diff --git a/content/includes/nap-waf/policy.html b/content/includes/nap-waf/policy.html index 9c9bc348f..446d4fc44 100644 --- a/content/includes/nap-waf/policy.html +++ b/content/includes/nap-waf/policy.html @@ -803,36 +803,12 @@

brute-force-attack-preventions -captchaBypassCriteria -object -Specifies configuration for CAPTCHA Bypass Mitigation. - - - -clientSideIntegrityBypassCriteria -object -Specifies configuration for Client Side Integrity Bypass Mitigation. - - - detectionCriteria object Specifies configuration for detecting distributed brute force attacks. -leakedCredentialsCriteria -object -Specifies configuration for Leaked Credentials Detection. - - - -loginAttemptsFromTheSameDeviceId -object -Specifies configuration for detecting brute force attacks for Device ID. - - - loginAttemptsFromTheSameIp object Specifies configuration for detecting brute force attacks from IP Address. @@ -882,98 +858,6 @@

brute-force-attack-preventions -

captchaBypassCriteria

- ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Field NameTypeDescriptionAllowed Values

action

string

Specifies action that is applied when defined threshold is reached.

-
-
    -
  • alarm-and-blocking-page: The system will log the login attempt, block the request and send the Blocking page.
  • -
  • alarm-and-drop: The system will log the login attempt and reset the TCP connection.
  • -
  • alarm-and-honeypot-page: The system will log the login attempt, block the request and send the Honeypot page. The Honeypot page is used for attacker deception. The page should look like an application failed login page. Unlike with the Blocking page, when the Honeypot page is sent an attacker is not able to distinguish a failed login response from a mitigation. As a result, the attacker will not change identity (Source IP or Device ID) and the brute force attack will be rendered ineffective. The Honeypot page is recommended when mitigation is request blocking.
  • -
-
    -
  • alarm-and-blocking-page
  • -
  • alarm-and-drop
  • -
  • alarm-and-honeypot-page
  • -
enabledbooleanWhen enabled, the system counts successful CAPTCHA challenges with failed logins from IP Address / Device ID.
thresholdinteger minimum: 1 maximum: 100After configured threshold (number of successful CAPTCHA challenges with failed logins from IP Address / Device ID) defined action will be applied for the next login attempt
-

clientSideIntegrityBypassCriteria

- ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Field NameTypeDescriptionAllowed Values

action

string

Specifies action that is applied when defined threshold is reached.

-
-
    -
  • alarm-and-captcha: The system determines whether the client is a legal browser operated by a human user by sending a CAPTCHA challenge. A login attempt is logged if the client successfully passes the CAPTCHA challenge.
  • -
-
    -
  • alarm-and-captcha
  • -
enabledbooleanWhen enabled, the system counts successful challenges with failed logins from IP Address / Device ID / Username. Legitimate users who have disabled JavaScripting on their browsers for security reasons will fail a client side integrity challenge.
thresholdinteger minimum: 1 maximum: 100After configured threshold (number of successful challenges with failed logins from IP Address / Device ID / Username) defined action will be applied for the next login attempt

detectionCriteria

@@ -998,16 +882,12 @@

detectionCriter

@@ -1017,18 +897,6 @@

detectionCriter

- - - - - - - - - - - - @@ -1036,104 +904,6 @@

detectionCriter

  • alarm
  • -
  • alarm-and-captcha
  • alarm-and-client-side-integrity
  • -
  • alarm-and-client-side-integrity-captcha
detectCredentialsStuffingAttackbooleanWhen enabled, the system detects login attempts that match known leaked credentials library.
detectDistributedBruteForceAttackbooleanWhen enabled, the system detects distributed brute force attacks.
failedLoginAttemptsRateReached integer minimum: 1 maximum: 10000 After configured threshold (number of failed login attempts within measurementPeriod) defined action will be applied for the next login attempt.
-

leakedCredentialsCriteria

- ------ - - - - - - - - - - - - - - - - - - - - - - -
Field NameTypeDescriptionAllowed Values

action

string

Specifies action when leaked credentials detected.

-
-
    -
  • alarm: The system will log the login attempt.
  • -
  • alarm-and-blocking-page: The system will log the login attempt, block the request and send the Blocking page.
  • -
  • alarm-and-honeypot-page: The system will log the login attempt, block the request and send the Honeypot page. The Honeypot page is used for attacker deception. The page should look like an application failed login page. Unlike with the Blocking page, when the Honeypot page is sent an attacker is not able to distinguish a failed login response from a mitigation. As a result, the attacker will not change identity (Source IP or Device ID) and the brute force attack will be rendered ineffective. The Honeypot page is recommended when mitigation is request blocking.
  • -
  • alarm-and-leaked-credentials-response-page: The default response page warns the user that the username and password have been leaked and the password should be changed.
  • -
-
    -
  • alarm
  • -
  • alarm-and-blocking-page
  • -
  • alarm-and-honeypot-page
  • -
  • alarm-and-leaked-credentials-response-page
  • -
enabledbooleanWhen enabled, the system can match presented credentials to those in the credentials dictionary to detect leaked credentials.
-

loginAttemptsFromTheSameDeviceId

- ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Field NameTypeDescriptionAllowed Values

action

string

Specifies action that is applied when defined threshold is reached.

-
-
    -
  • alarm: The system will log the login attempt.
  • -
  • alarm-and-blocking-page: The system will log the login attempt, block the request and send the Blocking page.
  • -
  • alarm-and-captcha: The system determines whether the client is a legal browser operated by a human user by sending a CAPTCHA challenge. A login attempt is logged if the client successfully passes the CAPTCHA challenge.
  • -
  • alarm-and-client-side-integrity: The system determines whether the client is a legal browser or a bot by sending a page containing JavaScript code and waiting for a response. Legal browsers are able to execute JavaScript and produce a valid response, whereas bots cannot. A login attempt is logged if the client successfully passes the Client Side Integrity challenge.
  • -
  • alarm-and-drop: The system will log the login attempt and reset the TCP connection.
  • -
  • alarm-and-honeypot-page: The system will log the login attempt, block the request and send the Honeypot page. The Honeypot page is used for attacker deception. The page should look like an application failed login page. Unlike with the Blocking page, when the Honeypot page is sent an attacker is not able to distinguish a failed login response from a mitigation. As a result, the attacker will not change identity (Source IP or Device ID) and the brute force attack will be rendered ineffective. The Honeypot page is recommended when mitigation is request blocking.
  • -
-
    -
  • alarm
  • -
  • alarm-and-blocking-page
  • -
  • alarm-and-captcha
  • -
  • alarm-and-client-side-integrity
  • -
  • alarm-and-drop
  • -
  • alarm-and-honeypot-page
  • -
enabledbooleanWhen enabled, the system counts failed login attempts for Device ID.
thresholdinteger minimum: 1 maximum: 100After configured threshold (number of failed login attempts for Device ID) defined action will be applied for the next login attempt.

loginAttemptsFromTheSameIp

@@ -1159,7 +929,6 @@

loginA

  • alarm
  • alarm-and-blocking-page
  • -
  • alarm-and-captcha
  • alarm-and-client-side-integrity
  • alarm-and-drop
  • alarm-and-honeypot-page
  • @@ -1212,13 +980,11 @@

    logi
    • alarm: The system will log the login attempt.
    • -
    • alarm-and-captcha: The system determines whether the client is a legal browser operated by a human user by sending a CAPTCHA challenge. A login attempt is logged if the client successfully passes the CAPTCHA challenge.
    • alarm-and-client-side-integrity: The system determines whether the client is a legal browser or a bot by sending a page containing JavaScript code and waiting for a response. Legal browsers are able to execute JavaScript and produce a valid response, whereas bots cannot. A login attempt is logged if the client successfully passes the Client Side Integrity challenge.

  • alarm
  • -
  • alarm-and-captcha
  • alarm-and-client-side-integrity