Corrects doc strings in bigip_asm_policy_* modules (#50561)
This commit is contained in:
parent
4648a441d2
commit
96f7cf394f
3 changed files with 13 additions and 13 deletions
|
@ -34,9 +34,9 @@ options:
|
|||
state:
|
||||
description:
|
||||
- When C(state) is C(present), and C(template) parameter is provided,
|
||||
new ASM policy is created from template with the given C(name).
|
||||
new ASM policy is created from template with the given policy C(name).
|
||||
- When C(state) is present and no C(template) parameter is provided
|
||||
new blank ASM policy is created with the given C(name).
|
||||
new blank ASM policy is created with the given policy C(name).
|
||||
- When C(state) is C(absent), ensures that the policy is removed, even if it is
|
||||
currently active.
|
||||
choices:
|
||||
|
|
|
@ -22,7 +22,7 @@ version_added: 2.8
|
|||
options:
|
||||
name:
|
||||
description:
|
||||
- Specifies the name of the server technology to apply/remove to the ASM policy.
|
||||
- Specifies the name of the server technology to apply on or remove from the ASM policy.
|
||||
required: True
|
||||
choices:
|
||||
- jQuery
|
||||
|
|
|
@ -22,9 +22,9 @@ version_added: 2.8
|
|||
options:
|
||||
name:
|
||||
description:
|
||||
- Specifies the name of the signature sets to apply/remove to the ASM policy.
|
||||
- Apart from built-in signature sets that ship with the device, users can create and use
|
||||
their own signature sets.
|
||||
- Specifies the name of the signature sets to apply on or remove from the ASM policy.
|
||||
- Apart from built-in signature sets that ship with the device, users can use user created
|
||||
signature sets.
|
||||
- When C(All Response Signatures), configures all signatures in the attack signature
|
||||
pool that can review responses.
|
||||
- When C(All Signatures), configures all attack signatures in the attack signature pool.
|
||||
|
@ -60,9 +60,9 @@ options:
|
|||
that attempt to run system level commands through a vulnerable application.
|
||||
- When C(OWA Signatures), configures signatures that target attacks against
|
||||
the Microsoft Outlook Web Access (OWA) application.
|
||||
- When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks
|
||||
including session fixation, local file access, injection attempts, header tampering,
|
||||
and so on that could affect many applications.
|
||||
- When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks,
|
||||
including session fixation, local file access, injection attempts, header tampering
|
||||
and so on, affecting many applications.
|
||||
- When C(Path Traversal Signatures), configures signatures targeting attacks that attempt to access files
|
||||
and directories that are stored outside the web root folder.
|
||||
- When C(Predictable Resource Location Signatures), configures signatures targeting attacks that attempt
|
||||
|
@ -78,7 +78,7 @@ options:
|
|||
that are integrated using WebSphere including general database, Microsoft Windows, IIS,
|
||||
Microsoft SQL Server, Apache, Oracle, Unix/Linux, IBM DB2, PostgreSQL, and XML.
|
||||
- When C(XPath Injection Signatures), configures signatures targeting attacks that attempt to gain access
|
||||
to data structures or bypass permissions or access when a web site uses user-supplied information
|
||||
to data structures or bypass permissions when a web site uses user-supplied information
|
||||
to construct XPath queries for XML data.
|
||||
required: True
|
||||
policy_name:
|
||||
|
@ -87,12 +87,12 @@ options:
|
|||
required: True
|
||||
alarm:
|
||||
description:
|
||||
- Specifies whether the security policy logs the request data in the Statistics screen,
|
||||
if a request matches a signature that is included in the signature set.
|
||||
- Specifies if the security policy logs the request data in the Statistics screen,
|
||||
when a request matches a signature that is included in the signature set.
|
||||
type: bool
|
||||
block:
|
||||
description:
|
||||
- Effective when the security policy's enforcement mode is Blocking.
|
||||
- Effective when the security policy`s enforcement mode is Blocking.
|
||||
- Determines how the system treats requests that match a signature included in the signature set.
|
||||
- When C(yes) the system blocks all requests that match a signature,
|
||||
and provides the client with a support ID number.
|
||||
|
|
Loading…
Reference in a new issue