Skip to content

Commit 0f5dafd

Browse files
committed
fix links to all tabs
1 parent c936abf commit 0f5dafd

File tree

1 file changed

+57
-57
lines changed

1 file changed

+57
-57
lines changed

articles/web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md

Lines changed: 57 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -143,20 +143,20 @@ CRS 3.2 includes 14 rule groups, as shown in the following table. Each group con
143143
144144
|Rule group name|Description|
145145
|---|---|
146-
|**[General](#general-32)**|General group|
147-
|**[KNOWN-CVES](#crs800-32)**|Help detect new and known CVEs|
148-
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-32)**|Lock-down methods (PUT, PATCH)|
149-
|**[REQUEST-913-SCANNER-DETECTION](#crs913-32)**|Protect against port and environment scanners|
150-
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-32)**|Protect against protocol and encoding issues|
151-
|**[REQUEST-921-PROTOCOL-ATTACK](#crs921-32)**|Protect against header injection, request smuggling, and response splitting|
152-
|**[REQUEST-930-APPLICATION-ATTACK-LFI](#crs930-32)**|Protect against file and path attacks|
153-
|**[REQUEST-931-APPLICATION-ATTACK-RFI](#crs931-32)**|Protect against remote file inclusion (RFI) attacks|
154-
|**[REQUEST-932-APPLICATION-ATTACK-RCE](#crs932-32)**|Protect again remote code execution attacks|
155-
|**[REQUEST-933-APPLICATION-ATTACK-PHP](#crs933-32)**|Protect against PHP-injection attacks|
156-
|**[REQUEST-941-APPLICATION-ATTACK-XSS](#crs941-32)**|Protect against cross-site scripting attacks|
157-
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](#crs942-32)**|Protect against SQL-injection attacks|
158-
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](#crs943-32)**|Protect against session-fixation attacks|
159-
|**[REQUEST-944-APPLICATION-ATTACK-JAVA](#crs944-32)**|Protect against JAVA attacks|
146+
|**[General](?tabs=owasp32#general-32)**|General group|
147+
|**[KNOWN-CVES](?tabs=owasp32#crs800-32)**|Help detect new and known CVEs|
148+
|**[REQUEST-911-METHOD-ENFORCEMENT](?tabs=owasp32#crs911-32)**|Lock-down methods (PUT, PATCH)|
149+
|**[REQUEST-913-SCANNER-DETECTION](?tabs=owasp32#crs913-32)**|Protect against port and environment scanners|
150+
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](?tabs=owasp32#crs920-32)**|Protect against protocol and encoding issues|
151+
|**[REQUEST-921-PROTOCOL-ATTACK](?tabs=owasp32#crs921-32)**|Protect against header injection, request smuggling, and response splitting|
152+
|**[REQUEST-930-APPLICATION-ATTACK-LFI](?tabs=owasp32#crs930-32)**|Protect against file and path attacks|
153+
|**[REQUEST-931-APPLICATION-ATTACK-RFI](?tabs=owasp32#crs931-32)**|Protect against remote file inclusion (RFI) attacks|
154+
|**[REQUEST-932-APPLICATION-ATTACK-RCE](?tabs=owasp32#crs932-32)**|Protect again remote code execution attacks|
155+
|**[REQUEST-933-APPLICATION-ATTACK-PHP](?tabs=owasp32#crs933-32)**|Protect against PHP-injection attacks|
156+
|**[REQUEST-941-APPLICATION-ATTACK-XSS](?tabs=owasp32#crs941-32)**|Protect against cross-site scripting attacks|
157+
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](?tabs=owasp32#crs942-32)**|Protect against SQL-injection attacks|
158+
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](?tabs=owasp32#crs943-32)**|Protect against session-fixation attacks|
159+
|**[REQUEST-944-APPLICATION-ATTACK-JAVA](?tabs=owasp32#crs944-32)**|Protect against JAVA attacks|
160160

161161

162162
### OWASP CRS 3.1
@@ -168,20 +168,20 @@ CRS 3.1 includes 14 rule groups, as shown in the following table. Each group con
168168
169169
|Rule group name|Description|
170170
|---|---|
171-
|**[General](#general-31)**|General group|
172-
|**[KNOWN-CVES](#crs800-31)**|Help detect new and known CVEs|
173-
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-31)**|Lock-down methods (PUT, PATCH)|
174-
|**[REQUEST-913-SCANNER-DETECTION](#crs913-31)**|Protect against port and environment scanners|
175-
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-31)**|Protect against protocol and encoding issues|
176-
|**[REQUEST-921-PROTOCOL-ATTACK](#crs921-31)**|Protect against header injection, request smuggling, and response splitting|
177-
|**[REQUEST-930-APPLICATION-ATTACK-LFI](#crs930-31)**|Protect against file and path attacks|
178-
|**[REQUEST-931-APPLICATION-ATTACK-RFI](#crs931-31)**|Protect against remote file inclusion (RFI) attacks|
179-
|**[REQUEST-932-APPLICATION-ATTACK-RCE](#crs932-31)**|Protect again remote code execution attacks|
180-
|**[REQUEST-933-APPLICATION-ATTACK-PHP](#crs933-31)**|Protect against PHP-injection attacks|
181-
|**[REQUEST-941-APPLICATION-ATTACK-XSS](#crs941-31)**|Protect against cross-site scripting attacks|
182-
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](#crs942-31)**|Protect against SQL-injection attacks|
183-
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](#crs943-31)**|Protect against session-fixation attacks|
184-
|**[REQUEST-944-APPLICATION-ATTACK-SESSION-JAVA](#crs944-31)**|Protect against JAVA attacks|
171+
|**[General](?tabs=owasp31#general-31)**|General group|
172+
|**[KNOWN-CVES](?tabs=owasp31#crs800-31)**|Help detect new and known CVEs|
173+
|**[REQUEST-911-METHOD-ENFORCEMENT](?tabs=owasp31#crs911-31)**|Lock-down methods (PUT, PATCH)|
174+
|**[REQUEST-913-SCANNER-DETECTION](?tabs=owasp31#crs913-31)**|Protect against port and environment scanners|
175+
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](?tabs=owasp31#crs920-31)**|Protect against protocol and encoding issues|
176+
|**[REQUEST-921-PROTOCOL-ATTACK](?tabs=owasp31#crs921-31)**|Protect against header injection, request smuggling, and response splitting|
177+
|**[REQUEST-930-APPLICATION-ATTACK-LFI](?tabs=owasp31#crs930-31)**|Protect against file and path attacks|
178+
|**[REQUEST-931-APPLICATION-ATTACK-RFI](?tabs=owasp31#crs931-31)**|Protect against remote file inclusion (RFI) attacks|
179+
|**[REQUEST-932-APPLICATION-ATTACK-RCE](?tabs=owasp31#crs932-31)**|Protect again remote code execution attacks|
180+
|**[REQUEST-933-APPLICATION-ATTACK-PHP](?tabs=owasp31#crs933-31)**|Protect against PHP-injection attacks|
181+
|**[REQUEST-941-APPLICATION-ATTACK-XSS](?tabs=owasp31#crs941-31)**|Protect against cross-site scripting attacks|
182+
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](?tabs=owasp31#crs942-31)**|Protect against SQL-injection attacks|
183+
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](?tabs=owasp31#crs943-31)**|Protect against session-fixation attacks|
184+
|**[REQUEST-944-APPLICATION-ATTACK-SESSION-JAVA](?tabs=owasp31#crs944-31)**|Protect against JAVA attacks|
185185

186186
### OWASP CRS 3.0
187187

@@ -192,19 +192,19 @@ CRS 3.0 includes 13 rule groups, as shown in the following table. Each group con
192192
193193
|Rule group name|Description|
194194
|---|---|
195-
|**[General](#general-30)**|General group|
196-
|**[KNOWN-CVES](#crs800-30)**|Help detect new and known CVEs|
197-
|**[REQUEST-911-METHOD-ENFORCEMENT](#crs911-30)**|Lock-down methods (PUT, PATCH)|
198-
|**[REQUEST-913-SCANNER-DETECTION](#crs913-30)**|Protect against port and environment scanners|
199-
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](#crs920-30)**|Protect against protocol and encoding issues|
200-
|**[REQUEST-921-PROTOCOL-ATTACK](#crs921-30)**|Protect against header injection, request smuggling, and response splitting|
201-
|**[REQUEST-930-APPLICATION-ATTACK-LFI](#crs930-30)**|Protect against file and path attacks|
202-
|**[REQUEST-931-APPLICATION-ATTACK-RFI](#crs931-30)**|Protect against remote file inclusion (RFI) attacks|
203-
|**[REQUEST-932-APPLICATION-ATTACK-RCE](#crs932-30)**|Protect again remote code execution attacks|
204-
|**[REQUEST-933-APPLICATION-ATTACK-PHP](#crs933-30)**|Protect against PHP-injection attacks|
205-
|**[REQUEST-941-APPLICATION-ATTACK-XSS](#crs941-30)**|Protect against cross-site scripting attacks|
206-
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](#crs942-30)**|Protect against SQL-injection attacks|
207-
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](#crs943-30)**|Protect against session-fixation attacks|
195+
|**[General](?tabs=owasp30#general-30)**|General group|
196+
|**[KNOWN-CVES](?tabs=owasp30#crs800-30)**|Help detect new and known CVEs|
197+
|**[REQUEST-911-METHOD-ENFORCEMENT](?tabs=owasp30#crs911-30)**|Lock-down methods (PUT, PATCH)|
198+
|**[REQUEST-913-SCANNER-DETECTION](?tabs=owasp30#crs913-30)**|Protect against port and environment scanners|
199+
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](?tabs=owasp30#crs920-30)**|Protect against protocol and encoding issues|
200+
|**[REQUEST-921-PROTOCOL-ATTACK](?tabs=owasp30#crs921-30)**|Protect against header injection, request smuggling, and response splitting|
201+
|**[REQUEST-930-APPLICATION-ATTACK-LFI](?tabs=owasp30#crs930-30)**|Protect against file and path attacks|
202+
|**[REQUEST-931-APPLICATION-ATTACK-RFI](?tabs=owasp30#crs931-30)**|Protect against remote file inclusion (RFI) attacks|
203+
|**[REQUEST-932-APPLICATION-ATTACK-RCE](?tabs=owasp30#crs932-30)**|Protect again remote code execution attacks|
204+
|**[REQUEST-933-APPLICATION-ATTACK-PHP](?tabs=owasp30#crs933-30)**|Protect against PHP-injection attacks|
205+
|**[REQUEST-941-APPLICATION-ATTACK-XSS](?tabs=owasp30#crs941-30)**|Protect against cross-site scripting attacks|
206+
|**[REQUEST-942-APPLICATION-ATTACK-SQLI](?tabs=owasp30#crs942-30)**|Protect against SQL-injection attacks|
207+
|**[REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION](?tabs=owasp30#crs943-30)**|Protect against session-fixation attacks|
208208

209209
### OWASP CRS 2.2.9
210210

@@ -215,36 +215,36 @@ CRS 2.2.9 includes 10 rule groups, as shown in the following table. Each group c
215215
216216
|Rule group name|Description|
217217
|---|---|
218-
|**[crs_20_protocol_violations](#crs20)**|Protect against protocol violations (such as invalid characters or a GET with a request body)|
219-
|**[crs_21_protocol_anomalies](#crs21)**|Protect against incorrect header information|
220-
|**[crs_23_request_limits](#crs23)**|Protect against arguments or files that exceed limitations|
221-
|**[crs_30_http_policy](#crs30)**|Protect against restricted methods, headers, and file types|
222-
|**[crs_35_bad_robots](#crs35)**|Protect against web crawlers and scanners|
223-
|**[crs_40_generic_attacks](#crs40)**|Protect against generic attacks (such as session fixation, remote file inclusion, and PHP injection)|
224-
|**[crs_41_sql_injection_attacks](#crs41sql)**|Protect against SQL-injection attacks|
225-
|**[crs_41_xss_attacks](#crs41xss)**|Protect against cross-site scripting attacks|
226-
|**[crs_42_tight_security](#crs42)**|Protect against path-traversal attacks|
227-
|**[crs_45_trojans](#crs45)**|Protect against backdoor trojans|
218+
|**[crs_20_protocol_violations](?tabs=owasp2#crs20)**|Protect against protocol violations (such as invalid characters or a GET with a request body)|
219+
|**[crs_21_protocol_anomalies](?tabs=owasp2#crs21)**|Protect against incorrect header information|
220+
|**[crs_23_request_limits](?tabs=owasp2#crs23)**|Protect against arguments or files that exceed limitations|
221+
|**[crs_30_http_policy](?tabs=owasp2#crs30)**|Protect against restricted methods, headers, and file types|
222+
|**[crs_35_bad_robots](?tabs=owasp2#crs35)**|Protect against web crawlers and scanners|
223+
|**[crs_40_generic_attacks](?tabs=owasp2#crs40)**|Protect against generic attacks (such as session fixation, remote file inclusion, and PHP injection)|
224+
|**[crs_41_sql_injection_attacks](?tabs=owasp2#crs41sql)**|Protect against SQL-injection attacks|
225+
|**[crs_41_xss_attacks](?tabs=owasp2#crs41xss)**|Protect against cross-site scripting attacks|
226+
|**[crs_42_tight_security](?tabs=owasp2#crs42)**|Protect against path-traversal attacks|
227+
|**[crs_45_trojans](?tabs=owasp2#crs45)**|Protect against backdoor trojans|
228228

229229
### Bot Manager 1.0
230230

231231
The Bot Manager 1.0 rule set provides protection against malicious bots and detection of good bots. The rules provide granular control over bots detected by WAF by categorizing bot traffic as Good, Bad, or Unknown bots.
232232

233233
|Rule group|Description|
234234
|---|---|
235-
|[BadBots](#bot100)|Protect against bad bots|
236-
|[GoodBots](#bot200)|Identify good bots|
237-
|[UnknownBots](#bot300)|Identify unknown bots|
235+
|**[BadBots](?tabs=bot#bot100)**|Protect against bad bots|
236+
|**[GoodBots](?tabs=bot#bot200)**|Identify good bots|
237+
|**[UnknownBots](?tabs=bot#bot300)**|Identify unknown bots|
238238

239239
### Bot Manager 1.1
240240

241241
The Bot Manager 1.1 rule set is an enhancement to Bot Manager 1.0 rule set. It provides enhanced protection against malicious bots, and increases good bot detection.
242242

243243
|Rule group|Description|
244244
|---|---|
245-
|[BadBots](#bot11-100)|Protect against bad bots|
246-
|[GoodBots](#bot11-200)|Identify good bots|
247-
|[UnknownBots](#bot11-300)|Identify unknown bots|
245+
|**[BadBots](?tabs=bot11#bot11-100)**|Protect against bad bots|
246+
|**[GoodBots](?tabs=bot11#bot11-200)**|Identify good bots|
247+
|**[UnknownBots](?tabs=bot11#bot11-300)**|Identify unknown bots|
248248

249249
The following rule groups and rules are available when using Web Application Firewall on Application Gateway.
250250

0 commit comments

Comments
 (0)