit check - MAX URL length check passed |
||
max_url_length_violation str |
Limit check - MAX URL length violation |
||
http_protocol_allowed_headers_success str |
HTTP headers check passed |
||
http_protocol_allowed_headers_violation str |
HTTP headers check violation |
||
http_protocol_allowed_versions_success str |
HTTP versions check passed |
||
http_protocol_allowed_versions_violation str |
HTTP versions check violation |
||
http_protocol_allowed_method_check_success str |
HTTP Method Check passed |
||
http_protocol_allowed_method_check_violation str |
HTTP Method Check violation |
||
http_protocol_bad_multipart_request_success str |
Bad multi-part request check passed |
||
http_protocol_bad_multipart_request_violation str |
Bad multi-part request check violation |
||
http_protocol_get_with_content_success str |
GET with content check passed |
||
http_protocol_get_with_content_violation str |
GET with content check violation |
||
http_protocol_head_with_content_success str |
HEAD with content check passed |
||
http_protocol_head_with_content_violation str |
HEAD with content check violation |
||
http_protocol_host_header_with_ip_success str |
Host header with IP check passed |
||
http_protocol_host_header_with_ip_violation str |
Host header with IP check violation |
||
http_protocol_invalid_url_encoding_success str |
Invalid url encoding check passed |
||
http_protocol_invalid_url_encoding_violation str |
Invalid url encoding check violation |
||
http_protocol_malformed_content_length_success str |
Malformed content-length check passed |
||
http_protocol_malformed_content_length_violation str |
Malformed content-length check violation |
||
http_protocol_malformed_header_success str |
Malformed header check passed |
||
http_protocol_malformed_header_violation str |
Malformed header check passed |
||
http_protocol_malformed_parameter_success str |
Malformed parameter check passed |
||
http_protocol_malformed_parameter_violation str |
Malformed parameter check violation |
||
http_protocol_malformed_request_success str |
Malformed request check passed |
||
http_protocol_malformed_request_violation str |
Malformed request check violation |
||
http_protocol_malformed_request_line_success str |
Malformed request line check passed |
||
http_protocol_malformed_request_line_violation str |
Malformed request line check violation |
||
http_protocol_missing_header_value_success str |
Missing header value check violation |
||
http_protocol_missing_header_value_violation str |
Missing header value check violation |
||
http_protocol_missing_host_header_success str |
Missing host header check passed |
||
http_protocol_missing_host_header_violation str |
Missing host header check violation |
||
http_protocol_multiple_content_length_success str |
Multiple content-length headers check passed |
||
http_protocol_multiple_content_length_violation str |
Multiple content-length headers check violation |
||
http_protocol_post_with_0_content_success str |
POST with 0 content check passed |
||
http_protocol_post_with_0_content_violation str |
POST with 0 content check violation |
||
http_protocol_post_without_content_success str |
POST without content check passed |
||
http_protocol_post_without_content_violation str |
POST without content check violation |
||
http_protocol_success str |
HTTP Check passed |
||
http_protocol_violation str |
HTTP Check violation |
||
json_check_format_success str |
JSON Check passed |
||
json_check_format_violation str |
JSON Check violation |
||
json_check_max_array_value_count_success str |
JSON Limit Array Value Count check passed |
||
json_check_max_array_value_count_violation str |
JSON Limit Array Value Count violation |
||
json_check_max_depth_success str |
JSON Limit Depth check passed |
||
json_check_max_depth_violation str |
JSON Limit Depth violation |
||
json_check_max_object_member_count_success str |
JSON Limit Object Number Count check passed |
||
json_check_max_object_member_count_violation str |
JSON Limit Object Number Count violation |
||
json_check_max_string_success str |
JSON Limit String check passed |
||
json_check_max_string_violation str |
JSON Limit String violation |
||
request_check_bot_success str |
Bot check passed |
||
request_check_bot_violation str |
Bot check violation |
||
request_check_redirect_wlist_success str |
Redirect Whitelist passed |
||
request_check_redirect_wlist_violation str |
Redirect Whitelist violation |
||
request_check_redirect_wlist_learn str |
Redirect Whitelist Learn |
||
request_check_referer_success str |
Referer Check passed |
||
request_check_referer_violation str |
Referer Check violation |
||
request_check_referer_redirect str |
Referer Check Redirect |
||
request_check_session_check_none str |
Session Created |
||
request_check_session_check_success str |
Session Check passed |
||
request_check_session_check_violation str |
Session Check violation |
||
request_check_sqlia_url_success str |
SQLIA Check URL passed |
||
request_check_sqlia_url_violation str |
SQLIA Check URL violation |
||
request_check_sqlia_url_sanitize str |
SQLIA Check URL Sanitized |
||
request_check_sqlia_post_body_success str |
SQLIA Check Post passed |
||
request_check_sqlia_post_body_violation str |
SQLIA Check Post violation |
||
request_check_sqlia_post_body_sanitize str |
SQLIA Check Post Sanitized |
||
request_check_url_list_success str |
URL Check passed |
||
request_check_url_list_violation str |
URL Check violation |
||
request_check_url_list_learn str |
URL Check Learn |
||
request_check_url_whitelist_success str |
URI White List passed |
||
request_check_url_whitelist_violation str |
URI White List violation |
||
request_check_url_blacklist_success str |
URI Black List passed |
||
request_check_url_blacklist_violation str |
URI Black List violation |
||
request_check_xss_cookie_success str |
XSS Check Cookie passed |
||
request_check_xss_cookie_violation str |
XSS Check Cookie violation |
||
request_check_xss_cookie_sanitize str |
XSS Check Cookie Sanitized |
||
request_check_xss_url_success str |
XSS Check URL passed |
||
request_check_xss_url_violation str |
XSS Check URL violation |
||
request_check_xss_url_sanitize str |
XSS Check URL Sanitized |
||
request_check_xss_post_body_success str |
XSS Check Post passed |
||
request_check_xss_post_body_violation str |
XSS Check Post violation |
||
request_check_xss_post_body_sanitize str |
XSS Check Post Sanitized |
||
response_cloaking_hide_status_code_success str |
Response Hide Code check passed |
||
response_cloaking_hide_status_code_violation str |
Response Hide Code violation |
||
response_cloaking_filter_headers_success str |
Response Headers Filter check passed |
||
response_cloaking_filter_headers_violation str |
Response Headers Filter violation |
||
soap_check_success str |
Soap Check passed |
||
soap_check_violation str |
Soap Check violation |
||
xml_check_format_success str |
XML Check passed |
||
xml_check_format_violation str |
XML Check violation |
||
xml_check_max_attr_success str |
XML Limit Attribute check passed |
||
xml_check_max_attr_violation str |
XML Limit Attribute violation |
||
xml_check_max_attr_name_len_success str |
XML Limit Name Length check passed |
||
xml_check_max_attr_name_len_violation str |
XML Limit Name Length violation |
||
xml_check_max_attr_value_len_success str |
XML Limit Value Length check passed |
||
xml_check_max_attr_value_len_violation str |
XML Limit Value Length violation |
||
xml_check_max_cdata_len_success str |
XML Limit CData Length check passed |
||
xml_check_max_cdata_len_violation str |
XML Limit CData Length violation |
||
xml_check_max_elem_success str |
XML Limit Element check passed |
||
xml_check_max_elem_violation str |
XML Limit Element violation |
||
xml_check_max_elem_child_success str |
XML Limit Element Child check passed |
||
xml_check_max_elem_child_violation str |
XML Limit Element Child violation |
||
xml_check_max_elem_depth_success str |
XML Limit Element Depth check passed |
||
xml_check_max_elem_depth_violation str |
XML Limit Element Depth violation |
||
xml_check_max_elem_name_len_success str |
XML Limit Element Name Length check passed |
||
xml_check_max_elem_name_len_violation str |
XML Limit Element Name Length violation |
||
xml_check_max_entity_exp_success str |
XML Limit Entity Expansions check passed |
||
xml_check_max_entity_exp_violation str |
XML Limit Entity Expansions violation |
||
xml_check_max_entity_exp_depth_success str |
XML Limit Entities Depth check passed |
||
xml_check_max_entity_exp_depth_violation str |
XML Limit Entities Depth violation |
||
xml_check_max_namespace_success str |
XML Limit Namespace check passed |
||
xml_check_max_namespace_violation str |
XML Limit Namespace violation |
||
xml_check_namespace_uri_len_success str |
XML Limit Namespace URI Length check passed |
||
xml_check_namespace_uri_len_violation str |
XML Limit Namespace URI Length violation |
||
xml_check_sqlia_success str |
XML Sqlia Check passed |
||
xml_check_sqlia_violation str |
XML Sqlia Check violation |
||
xml_check_xss_success str |
XML XSS Check passed |
||
xml_check_xss_violation str |
XML XSS Check violation |
||
xml_content_check_schema_success str |
XML Schema passed |
||
xml_content_check_schema_violation str |
XML Schema violation |
||
xml_content_check_wsdl_success str |
WSDL passed |
||
xml_content_check_wsdl_violation str |
WSDL violation |
||
learning_list_full str |
Learning list is full |
||
action_allow str |
Request Action allowed |
||
action_deny_200 str |
Request Deny with 200 |
||
action_deny_403 str |
Request Deny with 403 |
||
action_deny_redirect str |
Request Deny with Redirect |
||
action_deny_reset str |
Request Deny with Resets |
||
action_drop str |
Number of Dropped Requests |
||
action_deny_custom_response str |
Request Deny with custom response |
||
action_learn str |
Request Learning Updates |
||
action_log str |
Log request violation |
||
policy_limit_exceeded str |
Policy limit exceeded |
||
sessions_alloc str |
Sessions allocated |
||
sessions_freed str |
Sessions freed |
||
out_of_sessions str |
Out of sessions |
||
too_many_sessions str |
Too many sessions consumed |
||
regex_violation str |
Regular expression failure |
||
request_check_command_injection_cookies_success str |
Command Injection Check cookies passed |
||
request_check_command_injection_cookies_violation str |
Command Injection Check cookies violation |
||
request_check_command_injection_headers_success str |
Command Injection Check headers passed |
||
request_check_command_injection_headers_violation str |
Command Injection Check headers violation |
||
request_check_command_injection_uri_query_success str |
Command Injection Check url query arguments passed |
||
request_check_command_injection_uri_query_violation str |
Command Injection Check url query arguments violation |
||
request_check_command_injection_form_body_success str |
Command Injection Check form body arguments passed |
||
request_check_command_injection_form_body_violation str |
Command Injection Check form body arguments violation |
||
cookie_security_decrypt_in_grace_period_violation str |
Cookie Decrypt violation but in grace period |
||
form_response_non_post_success str |
Response form method was POST |
||
form_response_non_post_violation str |
Response form method was not POST |
||
form_response_non_post_sanitize str |
Changed response form method to POST |
||
xml_check_max_entity_decl_success str |
XML Limit Entity Decl check passed |
||
xml_check_max_entity_decl_violation str |
XML Limit Entity Decl violation |
||
xml_check_max_entity_depth_success str |
XML Limit Entity Depth check passed |
||
xml_check_max_entity_depth_violation str |
XML Limit Entity Depth violation |
||
action_response_allow str |
Response Action allowed |
||
action_response_deny_200 str |
Response Deny with 200 |
||
action_response_deny_403 str |
Response Deny with 403 |
||
action_response_deny_redirect str |
Response Deny with Redirect |
||
action_response_deny_reset str |
Deny with Resets |
||
action_response_drop str |
Number of Dropped Responses |
||
action_response_deny_custom_response str |
Response Deny with custom response |
||
action_response_learn str |
Response Learning Updates |
||
action_response_log str |
Log response violation |
||
http_protocol_post_without_content_type_success str |
POST without content type check passed |
||
http_protocol_post_without_content_type_violation str |
POST without content type check violation |
||
http_protocol_body_without_content_type_success str |
Body without content type check passed |
||
http_protocol_body_without_content_type_violation str |
Body without content type check violation |
||
http_protocol_non_ssl_cookie_prefix_success str |
Cookie Name Prefix check passed |
||
http_protocol_non_ssl_cookie_prefix_violation str |
Cookie Name Prefix check violation |
||
cookie_security_add_samesite_success str |
Cookie Security - samesite attribute added successfully |
||
cookie_security_add_samesite_violation str |
Cookie Security - samesite attribute violation |
Examples
Return Values
- modified_values (changed, dict, )
Values modified (or potential changes if using check_mode) as a result of task operation
- axapi_calls (always, list, )
Sequential list of AXAPI calls made by the task
- endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])
The AXAPI endpoint being accessed.
- http_method (, str, [‘POST’, ‘GET’])
HTTP method being used by the primary task to interact with the AXAPI endpoint.
- request_body (, complex, )
Params used to query the AXAPI
- response_body (, complex, )
Response from the AXAPI
Status
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by community.