You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -104,7 +104,7 @@ Currently, must be **MatchRule**.
104
104
Must be one of the variables:
105
105
106
106
- RemoteAddr – IPv4 Address/Range of the remote computer connection
107
-
- RequestMethod – HTTP Request method (GET, POST, PUT, DELETE, and so on.)
107
+
- RequestMethod – HTTP Request method
108
108
- QueryString – Variable in the URI
109
109
- PostArgs – Arguments sent in the POST body. Custom Rules using this match variable are only applied if the 'Content-Type' header is set to 'application/x-www-form-urlencoded' and 'multipart/form-data'. Additional content type of `application/json` is supported with CRS version 3.2 or greater, bot protection rule set, and geo-match custom rules.
110
110
- RequestUri – URI of the request
@@ -122,7 +122,7 @@ Must be one of the following operators:
122
122
123
123
- IPMatch - only used when Match Variable is *RemoteAddr,* and only supports IPv4
124
124
- Equal – input is the same as the MatchValue
125
-
- Any – It should not have a MatchValue. It is recommended for Match Variable with a valid Selector.
125
+
- Any – It shouldn't have a MatchValue. It's recommended for Match Variable with a valid Selector.
126
126
- Contains
127
127
- LessThan
128
128
- GreaterThan
@@ -152,13 +152,22 @@ A list of strings with names of transformations to do before the match is attemp
152
152
153
153
List of values to match against, which can be thought of as being *OR*'ed. For example, it could be IP addresses or other strings. The value format depends on the previous operator.
154
154
155
+
Supported HTTP request method values include:
156
+
- GET
157
+
- HEAD
158
+
- POST
159
+
- OPTIONS
160
+
- PUT
161
+
- DELETE
162
+
- PATCH
163
+
155
164
### Action [required]
156
165
157
166
In WAF policy detection mode, if a custom rule is triggered, the action is always logged regardless of the action value set on the custom rule.
158
167
159
-
- Allow – Authorizes the transaction, skipping all other rules. The specified request is added to the allow list and once matched, the request stops further evaluation and is sent to the backend pool. Rules that are on the allow list aren't evaluated for any further custom rules or managed rules.
168
+
- Allow – Authorizes the transaction, skipping all other rules. The specified request is added to the allowlist and once matched, the request stops further evaluation and is sent to the backend pool. Rules that are on the allowlist aren't evaluated for any further custom rules or managed rules.
160
169
- Block - Blocks or logs the transaction based on SecDefaultAction (detection/prevention mode).
161
-
- Prevention mode - Blocks the transaction based on SecDefaultAction. Just like the Allow action, once the request is evaluated and added to the block list, evaluation is stopped and the request is blocked. Any request after that meets the same conditions won't be evaluated and will just be blocked.
170
+
- Prevention mode - Blocks the transaction based on SecDefaultAction. Just like the Allow action, once the request is evaluated and added to the blocklist, evaluation is stopped and the request is blocked. Any request after that meets the same conditions won't be evaluated and will just be blocked.
162
171
- Detection mode - Logs the transaction based on SecDefaultAction after which evaluation is stopped. Any request after that meets the same conditions won't be evaluated and will just be logged.
163
172
- Log – Lets the rule write to the log, but lets the rest of the rules run for evaluation. The other custom rules are evaluated in order of priority, followed by the managed rules.
0 commit comments