Predefined Profiles | Description |
High-Level-Security | • Web Attack Signature policy: High-Level-Security • HTTP Protocol Constraints policy: High-Level-Security • SQL/XSS Injection Detection policy: High-Level-Security |
Medium-Level-Security | • Web Attack Signature policy: Medium-Level-Security • HTTP Protocol Constraints policy: Medium-Level-Security • SQL/XSS Injection Detection policy: Medium-Level-Security |
Alert-Only | • Web Attack Signature policy: Alert-Only • HTTP Protocol Constraints policy: Alert-Only • SQL/XSS Injection Detection policy: Alert-Only |
Settings | Guidelines |
Name | Configuration name. Valid characters are A-Z, a-z, 0-9, _, and -. No spaces. After you initially save the configuration, you cannot edit the name. |
Description | A string to describe the purpose of the configuration, to help you and other administrators more easily identify its use. |
Web Attack Signature | Select a predefined or user-defined Web Attack Signature configuration object. |
URL Protection | Select a user-defined URL Protection configuration object. |
HTTP Protocol Constraint | Select a predefined or user-defined HTTP Protocol Constraint configuration object. |
SQL/XSS Injection Detection | Select a predefined or user-defined SQL/XSS Injection Detection configuration object. |