Skip to content

Commit 06c9190

Browse files
authored
Fixing the waf_security_rule.html.markdown documentation (#580)
1 parent 8f52227 commit 06c9190

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

website/docs/r/waf_security_rule.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ resource "incapsula_waf_security_rule" "example-waf-ddos-rule" {
4141
The following arguments are supported:
4242

4343
* `site_id` - (Required) Numeric identifier of the site to operate on.
44-
* `rule_id` - (Required) The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
44+
* `rule_id` - (Required) The identifier of the WAF rule, e.g api.threats.cross_site_scripting. Possible values: `api.threats.bot_access_control`, `api.threats.sql_injection`, `api.threats.cross_site_scripting`, `api.threats.backdoor`, `api.threats.ddos`, `api.threats.remote_file_inclusion`.
4545
* `security_rule_action` - (Optional) The action that should be taken when a threat is detected, for example: api.threats.action.block_ip. See above examples for `rule_id` and `action` combinations.
4646
* `activation_mode` - (Optional) The mode of activation for ddos on a site. Possible values: api.threats.ddos.activation_mode.off, api.threats.ddos.activation_mode.auto, api.threats.ddos.activation_mode.on, api.threats.ddos.activation_mode.adaptive.
4747
* `ddos_traffic_threshold` - (Optional) Consider site to be under DDoS if the request rate is above this threshold. The valid values are 10, 20, 50, 100, 200, 500, 750, 1000, 2000, 3000, 4000, 5000.

0 commit comments

Comments
 (0)