diff --git a/docs/wafd/api-ref/ALL_META.TXT.json b/docs/wafd/api-ref/ALL_META.TXT.json index 0fc5808a..a7112016 100644 --- a/docs/wafd/api-ref/ALL_META.TXT.json +++ b/docs/wafd/api-ref/ALL_META.TXT.json @@ -1,1001 +1,2003 @@ [ + { + "dockw":"API Reference" + }, { "uri":"waf_02_0001.html", + "node_id":"waf_02_0001.xml", "product_code":"wafd", "code":"1", "des":"Public cloud APIs comply with the RESTful API design principles. REST-based Web services are organized into resources. Each resource is identified by one or more Uniform ", "doc_type":"api", "kw":"API Usage Guidelines,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"API Usage Guidelines", "githuburl":"" }, { "uri":"waf_02_0007.html", + "node_id":"waf_02_0007.xml", "product_code":"wafd", "code":"2", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"APIs", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"APIs", "githuburl":"" }, { "uri":"topic_300000000.html", + "node_id":"topic_300000000.xml", "product_code":"wafd", "code":"3", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Dedicated Instance Management", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Dedicated Instance Management", "githuburl":"" }, { "uri":"CreateInstance.html", + "node_id":"createinstance.xml", "product_code":"wafd", "code":"4", "des":"This API is used to create a dedicated WAF enginePOST /v1/{project_id}/premium-waf/instanceStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 20", "doc_type":"api", "kw":"Creating a Dedicated WAF Engine,Dedicated Instance Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Dedicated WAF Engine", "githuburl":"" }, { "uri":"ListInstance.html", + "node_id":"listinstance.xml", "product_code":"wafd", "code":"5", "des":"This API is used to query the list of dedicated WAF engines.GET /v1/{project_id}/premium-waf/instanceStatus code: 200Status code: 400Status code: 401Status code: 500Statu", "doc_type":"api", "kw":"Querying the List of Dedicated WAF Engines,Dedicated Instance Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the List of Dedicated WAF Engines", "githuburl":"" }, { "uri":"ShowInstance.html", + "node_id":"showinstance.xml", "product_code":"wafd", "code":"6", "des":"This API is used to query details about a dedicated WAF engine.GET /v1/{project_id}/premium-waf/instance/{instance_id}Status code: 200Status code: 400Status code: 401Stat", "doc_type":"api", "kw":"Querying Details about a Dedicated WAF Engine,Dedicated Instance Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Details about a Dedicated WAF Engine", "githuburl":"" }, { "uri":"RenameInstance.html", + "node_id":"renameinstance.xml", "product_code":"wafd", "code":"7", "des":"This API is used to rename a dedicated WAF enginePUT /v1/{project_id}/premium-waf/instance/{instance_id}Status code: 200Status code: 400Status code: 401Status code: 500St", "doc_type":"api", "kw":"Renaming a Dedicated WAF Engine,Dedicated Instance Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Renaming a Dedicated WAF Engine", "githuburl":"" }, { "uri":"DeleteInstance.html", + "node_id":"deleteinstance.xml", "product_code":"wafd", "code":"8", "des":"This API is used to delete a dedicated WAF engine.DELETE /v1/{project_id}/premium-waf/instance/{instance_id}Status code: 200Status code: 400Status code: 401Status code: 5", "doc_type":"api", "kw":"Deleting a Dedicated WAF Engine,Dedicated Instance Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Dedicated WAF Engine", "githuburl":"" }, { "uri":"UpgradeInstance.html", + "node_id":"upgradeinstance.xml", "product_code":"wafd", "code":"9", "des":"This API is used to operate a dedicated WAF instance.POST /v1/{project_id}/premium-waf/instance/{instance_id}/actionStatus code: 200Status code: 400Status code: 401Status", "doc_type":"api", "kw":"Operations on a Dedicated WAF Instance,Dedicated Instance Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Operations on a Dedicated WAF Instance", "githuburl":"" }, { "uri":"topic_300000001.html", + "node_id":"topic_300000001.xml", "product_code":"wafd", "code":"10", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Managing Websites Protected in Dedicated Mode", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Managing Websites Protected in Dedicated Mode", "githuburl":"" }, { "uri":"CreatePremiumHost.html", + "node_id":"createpremiumhost.xml", "product_code":"wafd", "code":"11", "des":"This API is used to add a domain name to WAF.POST /v1/{project_id}/premium-waf/hostStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 200Request", "doc_type":"api", "kw":"Adding a Protected Domain Name,Managing Websites Protected in Dedicated Mode,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Adding a Protected Domain Name", "githuburl":"" }, { "uri":"ListPremiumHost.html", + "node_id":"listpremiumhost.xml", "product_code":"wafd", "code":"12", "des":"This API is used to query domain names protected by dedicated WAF engines.GET /v1/{project_id}/premium-waf/hostStatus code: 200Status code: 400Status code: 401Status code", "doc_type":"api", "kw":"Querying Domain Names Protected by Dedicated WAF Engines,Managing Websites Protected in Dedicated Mo", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Domain Names Protected by Dedicated WAF Engines", "githuburl":"" }, { "uri":"ShowPremiumHost.html", + "node_id":"showpremiumhost.xml", "product_code":"wafd", "code":"13", "des":"This API is used to query domain name settings in dedicated mode.GET /v1/{project_id}/premium-waf/host/{host_id}Status code: 200Status code: 400Status code: 401Status cod", "doc_type":"api", "kw":"Querying Domain Name Settings in Dedicated Mode,Managing Websites Protected in Dedicated Mode,API Re", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Domain Name Settings in Dedicated Mode", "githuburl":"" }, { "uri":"UpdatePremiumHost.html", + "node_id":"updatepremiumhost.xml", "product_code":"wafd", "code":"14", "des":"This API is used to modify a domain name protected by a dedicated WAF instance.PUT /v1/{project_id}/premium-waf/host/{host_id}Status code: 200Status code: 400Status code:", "doc_type":"api", "kw":"Modifying a Domain Name Protected by a Dedicated WAF Instance,Managing Websites Protected in Dedicat", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Modifying a Domain Name Protected by a Dedicated WAF Instance", "githuburl":"" }, { "uri":"DeletePremiumHost.html", + "node_id":"deletepremiumhost.xml", "product_code":"wafd", "code":"15", "des":"This API is used to delete a domain name from a dedicated WAF instance.DELETE /v1/{project_id}/premium-waf/host/{host_id}Status code: 200Status code: 400Status code: 401S", "doc_type":"api", "kw":"Deleting a Domain Name from a Dedicated WAF Instance,Managing Websites Protected in Dedicated Mode,A", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Domain Name from a Dedicated WAF Instance", "githuburl":"" }, { "uri":"UpdatePremiumHostProtectStatus.html", + "node_id":"updatepremiumhostprotectstatus.xml", "product_code":"wafd", "code":"16", "des":"This API is used to modify the protection status of a domain name connected to a dedicated WAF instance.PUT /v1/{project_id}/premium-waf/host/{host_id}/protect_statusStat", "doc_type":"api", "kw":"Modifying the Protection Status of a Domain Name in Dedicated Mode,Managing Websites Protected in De", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Modifying the Protection Status of a Domain Name in Dedicated Mode", "githuburl":"" }, { "uri":"topic_300000002.html", + "node_id":"topic_300000002.xml", "product_code":"wafd", "code":"17", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Policy Management", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Policy Management", "githuburl":"" }, { "uri":"ListPolicy.html", + "node_id":"listpolicy.xml", "product_code":"wafd", "code":"18", "des":"This API is used to query the list of protection policies.GET /v1/{project_id}/waf/policyStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 200R", "doc_type":"api", "kw":"Querying Protection Policies,Policy Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Protection Policies", "githuburl":"" }, { "uri":"CreatePolicy.html", + "node_id":"createpolicy.xml", "product_code":"wafd", "code":"19", "des":"This API is used to create a policyPOST /v1/{project_id}/waf/policyStatus code: 200Status code: 400Status code: 401Status code: 403Status code: 500Status code: 200okSee E", "doc_type":"api", "kw":"Creating a Policy,Policy Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Policy", "githuburl":"" }, { "uri":"ShowPolicy.html", + "node_id":"showpolicy.xml", "product_code":"wafd", "code":"20", "des":"This API is used to query a policy by ID.GET /v1/{project_id}/waf/policy/{policy_id}Status code: 200Status code: 400Status code: 401Status code: 500Status code: 200Reques", "doc_type":"api", "kw":"Querying a Policy by ID,Policy Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Policy by ID", "githuburl":"" }, { "uri":"UpdatePolicy.html", + "node_id":"updatepolicy.xml", "product_code":"wafd", "code":"21", "des":"This API is used to update a policy. The request body can contain only the part to be updated.PATCH /v1/{project_id}/waf/policy/{policy_id}Status code: 200Status code: 40", "doc_type":"api", "kw":"Updating a Policy,Policy Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a Policy", "githuburl":"" }, { "uri":"DeletePolicy.html", + "node_id":"deletepolicy.xml", "product_code":"wafd", "code":"22", "des":"This API is used to delete a policy.DELETE /v1/{project_id}/waf/policy/{policy_id}Status code: 200Status code: 400Status code: 401Status code: 500Status code: 200Request ", "doc_type":"api", "kw":"Deleting a Policy,Policy Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Policy", "githuburl":"" }, { "uri":"topic_300000003.html", + "node_id":"topic_300000003.xml", "product_code":"wafd", "code":"23", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Rule Management", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Rule Management", "githuburl":"" }, { "uri":"UpdatePolicyRuleStatus.html", + "node_id":"updatepolicyrulestatus.xml", "product_code":"wafd", "code":"24", - "des":"This API is used to change the status of a policy rule.PUT /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/statusStatus code: 200Status code: 400Status code:", + "des":"This API is used to modify the status of a rule.PUT /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/statusStatus code: 200Status code: 400Status code: 401Sta", "doc_type":"api", - "kw":"Changing the Status of a Policy Rule,Rule Management,API Reference", - "title":"Changing the Status of a Policy Rule", + "kw":"Modifying the Status of a Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Modifying the Status of a Rule", "githuburl":"" }, { "uri":"ListWhiteblackipRules.html", + "node_id":"listwhiteblackiprules.xml", "product_code":"wafd", "code":"25", "des":"This API is used to query the list of blacklist and whitelist rules.GET /v1/{project_id}/waf/policy/{policy_id}/whiteblackipStatus code: 200Status code: 400Status code: 4", "doc_type":"api", "kw":"Querying the Blacklist and Whitelist Rule List,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the Blacklist and Whitelist Rule List", "githuburl":"" }, { "uri":"CreateWhiteblackipRule.html", + "node_id":"createwhiteblackiprule.xml", "product_code":"wafd", "code":"26", "des":"This API is used to create a blacklist or whitelist rule.POST /v1/{project_id}/waf/policy/{policy_id}/whiteblackipStatus code: 200Status code: 400Status code: 401Status c", "doc_type":"api", "kw":"Creating a Blacklist or Whitelist Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Blacklist or Whitelist Rule", "githuburl":"" }, { "uri":"ShowWhiteblackipRule.html", + "node_id":"showwhiteblackiprule.xml", "product_code":"wafd", "code":"27", "des":"This API is used to query a blacklist or whitelist rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}Status code: 200Status code: 400Status cod", "doc_type":"api", - "kw":"Querying a Blacklist Or Whitelist Rule by ID,Rule Management,API Reference", - "title":"Querying a Blacklist Or Whitelist Rule by ID", + "kw":"Querying a Blacklist or Whitelist Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Querying a Blacklist or Whitelist Rule by ID", "githuburl":"" }, { "uri":"UpdateWhiteblackipRule.html", + "node_id":"updatewhiteblackiprule.xml", "product_code":"wafd", "code":"28", "des":"This API is used to update an IP address blacklist or whitelist rule.PUT /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}Status code: 200Status code: 400Sta", "doc_type":"api", "kw":"Updating a Blacklist or Whitelist Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a Blacklist or Whitelist Rule", "githuburl":"" }, { "uri":"DeleteWhiteBlackIpRule.html", + "node_id":"deletewhiteblackiprule.xml", "product_code":"wafd", "code":"29", "des":"This API is used to delete an IP address blacklist or whitelist rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}Status code: 200Status code: 400", "doc_type":"api", "kw":"Deleting a Blacklist or Whitelist Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Blacklist or Whitelist Rule", "githuburl":"" }, { "uri":"ListCcRules.html", + "node_id":"listccrules.xml", "product_code":"wafd", "code":"30", "des":"This API is used to query the list of CC attack protection rules.GET /v1/{project_id}/waf/policy/{policy_id}/ccStatus code: 200Status code: 400Status code: 401Status code", "doc_type":"api", - "kw":"Querying CC Attack Protection Rules,Rule Management,API Reference", - "title":"Querying CC Attack Protection Rules", + "kw":"Query the List of CC Attack Protection Rules,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Query the List of CC Attack Protection Rules", "githuburl":"" }, { "uri":"CreateCcRule.html", + "node_id":"createccrule.xml", "product_code":"wafd", "code":"31", "des":"This API is used to create a CC attack protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/ccStatus code: 200Status code: 400Status code: 401Status code: 500Stat", "doc_type":"api", "kw":"Creating a CC Attack Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a CC Attack Protection Rule", "githuburl":"" }, { "uri":"ShowCcRule.html", + "node_id":"showccrule.xml", "product_code":"wafd", "code":"32", "des":"This API is used to query a CC attack protection rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id}Status code: 200Status code: 400Status code: 401Status", "doc_type":"api", "kw":"Querying a CC Attack Protection Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a CC Attack Protection Rule by ID", "githuburl":"" }, { "uri":"UpdateCcRule.html", + "node_id":"updateccrule.xml", "product_code":"wafd", "code":"33", "des":"This API is used to update a CC attack protection rule.PUT /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id}Status code: 200Status code: 400Status code: 401Status code", "doc_type":"api", "kw":"Updating a CC Attack Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a CC Attack Protection Rule", "githuburl":"" }, { "uri":"DeleteCcRule.html", + "node_id":"deleteccrule.xml", "product_code":"wafd", "code":"34", "des":"This API is used to delete a CC attack protection rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id}Status code: 200Status code: 400Status code: 401Status c", "doc_type":"api", "kw":"Deleting a CC Attack Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a CC Attack Protection Rule", "githuburl":"" }, { "uri":"ListCustomRules.html", + "node_id":"listcustomrules.xml", "product_code":"wafd", "code":"35", "des":"This API is used to query the list of precise protection rules.GET /v1/{project_id}/waf/policy/{policy_id}/customStatus code: 200Status code: 400Status code: 401Status co", "doc_type":"api", - "kw":"Querying Precise Protection Rules,Rule Management,API Reference", - "title":"Querying Precise Protection Rules", + "kw":"Querying the List of Precise Protection Rules,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Querying the List of Precise Protection Rules", "githuburl":"" }, { "uri":"CreateCustomRules.html", + "node_id":"createcustomrules.xml", "product_code":"wafd", "code":"36", - "des":"This API is used to create a precise protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/customStatus code: 200Status code: 400Status code: 401Status code: 500St", + "des":"This API is used to add a precise protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/customStatus code: 200Status code: 400Status code: 401Status code: 500Statu", "doc_type":"api", - "kw":"Creating a Precise Protection Rule,Rule Management,API Reference", - "title":"Creating a Precise Protection Rule", + "kw":"Adding a Precise Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Adding a Precise Protection Rule", "githuburl":"" }, { "uri":"ShowCustomRule.html", + "node_id":"showcustomrule.xml", "product_code":"wafd", "code":"37", "des":"This API is used to query a precise protection rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id}Status code: 200Status code: 400Status code: 401Stat", "doc_type":"api", "kw":"Querying a Precise Protection Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Precise Protection Rule by ID", "githuburl":"" }, { "uri":"UpdateCustomRule.html", + "node_id":"updatecustomrule.xml", "product_code":"wafd", "code":"38", "des":"This API is used to update a precise protection rule.PUT /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id}Status code: 200Status code: 400Status code: 401Status co", "doc_type":"api", "kw":"Updating a Precise Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a Precise Protection Rule", "githuburl":"" }, { "uri":"DeleteCustomRule.html", + "node_id":"deletecustomrule.xml", "product_code":"wafd", "code":"39", "des":"This API is used to delete a precise protection rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id}Status code: 200Status code: 400Status code: 401Status", "doc_type":"api", "kw":"Deleting a Precise Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Precise Protection Rule", "githuburl":"" }, { "uri":"ListAnticrawlerRules.html", + "node_id":"listanticrawlerrules.xml", "product_code":"wafd", "code":"40", "des":"This API is used to query the list of JavaScript anti-crawler rules.GET /v1/{project_id}/waf/policy/{policy_id}/anticrawlerStatus code: 200Status code: 400Status code: 40", "doc_type":"api", "kw":"Querying the JavaScript Anti-Crawler Rule List,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the JavaScript Anti-Crawler Rule List", "githuburl":"" }, { "uri":"CreateAnticrawlerRule.html", + "node_id":"createanticrawlerrule.xml", "product_code":"wafd", "code":"41", "des":"This API is used to create a JavaScript anti-crawler rule.POST /v1/{project_id}/waf/policy/{policy_id}/anticrawlerStatus code: 200Status code: 400Status code: 401Status c", "doc_type":"api", "kw":"Creating a JavaScript Anti-Crawler Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a JavaScript Anti-Crawler Rule", "githuburl":"" }, { "uri":"ShowAnticrawlerRule.html", + "node_id":"showanticrawlerrule.xml", "product_code":"wafd", "code":"42", "des":"This API is used to query a JavaScript anti-crawler rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id}Status code: 200Status code: 400Status cod", "doc_type":"api", "kw":"Querying a JavaScript Anti-Crawler Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a JavaScript Anti-Crawler Rule", "githuburl":"" }, { "uri":"UpdateAnticrawlerRule.html", + "node_id":"updateanticrawlerrule.xml", "product_code":"wafd", "code":"43", "des":"This API is used to update a JavaScript anti-crawler rule.PUT /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id}Status code: 200Status code: 400Status code: 40", "doc_type":"api", "kw":"Updating a JavaScript Anti-Crawler Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a JavaScript Anti-Crawler Rule", "githuburl":"" }, { "uri":"DeleteAnticrawlerRule.html", + "node_id":"deleteanticrawlerrule.xml", "product_code":"wafd", "code":"44", "des":"This API is used to delete a JavaScript anti-crawler rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id}Status code: 200Status code: 400Status code:", "doc_type":"api", "kw":"Deleting a JavaScript Anti-Crawler Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a JavaScript Anti-Crawler Rule", "githuburl":"" }, { "uri":"ListPrivacyRules.html", + "node_id":"listprivacyrules.xml", "product_code":"wafd", "code":"45", "des":"This API is used to query the data masking rule list.GET /v1/{project_id}/waf/policy/{policy_id}/privacyStatus code: 200Status code: 400Status code: 401Status code: 500St", "doc_type":"api", "kw":"Querying the Data Masking Rule List,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the Data Masking Rule List", "githuburl":"" }, { "uri":"CreatePrivacyRules.html", + "node_id":"createprivacyrules.xml", "product_code":"wafd", "code":"46", "des":"This API is used to create a data masking rule.POST /v1/{project_id}/waf/policy/{policy_id}/privacyStatus code: 200Status code: 400Status code: 401Status code: 500Status ", "doc_type":"api", "kw":"Creating a Data Masking Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Data Masking Rule", "githuburl":"" }, { "uri":"ShowPrivacyRule.html", + "node_id":"showprivacyrule.xml", "product_code":"wafd", "code":"47", "des":"This API is used to query a data masking rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id}Status code: 200Status code: 400Status code: 401Status co", "doc_type":"api", "kw":"Querying a Data Masking Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Data Masking Rule by ID", "githuburl":"" }, { "uri":"UpdatePrivacyRule.html", + "node_id":"updateprivacyrule.xml", "product_code":"wafd", "code":"48", "des":"This API is used to update the data masking rule list.PUT /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id}Status code: 200Status code: 400Status code: 401Status ", "doc_type":"api", "kw":"Updating the Data Masking Rule List,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating the Data Masking Rule List", "githuburl":"" }, { "uri":"DeletePrivacyRule.html", + "node_id":"deleteprivacyrule.xml", "product_code":"wafd", "code":"49", "des":"This API is used to delete a data masking rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id}Status code: 200Status code: 400Status code: 401Status code", "doc_type":"api", "kw":"Deleting a Data Masking Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Data Masking Rule", "githuburl":"" }, { "uri":"ListPunishmentRules.html", + "node_id":"listpunishmentrules.xml", "product_code":"wafd", "code":"50", "des":"This API is used to query the list of known attack source rules.GET /v1/{project_id}/waf/policy/{policy_id}/punishmentStatus code: 200Status code: 400Status code: 401Stat", "doc_type":"api", "kw":"Querying the List of Known Attack Source Rules,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the List of Known Attack Source Rules", "githuburl":"" }, { "uri":"CreatePunishmentRules.html", + "node_id":"createpunishmentrules.xml", "product_code":"wafd", "code":"51", - "des":"This API is used to create a known attack source rule.POST /v1/{project_id}/waf/policy/{policy_id}/punishmentStatus code: 200Status code: 400Status code: 401Status code: ", + "des":"Creating a Known Attack Source RulePOST /v1/{project_id}/waf/policy/{policy_id}/punishmentStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 200", "doc_type":"api", "kw":"Creating a Known Attack Source Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Known Attack Source Rule", "githuburl":"" }, { "uri":"ShowPunishmentRule.html", + "node_id":"showpunishmentrule.xml", "product_code":"wafd", "code":"52", "des":"This API is used to query a known attack source rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}Status code: 200Status code: 400Status code: 40", "doc_type":"api", "kw":"Querying a Known Attack Source Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Known Attack Source Rule by ID", "githuburl":"" }, { "uri":"UpdatePunishmentRule.html", + "node_id":"updatepunishmentrule.xml", "product_code":"wafd", "code":"53", "des":"This API is used update a known attack source rule.PUT /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}Status code: 200Status code: 400Status code: 401Status ", "doc_type":"api", "kw":"Updating a Known Attack Source Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a Known Attack Source Rule", "githuburl":"" }, { "uri":"DeletePunishmentRule.html", + "node_id":"deletepunishmentrule.xml", "product_code":"wafd", "code":"54", - "des":"This API is used to delete a known attack source rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}Status code: 200Status code: 400Status code: 401S", + "des":"Deleting a Known Attack Source RuleDELETE /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}Status code: 200Status code: 400Status code: 401Status code: 500Stat", "doc_type":"api", "kw":"Deleting a Known Attack Source Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Known Attack Source Rule", "githuburl":"" }, { "uri":"ListAntitamperRules.html", + "node_id":"listantitamperrules.xml", "product_code":"wafd", "code":"55", "des":"This API is used to query the list of web tamper protection rules.GET /v1/{project_id}/waf/policy/{policy_id}/antitamperStatus code: 200Status code: 400Status code: 401St", "doc_type":"api", "kw":"Querying the List of Web Tamper Protection Rules,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the List of Web Tamper Protection Rules", "githuburl":"" }, { "uri":"CreateAntitamperRule.html", + "node_id":"createantitamperrule.xml", "product_code":"wafd", "code":"56", "des":"This API is used to create a web tamper protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/antitamperStatus code: 200Status code: 400Status code: 401Status code", "doc_type":"api", "kw":"Creating a Web Tamper Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Web Tamper Protection Rule", "githuburl":"" }, { "uri":"ShowAntitamperRule.html", + "node_id":"showantitamperrule.xml", "product_code":"wafd", "code":"57", "des":"This API is used to query a web tamper protection rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}Status code: 200Status code: 400Status code: ", "doc_type":"api", "kw":"Querying a Web Tamper Protection Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Web Tamper Protection Rule by ID", "githuburl":"" }, { "uri":"DeleteAntitamperRule.html", + "node_id":"deleteantitamperrule.xml", "product_code":"wafd", "code":"58", "des":"This API is used to delete a web tamper protection rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}Status code: 200Status code: 400Status code: 40", "doc_type":"api", "kw":"Deleting a Web Tamper Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Web Tamper Protection Rule", "githuburl":"" }, { "uri":"UpdateAntiTamperRuleRefresh.html", + "node_id":"updateantitamperrulerefresh.xml", "product_code":"wafd", "code":"59", - "des":"This API is used to updating the cache for a web tamper protection Rule.POST /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refreshStatus code: 200Status co", + "des":"This API is used to update the cache for a web tamper protection rulePOST /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refreshStatus code: 200Status code:", "doc_type":"api", "kw":"Updating the Cache for a Web Tamper Protection Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating the Cache for a Web Tamper Protection Rule", "githuburl":"" }, { "uri":"ListAntileakageRules.html", + "node_id":"listantileakagerules.xml", "product_code":"wafd", "code":"60", "des":"This API is used to query the list of information leakage prevention rules.GET /v1/{project_id}/waf/policy/{policy_id}/antileakageStatus code: 200Status code: 400Status c", "doc_type":"api", "kw":"Querying the List of Information Leakage Prevention Rules,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the List of Information Leakage Prevention Rules", "githuburl":"" }, { "uri":"CreateAntileakageRules.html", + "node_id":"createantileakagerules.xml", "product_code":"wafd", "code":"61", - "des":"This API is used to create an infroamtion leakage protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/antileakageStatus code: 200Status code: 400Status code: 401", + "des":"This API is used to create an information leakage prevention rule.POST /v1/{project_id}/waf/policy/{policy_id}/antileakageStatus code: 200Status code: 400Status code: 401", "doc_type":"api", - "kw":"Creating an Information Leakage Protection Rule,Rule Management,API Reference", - "title":"Creating an Information Leakage Protection Rule", + "kw":"Creating an Information Leakage Prevention Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Creating an Information Leakage Prevention Rule", "githuburl":"" }, { "uri":"ShowAntileakageRule.html", + "node_id":"showantileakagerule.xml", "product_code":"wafd", "code":"62", "des":"This API is used to query an information leakage prevention rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id}Status code: 200Status code: 400St", "doc_type":"api", "kw":"Querying an Information Leakage Prevention Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying an Information Leakage Prevention Rule by ID", "githuburl":"" }, { "uri":"UpdateAntileakageRule.html", + "node_id":"updateantileakagerule.xml", "product_code":"wafd", "code":"63", "des":"This API is used to update an information leakage prevention rule.PUT /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id}Status code: 200Status code: 400Status ", "doc_type":"api", "kw":"Updating an Information Leakage Prevention Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating an Information Leakage Prevention Rule", "githuburl":"" }, { "uri":"DeleteAntileakageRule.html", + "node_id":"deleteantileakagerule.xml", "product_code":"wafd", "code":"64", "des":"This API is used to delete an information leakage prevention rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id}Status code: 200Status code: 400Stat", "doc_type":"api", "kw":"Deleting an Information Leakage Prevention Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting an Information Leakage Prevention Rule", "githuburl":"" }, { "uri":"ListIgnoreRules.html", + "node_id":"listignorerules.xml", "product_code":"wafd", "code":"65", "des":"This API is used to query the list of false alarm masking rules.GET /v1/{project_id}/waf/policy/{policy_id}/ignoreStatus code: 200Status code: 400Status code: 401Status c", "doc_type":"api", "kw":"Querying the False Alarm Masking Rule List,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the False Alarm Masking Rule List", "githuburl":"" }, { "uri":"CreateIgnoreRule.html", + "node_id":"createignorerule.xml", "product_code":"wafd", "code":"66", "des":"This API is used to create a global protection whitelist (formerly false alarm masking) rule.POST /v1/{project_id}/waf/policy/{policy_id}/ignoreStatus code: 200Status cod", "doc_type":"api", "kw":"Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule,Rule Management,API Refer", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Global Protection Whitelist (Formerly False Alarm Masking) Rule", "githuburl":"" }, { "uri":"ShowIgnoreRule.html", + "node_id":"showignorerule.xml", "product_code":"wafd", "code":"67", "des":"This API is used to querying a global protection whitelist (formerly false alarm masking) rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id}Status co", "doc_type":"api", "kw":"Querying a Global Protection Whitelist (Formerly False Alarm Masking) Rule by ID,Rule Management,API", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Global Protection Whitelist (Formerly False Alarm Masking) Rule by ID", "githuburl":"" }, { "uri":"UpdateIgnoreRule.html", + "node_id":"updateignorerule.xml", "product_code":"wafd", "code":"68", "des":"This API is used to update a global protection whitelist (false alarm masking) rule.PUT /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id}Status code: 200Status cod", "doc_type":"api", "kw":"Updating a Global Protection Whitelist (False Alarm Masking) Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a Global Protection Whitelist (False Alarm Masking) Rule", "githuburl":"" }, { "uri":"DeleteIgnoreRule.html", + "node_id":"deleteignorerule.xml", "product_code":"wafd", "code":"69", "des":"This API is used to deleting a global protection whitelist (false alarm masking) rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id}Status code: 200Statu", "doc_type":"api", "kw":"Deleting a Global Protection Whitelist (False Alarm Masking) Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Global Protection Whitelist (False Alarm Masking) Rule", "githuburl":"" }, { "uri":"ListGeoipRules.html", + "node_id":"listgeoiprules.xml", "product_code":"wafd", "code":"70", "des":"This API is used to query the list of geolocation access control rules.GET /v1/{project_id}/waf/policy/{policy_id}/geoipStatus code: 200Status code: 400Status code: 401St", "doc_type":"api", "kw":"Querying the List of Geolocation Access Control Rules,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the List of Geolocation Access Control Rules", "githuburl":"" }, { "uri":"CreateGeoipRule.html", + "node_id":"creategeoiprule.xml", "product_code":"wafd", "code":"71", "des":"This API is used to create a geolocation access control rule.POST /v1/{project_id}/waf/policy/{policy_id}/geoipStatus code: 200Status code: 400Status code: 401Status code", "doc_type":"api", "kw":"Creating a Geolocation Access Control Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Geolocation Access Control Rule", "githuburl":"" }, { "uri":"ShowGeoipRule.html", + "node_id":"showgeoiprule.xml", "product_code":"wafd", "code":"72", "des":"This API is used to query a geolocation access control rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}Status code: 200Status code: 400Status code: ", "doc_type":"api", "kw":"Querying a Geolocation Access Control Rule by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Geolocation Access Control Rule by ID", "githuburl":"" }, { "uri":"UpdateGeoipRule.html", + "node_id":"updategeoiprule.xml", "product_code":"wafd", "code":"73", "des":"This API is used to update a geolocation access control rule.PUT /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}Status code: 200Status code: 400Status code: 401St", "doc_type":"api", "kw":"Updating a Geolocation Access Control Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Updating a Geolocation Access Control Rule", "githuburl":"" }, { "uri":"DeleteGeoipRule.html", + "node_id":"deletegeoiprule.xml", "product_code":"wafd", "code":"74", "des":"This API is used to delete a geolocation access control rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}Status code: 200Status code: 400Status code: 40", "doc_type":"api", "kw":"Deleting a Geolocation Access Control Rule,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Geolocation Access Control Rule", "githuburl":"" }, { "uri":"ListValueList.html", + "node_id":"listvaluelist.xml", "product_code":"wafd", "code":"75", "des":"This API is used to query the reference table list. A reference table can be referenced by CC attack protection rules and precise protection rules. For details about how ", "doc_type":"api", "kw":"Querying the Reference Table List,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the Reference Table List", "githuburl":"" }, { "uri":"CreateValueList.html", + "node_id":"createvaluelist.xml", "product_code":"wafd", "code":"76", "des":"This API is used to create a reference table. A reference table can be referenced by CC attack protection rules and precise protection rules. For details about how to use", "doc_type":"api", "kw":"Creating a Reference Table,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Reference Table", "githuburl":"" }, { "uri":"ShowValueList.html", + "node_id":"showvaluelist.xml", "product_code":"wafd", "code":"77", - "des":"This API is used to query a reference table.GET /v1/{project_id}/waf/valuelist/{valuelist_id}Status code: 200Status code: 400Status code: 401Status code: 500Status code: ", + "des":"This API is used to query a reference table by ID.GET /v1/{project_id}/waf/valuelist/{valuelist_id}Status code: 200Status code: 400Status code: 401Status code: 500Status ", "doc_type":"api", - "kw":"Querying a Reference Table,Rule Management,API Reference", - "title":"Querying a Reference Table", + "kw":"Querying a Reference Table by ID,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Querying a Reference Table by ID", "githuburl":"" }, { "uri":"UpdateValueList.html", + "node_id":"updatevaluelist.xml", "product_code":"wafd", "code":"78", "des":"This API is used to modify a reference table.PUT /v1/{project_id}/waf/valuelist/{valuelist_id}Status code: 200Status code: 400Status code: 401Status code: 500Status code:", "doc_type":"api", "kw":"Modifying a Reference Table,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Modifying a Reference Table", "githuburl":"" }, { "uri":"DeleteValueList.html", + "node_id":"deletevaluelist.xml", "product_code":"wafd", "code":"79", "des":"This API is used to delete a reference table.DELETE /v1/{project_id}/waf/valuelist/{valuelist_id}Status code: 200Status code: 400Status code: 401Status code: 500Status co", "doc_type":"api", "kw":"Deleting a Reference Table,Rule Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Reference Table", "githuburl":"" }, { "uri":"topic_300000004.html", + "node_id":"topic_300000004.xml", "product_code":"wafd", "code":"80", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Certificate Management", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Certificate Management", "githuburl":"" }, { "uri":"ListCertificates.html", + "node_id":"listcertificates.xml", "product_code":"wafd", "code":"81", "des":"This API is used to query the certificate list.GET /v1/{project_id}/waf/certificateStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 200Request", "doc_type":"api", "kw":"Querying the Certificate List,Certificate Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the Certificate List", "githuburl":"" }, { "uri":"CreateCertificate.html", + "node_id":"createcertificate.xml", "product_code":"wafd", "code":"82", "des":"This API is used to create a certificate.POST /v1/{project_id}/waf/certificateStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 200Request succ", "doc_type":"api", "kw":"Creating a Certificate,Certificate Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Creating a Certificate", "githuburl":"" }, { "uri":"ShowCertificate.html", + "node_id":"showcertificate.xml", "product_code":"wafd", "code":"83", "des":"This API is used to query a certificate.GET /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status code: 400Status code: 401Status code: 500Status code: ", "doc_type":"api", "kw":"Querying a Certificate,Certificate Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying a Certificate", "githuburl":"" }, { - "uri":"DeleteCertificate.html", + "uri":"UpdateCertificate.html", + "node_id":"updatecertificate.xml", "product_code":"wafd", "code":"84", - "des":"This API is used to delete a certificate.DELETE /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status code: 400Status code: 401Status code: 500Status co", + "des":"This API is used to modify a certificate. Note: The certificate in use cannot be updated.PUT /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status code:", + "doc_type":"api", + "kw":"Modifying a Certificate,Certificate Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], + "title":"Modifying a Certificate", + "githuburl":"" + }, + { + "uri":"DeleteCertificate.html", + "node_id":"deletecertificate.xml", + "product_code":"wafd", + "code":"85", + "des":"This API is used to delete a certificate. Note: The certificate in use cannot be deleted.DELETE /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status co", "doc_type":"api", "kw":"Deleting a Certificate,Certificate Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Deleting a Certificate", "githuburl":"" }, { "uri":"topic_300000005.html", + "node_id":"topic_300000005.xml", "product_code":"wafd", - "code":"85", + "code":"86", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Dashboard", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Dashboard", "githuburl":"" }, { "uri":"ListStatistics.html", + "node_id":"liststatistics.xml", "product_code":"wafd", - "code":"86", + "code":"87", "des":"This API is used to query website request statistics.GET /v1/{project_id}/waf/overviews/statisticsStatus code: 200Status code: 400Status code: 401Status code: 500Status c", "doc_type":"api", "kw":"Querying Website Request Statistics,Dashboard,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Website Request Statistics", "githuburl":"" }, { "uri":"ListQpsTimeline.html", + "node_id":"listqpstimeline.xml", "product_code":"wafd", - "code":"87", + "code":"88", "des":"This API is used to query the website QPS statistics.GET /v1/{project_id}/waf/overviews/qps/timelineStatus code: 200Status code: 400Status code: 401Status code: 500Status", "doc_type":"api", "kw":"Querying the QPS Statistics,Dashboard,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the QPS Statistics", "githuburl":"" }, { "uri":"ListBandwidthTimeline.html", + "node_id":"listbandwidthtimeline.xml", "product_code":"wafd", - "code":"88", + "code":"89", "des":"This API is used to query bandwidth usage statistics.GET /v1/{project_id}/waf/overviews/bandwidth/timelineStatus code: 200Status code: 400Status code: 401Status code: 500", "doc_type":"api", "kw":"Querying Bandwidth Usage Statistics,Dashboard,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Bandwidth Usage Statistics", "githuburl":"" }, { "uri":"topic_300000006.html", + "node_id":"topic_300000006.xml", "product_code":"wafd", - "code":"89", + "code":"90", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Event Management", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Event Management", "githuburl":"" }, { "uri":"ListEvent.html", + "node_id":"listevent.xml", "product_code":"wafd", - "code":"90", + "code":"91", "des":"This API is used to query the list of attack events for a specific period.GET /v1/{project_id}/waf/eventStatus code: 200Status code: 400Status code: 401Status code: 500St", "doc_type":"api", "kw":"Querying the List of Attack Events,Event Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying the List of Attack Events", "githuburl":"" }, { "uri":"ShowEvent.html", + "node_id":"showevent.xml", "product_code":"wafd", - "code":"91", + "code":"92", "des":"This API is used to query the details about an attack event.GET /v1/{project_id}/waf/event/{eventid}Status code: 200Status code: 400Status code: 401Status code: 500Status", "doc_type":"api", "kw":"Querying Attack Event Details,Event Management,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "operation_id":"UpgradeInstance", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Querying Attack Event Details", "githuburl":"" }, { "uri":"waf_02_0119.html", + "node_id":"waf_02_0119.xml", "product_code":"wafd", - "code":"92", + "code":"93", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Permissions and Supported Actions", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Permissions and Supported Actions", "githuburl":"" }, { "uri":"waf_02_0129.html", + "node_id":"waf_02_0129.xml", "product_code":"wafd", - "code":"93", + "code":"94", "des":"This chapter describes fine-grained permissions management for your WAF. If your account does not need individual IAM users, then you may skip over this chapter.By defaul", "doc_type":"api", "kw":"Introduction,Permissions and Supported Actions,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Introduction", "githuburl":"" }, { "uri":"waf_02_0139.html", + "node_id":"waf_02_0139.xml", "product_code":"wafd", - "code":"94", + "code":"95", "des":"WAF provides system-defined policies that can be directly used in IAM. You can also create custom policies and use them to supplement system-defined policies, implementin", "doc_type":"api", "kw":"Supported Actions,Permissions and Supported Actions,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Supported Actions", "githuburl":"" }, { "uri":"waf_02_0084.html", + "node_id":"waf_02_0084.xml", "product_code":"wafd", - "code":"95", + "code":"96", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Appendix", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Appendix", "githuburl":"" }, { "uri":"waf_02_0085.html", + "node_id":"waf_02_0085.xml", "product_code":"wafd", - "code":"96", + "code":"97", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Status Codes,Appendix,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Status Codes", "githuburl":"" }, { "uri":"ErrorCode.html", + "node_id":"errorcode_1.xml", "product_code":"wafd", - "code":"97", + "code":"98", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Error Codes,Appendix,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "opensource":"true", + "prodname":"wafd" + } + ], "title":"Error Codes", "githuburl":"" }, { "uri":"waf_02_0086.html", + "node_id":"waf_02_0086.xml", "product_code":"wafd", - "code":"98", + "code":"99", "des":"Character Set Specifications for KeyThe key cannot be left blank or be an empty string.In Deutsche Telekom, a tag key can contain uppercase letters, lowercase letters, di", "doc_type":"api", "kw":"Character Set Specifications,Appendix,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Character Set Specifications", "githuburl":"" }, { "uri":"waf_02_0186.html", + "node_id":"waf_02_0186.xml", "product_code":"wafd", - "code":"99", + "code":"100", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Geographical Location Codes,Appendix,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Geographical Location Codes", "githuburl":"" }, { "uri":"waf_02_0087.html", + "node_id":"waf_02_0087.xml", "product_code":"wafd", - "code":"100", + "code":"101", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"api", "kw":"Change History,API Reference", + "search_title":"", + "metedata":[ + { + "documenttype":"api", + "prodname":"wafd" + } + ], "title":"Change History", "githuburl":"" } diff --git a/docs/wafd/api-ref/CLASS.TXT.json b/docs/wafd/api-ref/CLASS.TXT.json index 4d2bd0e7..3777e6b6 100644 --- a/docs/wafd/api-ref/CLASS.TXT.json +++ b/docs/wafd/api-ref/CLASS.TXT.json @@ -207,9 +207,9 @@ "code":"23" }, { - "desc":"This API is used to change the status of a policy rule.PUT /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/statusStatus code: 200Status code: 400Status code:", + "desc":"This API is used to modify the status of a rule.PUT /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/statusStatus code: 200Status code: 400Status code: 401Sta", "product_code":"wafd", - "title":"Changing the Status of a Policy Rule", + "title":"Modifying the Status of a Rule", "uri":"UpdatePolicyRuleStatus.html", "doc_type":"api", "p_code":"23", @@ -236,7 +236,7 @@ { "desc":"This API is used to query a blacklist or whitelist rule by ID.GET /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}Status code: 200Status code: 400Status cod", "product_code":"wafd", - "title":"Querying a Blacklist Or Whitelist Rule by ID", + "title":"Querying a Blacklist or Whitelist Rule by ID", "uri":"ShowWhiteblackipRule.html", "doc_type":"api", "p_code":"23", @@ -263,7 +263,7 @@ { "desc":"This API is used to query the list of CC attack protection rules.GET /v1/{project_id}/waf/policy/{policy_id}/ccStatus code: 200Status code: 400Status code: 401Status code", "product_code":"wafd", - "title":"Querying CC Attack Protection Rules", + "title":"Query the List of CC Attack Protection Rules", "uri":"ListCcRules.html", "doc_type":"api", "p_code":"23", @@ -308,16 +308,16 @@ { "desc":"This API is used to query the list of precise protection rules.GET /v1/{project_id}/waf/policy/{policy_id}/customStatus code: 200Status code: 400Status code: 401Status co", "product_code":"wafd", - "title":"Querying Precise Protection Rules", + "title":"Querying the List of Precise Protection Rules", "uri":"ListCustomRules.html", "doc_type":"api", "p_code":"23", "code":"35" }, { - "desc":"This API is used to create a precise protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/customStatus code: 200Status code: 400Status code: 401Status code: 500St", + "desc":"This API is used to add a precise protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/customStatus code: 200Status code: 400Status code: 401Status code: 500Statu", "product_code":"wafd", - "title":"Creating a Precise Protection Rule", + "title":"Adding a Precise Protection Rule", "uri":"CreateCustomRules.html", "doc_type":"api", "p_code":"23", @@ -450,7 +450,7 @@ "code":"50" }, { - "desc":"This API is used to create a known attack source rule.POST /v1/{project_id}/waf/policy/{policy_id}/punishmentStatus code: 200Status code: 400Status code: 401Status code: ", + "desc":"Creating a Known Attack Source RulePOST /v1/{project_id}/waf/policy/{policy_id}/punishmentStatus code: 200Status code: 400Status code: 401Status code: 500Status code: 200", "product_code":"wafd", "title":"Creating a Known Attack Source Rule", "uri":"CreatePunishmentRules.html", @@ -477,7 +477,7 @@ "code":"53" }, { - "desc":"This API is used to delete a known attack source rule.DELETE /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}Status code: 200Status code: 400Status code: 401S", + "desc":"Deleting a Known Attack Source RuleDELETE /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}Status code: 200Status code: 400Status code: 401Status code: 500Stat", "product_code":"wafd", "title":"Deleting a Known Attack Source Rule", "uri":"DeletePunishmentRule.html", @@ -522,7 +522,7 @@ "code":"58" }, { - "desc":"This API is used to updating the cache for a web tamper protection Rule.POST /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refreshStatus code: 200Status co", + "desc":"This API is used to update the cache for a web tamper protection rulePOST /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refreshStatus code: 200Status code:", "product_code":"wafd", "title":"Updating the Cache for a Web Tamper Protection Rule", "uri":"UpdateAntiTamperRuleRefresh.html", @@ -540,9 +540,9 @@ "code":"60" }, { - "desc":"This API is used to create an infroamtion leakage protection rule.POST /v1/{project_id}/waf/policy/{policy_id}/antileakageStatus code: 200Status code: 400Status code: 401", + "desc":"This API is used to create an information leakage prevention rule.POST /v1/{project_id}/waf/policy/{policy_id}/antileakageStatus code: 200Status code: 400Status code: 401", "product_code":"wafd", - "title":"Creating an Information Leakage Protection Rule", + "title":"Creating an Information Leakage Prevention Rule", "uri":"CreateAntileakageRules.html", "doc_type":"api", "p_code":"23", @@ -684,9 +684,9 @@ "code":"76" }, { - "desc":"This API is used to query a reference table.GET /v1/{project_id}/waf/valuelist/{valuelist_id}Status code: 200Status code: 400Status code: 401Status code: 500Status code: ", + "desc":"This API is used to query a reference table by ID.GET /v1/{project_id}/waf/valuelist/{valuelist_id}Status code: 200Status code: 400Status code: 401Status code: 500Status ", "product_code":"wafd", - "title":"Querying a Reference Table", + "title":"Querying a Reference Table by ID", "uri":"ShowValueList.html", "doc_type":"api", "p_code":"23", @@ -747,13 +747,22 @@ "code":"83" }, { - "desc":"This API is used to delete a certificate.DELETE /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status code: 400Status code: 401Status code: 500Status co", + "desc":"This API is used to modify a certificate. Note: The certificate in use cannot be updated.PUT /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status code:", + "product_code":"wafd", + "title":"Modifying a Certificate", + "uri":"UpdateCertificate.html", + "doc_type":"api", + "p_code":"80", + "code":"84" + }, + { + "desc":"This API is used to delete a certificate. Note: The certificate in use cannot be deleted.DELETE /v1/{project_id}/waf/certificate/{certificate_id}Status code: 200Status co", "product_code":"wafd", "title":"Deleting a Certificate", "uri":"DeleteCertificate.html", "doc_type":"api", "p_code":"80", - "code":"84" + "code":"85" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -762,7 +771,7 @@ "uri":"topic_300000005.html", "doc_type":"api", "p_code":"2", - "code":"85" + "code":"86" }, { "desc":"This API is used to query website request statistics.GET /v1/{project_id}/waf/overviews/statisticsStatus code: 200Status code: 400Status code: 401Status code: 500Status c", @@ -770,8 +779,8 @@ "title":"Querying Website Request Statistics", "uri":"ListStatistics.html", "doc_type":"api", - "p_code":"85", - "code":"86" + "p_code":"86", + "code":"87" }, { "desc":"This API is used to query the website QPS statistics.GET /v1/{project_id}/waf/overviews/qps/timelineStatus code: 200Status code: 400Status code: 401Status code: 500Status", @@ -779,8 +788,8 @@ "title":"Querying the QPS Statistics", "uri":"ListQpsTimeline.html", "doc_type":"api", - "p_code":"85", - "code":"87" + "p_code":"86", + "code":"88" }, { "desc":"This API is used to query bandwidth usage statistics.GET /v1/{project_id}/waf/overviews/bandwidth/timelineStatus code: 200Status code: 400Status code: 401Status code: 500", @@ -788,8 +797,8 @@ "title":"Querying Bandwidth Usage Statistics", "uri":"ListBandwidthTimeline.html", "doc_type":"api", - "p_code":"85", - "code":"88" + "p_code":"86", + "code":"89" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -798,7 +807,7 @@ "uri":"topic_300000006.html", "doc_type":"api", "p_code":"2", - "code":"89" + "code":"90" }, { "desc":"This API is used to query the list of attack events for a specific period.GET /v1/{project_id}/waf/eventStatus code: 200Status code: 400Status code: 401Status code: 500St", @@ -806,8 +815,8 @@ "title":"Querying the List of Attack Events", "uri":"ListEvent.html", "doc_type":"api", - "p_code":"89", - "code":"90" + "p_code":"90", + "code":"91" }, { "desc":"This API is used to query the details about an attack event.GET /v1/{project_id}/waf/event/{eventid}Status code: 200Status code: 400Status code: 401Status code: 500Status", @@ -815,8 +824,8 @@ "title":"Querying Attack Event Details", "uri":"ShowEvent.html", "doc_type":"api", - "p_code":"89", - "code":"91" + "p_code":"90", + "code":"92" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -825,7 +834,7 @@ "uri":"waf_02_0119.html", "doc_type":"api", "p_code":"", - "code":"92" + "code":"93" }, { "desc":"This chapter describes fine-grained permissions management for your WAF. If your account does not need individual IAM users, then you may skip over this chapter.By defaul", @@ -833,8 +842,8 @@ "title":"Introduction", "uri":"waf_02_0129.html", "doc_type":"api", - "p_code":"92", - "code":"93" + "p_code":"93", + "code":"94" }, { "desc":"WAF provides system-defined policies that can be directly used in IAM. You can also create custom policies and use them to supplement system-defined policies, implementin", @@ -842,8 +851,8 @@ "title":"Supported Actions", "uri":"waf_02_0139.html", "doc_type":"api", - "p_code":"92", - "code":"94" + "p_code":"93", + "code":"95" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -852,7 +861,7 @@ "uri":"waf_02_0084.html", "doc_type":"api", "p_code":"", - "code":"95" + "code":"96" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -860,8 +869,8 @@ "title":"Status Codes", "uri":"waf_02_0085.html", "doc_type":"api", - "p_code":"95", - "code":"96" + "p_code":"96", + "code":"97" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -869,8 +878,8 @@ "title":"Error Codes", "uri":"ErrorCode.html", "doc_type":"api", - "p_code":"95", - "code":"97" + "p_code":"96", + "code":"98" }, { "desc":"Character Set Specifications for KeyThe key cannot be left blank or be an empty string.In Deutsche Telekom, a tag key can contain uppercase letters, lowercase letters, di", @@ -878,8 +887,8 @@ "title":"Character Set Specifications", "uri":"waf_02_0086.html", "doc_type":"api", - "p_code":"95", - "code":"98" + "p_code":"96", + "code":"99" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -887,8 +896,8 @@ "title":"Geographical Location Codes", "uri":"waf_02_0186.html", "doc_type":"api", - "p_code":"95", - "code":"99" + "p_code":"96", + "code":"100" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -897,6 +906,6 @@ "uri":"waf_02_0087.html", "doc_type":"api", "p_code":"", - "code":"100" + "code":"101" } ] \ No newline at end of file diff --git a/docs/wafd/api-ref/CreateAntileakageRules.html b/docs/wafd/api-ref/CreateAntileakageRules.html index 6b7474c7..948e6956 100644 --- a/docs/wafd/api-ref/CreateAntileakageRules.html +++ b/docs/wafd/api-ref/CreateAntileakageRules.html @@ -1,7 +1,7 @@ -
This API is used to create an infroamtion leakage protection rule.
+This API is used to create an information leakage prevention rule.
POST /v1/{project_id}/waf/policy/{policy_id}/antileakage
@@ -98,7 +98,7 @@Sensitive information type in the information leakage prevention rule.
sensitive: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-code: The rule blocks response pages of specified HTTP response code.
+code: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -112,8 +112,8 @@Array of strings
Content corresponding to the sensitive information type. Multiple options can be set.
-When category is set to code, the pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
+Content corresponding to the sensitive information type. Multiple options can be selected.
+When the value of category is code, the returned pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
When category is set to sensitive, parameters phone, id_card, and email can be set.
String
Description
+Rule description.
String
Rule ID
+Rule ID.
url
@@ -161,7 +161,7 @@Sensitive information type in the information leakage prevention rule.
sensitive: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-code: The rule blocks response pages of specified HTTP response code.
+code: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -173,8 +173,8 @@Array of strings
Content corresponding to the sensitive information type. Multiple options can be set.
-When category is set to code, the pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
+Content corresponding to the sensitive information type. Multiple options can be selected.
+When the value of category is code, the returned pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
When category is set to sensitive, parameters phone, id_card, and email can be set.
Long
Timestamp the rule is created.
+Timestamp the rule was created.
description
diff --git a/docs/wafd/api-ref/CreateCcRule.html b/docs/wafd/api-ref/CreateCcRule.html index f4c837c6..cc4920f7 100644 --- a/docs/wafd/api-ref/CreateCcRule.html +++ b/docs/wafd/api-ref/CreateCcRule.html @@ -112,7 +112,7 @@Array of CcCondition objects
Rate limit conditions of the CC protection rule. This parameter is mandatory when the CC protection rule is in advanced mode (i.e. the value of mode is 1).
+Rate limit conditions of the CC attack protection rule. This parameter is mandatory when the CC attack protection rule is in advanced mode (i.e. the value of mode is 1).
action
@@ -150,7 +150,7 @@String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
tag_condition object
User tag. This parameter is mandatory when the rate limit mode is set to other. -other: A website visitor is identified by the Referer field (user-defined request source).
+User tag. This parameter is mandatory when the rate limit mode is set to other. - other: A website visitor is identified by the Referer field (user-defined request source).
limit_num
@@ -198,7 +198,7 @@Integer
Block duration, in seconds. The value ranges from 0 to 65,535. Specifies the period within which access is blocked. An error page is displayed in this period.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
@@ -207,7 +207,7 @@String
Rule description
+Rule description.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
@@ -325,7 +325,7 @@String
Action type:
-captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
+captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
block: WAF blocks the requests. When tag_type is set to other, the value can only be block.
log: WAF logs the event only.
dynamic_block: In the previous rate limit period, if the request frequency exceeds the value of Rate Limit Frequency, the request is blocked. In the next rate limit period, if the request frequency exceeds the value of Permit Frequency, the request is still blocked. Note: The dynamic_block protection action can be set only when the advanced protection mode is enabled for the CC protection rule.
@@ -370,7 +370,7 @@response object
Returned page.
+Returned page
String
When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
+When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
Prefix match: A path ending with * indicates that the path is used as a prefix. For example, to protect /admin/test.php or /adminabc, you can set Path to /admin*.
Exact match: The path you enter must exactly match the path you want to protect. If the path you want to protect is /admin, set url to /admin.
Array of CcCondition objects
Rate limit conditions of the CC protection rule. This parameter is mandatory when the CC protection rule is in advanced mode (i.e. the value of mode is 1).
+Rate limit conditions of the CC attack protection rule. This parameter is mandatory when the CC attack protection rule is in advanced mode (i.e. the value of mode is 1).
action
@@ -542,7 +542,7 @@String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
tag_condition object
User tag. This parameter is mandatory when the rate limit mode is set to other. -other: A website visitor is identified by the Referer field (user-defined request source).
+User tag. This parameter is mandatory when the rate limit mode is set to other. - other: A website visitor is identified by the Referer field (user-defined request source).
limit_num
@@ -580,14 +580,14 @@Integer
Block duration, in seconds. The value ranges from 0 to 65,535. Specifies the period within which access is blocked. An error page is displayed in this period.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
String
Rule description
+Rule description.
total_num
@@ -622,7 +622,7 @@Long
Timestamp the rule is created.
+Timestamp the rule was created.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
@@ -724,7 +724,7 @@String
Action type:
-captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
+captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
block: WAF blocks the requests. When tag_type is set to other, the value can only be block.
log: WAF logs the event only.
dynamic_block: In the previous rate limit period, if the request frequency exceeds the value of Rate Limit Frequency, the request is blocked. In the next rate limit period, if the request frequency exceeds the value of Permit Frequency, the request is still blocked. Note: The dynamic_block protection action can be set only when the advanced protection mode is enabled for the CC protection rule.
diff --git a/docs/wafd/api-ref/CreateCertificate.html b/docs/wafd/api-ref/CreateCertificate.html index 902f135b..ca456675 100644 --- a/docs/wafd/api-ref/CreateCertificate.html +++ b/docs/wafd/api-ref/CreateCertificate.html @@ -78,7 +78,7 @@String
Certificate name. The value can contain a maximum of 64 characters. Only digits, letters, hyphens (-), underscores (_), and periods (.) are allowed.
+Certificate name. Only digits, letters, hyphens (-), underscores (_), and periods (.) are allowed. The value can contain a maximum of 256 characters.
content
@@ -131,7 +131,7 @@Long
Timestamp when the certificate expires
+Timestamp when the certificate expires (unit: ms).
timestamp
@@ -141,6 +141,13 @@Timestamp when the certificate is uploaded
cert_type
+String
+Certificate type. This parameter is redundant and can be ignored.
+This API is used to create a precise protection rule.
+This API is used to add a precise protection rule.
POST /v1/{project_id}/waf/policy/{policy_id}/custom
@@ -117,7 +117,7 @@String
Rule description
+Rule description.
conditions
@@ -188,7 +188,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
Rule description
+Rule description.
status
@@ -435,7 +435,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
diff --git a/docs/wafd/api-ref/CreateInstance.html b/docs/wafd/api-ref/CreateInstance.html index 4e697a07..fb94dd4e 100644 --- a/docs/wafd/api-ref/CreateInstance.html +++ b/docs/wafd/api-ref/CreateInstance.html @@ -116,7 +116,7 @@Specifications of the dedicated engine version. The value can be waf.instance.enterprise or waf.instance.professional.
waf.instance.professional: WI-100. Performance: 100 Mbit/s of throughput and 2,000 QPS.
-waf.instance.enterprise: WI-100. Performance: 500 Mbit/s of throughput and 10,000 QPS.
+waf.instance.enterprise: WI-500. Performance: 500 Mbit/s of throughput and 10,000 QPS.
Enumeration values:
waf.instance.professional
@@ -130,7 +130,7 @@String
ID of the specifications of the ECS hosting the dedicated engine. You can go to the management console and confirm supported specifications.
+ECS specifications and the dedicated WAF instance specifications. You can view details about the supported specifications on the WAF console.
vpc_id
@@ -175,7 +175,7 @@Boolean
Whether to create a dedicated engine instance of the network interface type. Its value has to be true.
+Whether the dedicated WAF instance is network interface type. The value is fixed at Network Interface.
Network Interface: Your WAF instance will be connected to your network via a VPC. (If ELB is used, only dedicated load balancers can be used.)
Enumeration values:
@@ -183,6 +183,15 @@ipv6_enable
+No
+Boolean
+Use of IPv6 addresses. If IPv6 address is enabled, the system assigns an IPv6 address to the dedicated instance.
+String
id
+the id of dedicated WAF engines.
name
String
Name
+the name of dedicated WAF engines.
Status code: 200
diff --git a/docs/wafd/api-ref/CreatePolicy.html b/docs/wafd/api-ref/CreatePolicy.html index 8e6e8c9b..588d4add 100644 --- a/docs/wafd/api-ref/CreatePolicy.html +++ b/docs/wafd/api-ref/CreatePolicy.html @@ -176,7 +176,7 @@ModulexOptions object
Whether to enable intelligent CC protection. This parameter is reserved and can be ignored currently.
+Whether to enabling intelligent CC protection. This parameter is reserved and can be ignored currently.
timestamp
@@ -228,7 +228,7 @@Boolean
Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enabled any of these checks, keep this parameter enabled first. The value can be:
+Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enable any of these checks, keep this parameter enabled first. The value can be:
true: enabled
false: disabled
Boolean
JavaScript anti-crawler function.
+Whether to enable the JavaScript anti-crawler function.
true: Enabled
false: Disabled
Protection statuses for advanced settings in basic web protection. By default, this parameter is left blank, and the Deep Inspection and Header Inspection are disabled.
If deep_decode is set to true, the Deep Inspection is enabled.
If check_all_headers is set to true, the Header Inspection is enabled.
-If deep_decode and check_all_headers are set to false, the Deep Inspection and Header Inspection are disabled.
+If deep_decode and check_all_headers are set to true, the Deep Inspection and Header Inspection are disabled.
String
Protection mode of the global rate limiting function.
-log: WAF logs the event only.
-block: WAF blocks requests.
+Protection mode of the global rate limiting function. WAF logs the event only.
+block: WAF blocks requests.
Enumeration values:
log
@@ -583,8 +582,7 @@String
Management mode of the intelligent precise protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -596,8 +594,7 @@String
Aging mode of the intelligent precise protection.
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+auto: Automatic
Enumeration values:
auto
@@ -640,8 +637,7 @@String
Management mode of the intelligent CC attack protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -652,9 +648,8 @@String
Aging mode of the intelligent CC attack protection..
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+Aging mode of the intelligent CC attack protection.
+auto: Automatic
Enumeration values:
auto
diff --git a/docs/wafd/api-ref/CreatePremiumHost.html b/docs/wafd/api-ref/CreatePremiumHost.html index 11c6c719..f801e250 100644 --- a/docs/wafd/api-ref/CreatePremiumHost.html +++ b/docs/wafd/api-ref/CreatePremiumHost.html @@ -101,7 +101,7 @@proxy
Yes
+No
Boolean
server
Yes
+No
Array of PremiumWafServer objects
Server configuration in dedicated mode
+Server configuration in dedicated mode.
web_tag
@@ -474,7 +474,7 @@String
Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Template type. The value can be:
-default: The default block page is returned when a request is blocked.
-custom: Your custom block page is returned when a request is blocked.
-redirect: The request is redirected to the URL you specify.
+Template type, the value can be:
+default: The default block page.
+custom: Your custom block page is returned when a request is blocked. The request is redirected to the URL you specify.
CustomPage object
Custom alarm page
+Custom alarm page.
redirect_url
String
Redirection URL
+Redirect URL. The root domain name of the redirection address must be the name of the currently protected domain (including a wildcard domain name).${http_host} can be used to indicate the currently protected domain name and port, for example, ${http_host}/error.html.
String
Content type of alarm page
+Content type of alarm page.
content
String
Page content
+Page content.
This API is used to create a known attack source rule.
+Creating a Known Attack Source Rule
POST /v1/{project_id}/waf/policy/{policy_id}/punishment
@@ -87,7 +87,7 @@String
Type of the know attack source rule.
+Type of the known attack source rule.
Enumeration values:
long_ip_block
long_cookie_block
@@ -113,7 +113,7 @@String
Description
+Rule description.
String
Rule ID
+Rule ID.
policyid
String
Policy ID
+Policy ID.
block_time
@@ -155,21 +155,21 @@String
Type of the know attack source rule.
+Type of the known attack source rule.
description
String
Description
+Rule description.
timestamp
Long
Timestamp the rule is created.
+Timestamp the rule was created.
Array of strings
Value of the reference table
+The contents of condition matching of the rules, such as CC Attack Protection Rule or Precise Protection Rule.
Array of strings
Value of the reference table
+The contents of condition matching of the rules, such as CC Attack Protection Rule or Precise Protection Rule.
description
String
Reference table description
+Reference table description.
producer
diff --git a/docs/wafd/api-ref/DeleteAntileakageRule.html b/docs/wafd/api-ref/DeleteAntileakageRule.html index 32017495..44437fd3 100644 --- a/docs/wafd/api-ref/DeleteAntileakageRule.html +++ b/docs/wafd/api-ref/DeleteAntileakageRule.html @@ -94,7 +94,7 @@String
Rule ID
+Rule ID.
url
@@ -110,7 +110,7 @@Sensitive information type in the information leakage prevention rule.
sensitive: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-code: The rule blocks response pages of specified HTTP response code.
+code: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -122,8 +122,8 @@Array of strings
Content corresponding to the sensitive information type. Multiple options can be set.
-When category is set to code, the pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
+Content corresponding to the sensitive information type. Multiple options can be selected.
+When the value of category is code, the returned pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
When category is set to sensitive, parameters phone, id_card, and email can be set.
Long
Timestamp the rule is created.
+Timestamp the rule was created.
description
diff --git a/docs/wafd/api-ref/DeleteCcRule.html b/docs/wafd/api-ref/DeleteCcRule.html index cb5cb359..a9fdf1e6 100644 --- a/docs/wafd/api-ref/DeleteCcRule.html +++ b/docs/wafd/api-ref/DeleteCcRule.html @@ -108,7 +108,7 @@String
When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
+When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
Prefix match: A path ending with * indicates that the path is used as a prefix. For example, to protect /admin/test.php or /adminabc, you can set Path to /admin*.
Exact match: The path you enter must exactly match the path you want to protect. If the path you want to protect is /admin, set url to /admin.
String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
Integer
Block duration, in seconds. The value ranges from 0 to 65,535. Specifies the period within which access is blocked. An error page is displayed in this period.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
String
Rule description
+Rule description.
total_num
@@ -256,7 +256,7 @@Long
Time the rule is created.
+Timestamp the rule was created.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
diff --git a/docs/wafd/api-ref/DeleteCertificate.html b/docs/wafd/api-ref/DeleteCertificate.html index ec58953c..cf63c632 100644 --- a/docs/wafd/api-ref/DeleteCertificate.html +++ b/docs/wafd/api-ref/DeleteCertificate.html @@ -1,7 +1,7 @@This API is used to delete a certificate.
+This API is used to delete a certificate. Note: The certificate in use cannot be deleted.
DELETE /v1/{project_id}/waf/certificate/{certificate_id}
@@ -99,7 +99,7 @@Long
Timestamp when the certificate expires
+Timestamp when the certificate expires (unit: ms).
timestamp
@@ -109,6 +109,13 @@Timestamp when the certificate is uploaded
cert_type
+String
+Certificate type. This parameter is redundant and can be ignored.
+String
Rule description
+Rule description.
status
@@ -207,7 +207,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
AZ ID.
+available_zone ID.
arch
@@ -127,7 +127,7 @@String
ECS specification ID
+ECS specifications and the dedicated WAF instance specifications. You can view details about the supported specifications on the WAF console.
vpc_id
@@ -155,7 +155,7 @@String
IPv6 address of the service plane of the dedicated engine
+IPv6 address of the dedicated WAF instance on the service plane. This parameter is displayed when ipv6_enable is set to true.
security_group_ids
@@ -242,7 +242,7 @@String
ID of the ECS hosting the dedicated engine. This parameter is the same as server_id, and will be deleted.
+ID of the ECS housing the dedicated engine. This parameter can be ignored because it is the same as server_id.
create_time
@@ -263,7 +263,7 @@Integer
Type of the dedicated WAF instance. Its value is always 1, which means the type of the dedicated WAF instance is Network Interface.
+Type of the dedicated WAF instance If the type is Network Interface, the value is 1.
DELETE https://{endpoint}z/v1/{project_id}/premium-waf/instance/{instance_id}+
DELETE https://{endpoint}/v1/{project_id}/premium-waf/instance/{instance_id}
Status code: 200
Request succeeded.
diff --git a/docs/wafd/api-ref/DeletePolicy.html b/docs/wafd/api-ref/DeletePolicy.html index e3d3e1d3..21f856fd 100644 --- a/docs/wafd/api-ref/DeletePolicy.html +++ b/docs/wafd/api-ref/DeletePolicy.html @@ -115,7 +115,7 @@Protection level
1: WAF detects wget, cURL, and more but does not detect XSS and command injection attacks in the header, so you may miss more vulnerabilities that actually exist. If you find out that configured protection rules are affecting your services, adjust the protection level to 1.
-2: WAF detects remote file inclusion, third-party software vulnerabilities, web shell and ftp commands. This is the default value.
+2: Medium. WAF detects remote file inclusion, third-party software vulnerabilities, web shell, and cp and ftp commands. This is the default value.
3: If you need a stricter protection level, set this parameter to 3. This may increase the false positive rate but decrease the false negative rate, such as nc, nmap, and kill.
Integer
Time a policy is created
+Time the policy was created.
Boolean
Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enabled any of these checks, keep this parameter enabled first. The value can be:
+Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enable any of these checks, keep this parameter enabled first. The value can be:
true: enabled
false: disabled
Boolean
JavaScript anti-crawler function.
+Whether to enable the JavaScript anti-crawler function.
true: Enabled
false: Disabled
Protection statuses for advanced settings in basic web protection. By default, this parameter is left blank, and the Deep Inspection and Header Inspection are disabled.
If deep_decode is set to true, the Deep Inspection is enabled.
If check_all_headers is set to true, the Header Inspection is enabled.
-If deep_decode and check_all_headers are set to false, the Deep Inspection and Header Inspection are disabled.
+If deep_decode and check_all_headers are set to true, the Deep Inspection and Header Inspection are disabled.
String
Protection mode of the global rate limiting function.
-log: WAF logs the event only.
-block: WAF blocks requests.
+Protection mode of the global rate limiting function. WAF logs the event only.
+block: WAF blocks requests.
Enumeration values:
log
@@ -562,8 +561,7 @@String
Management mode of the intelligent precise protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -575,8 +573,7 @@String
Aging mode of the intelligent precise protection.
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+auto: Automatic
Enumeration values:
auto
@@ -619,8 +616,7 @@String
Management mode of the intelligent CC attack protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -631,9 +627,8 @@String
Aging mode of the intelligent CC attack protection..
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+Aging mode of the intelligent CC attack protection.
+auto: Automatic
Enumeration values:
auto
diff --git a/docs/wafd/api-ref/DeletePremiumHost.html b/docs/wafd/api-ref/DeletePremiumHost.html index bb525f81..21e4d4bf 100644 --- a/docs/wafd/api-ref/DeletePremiumHost.html +++ b/docs/wafd/api-ref/DeletePremiumHost.html @@ -211,7 +211,7 @@String
Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
This API is used to delete a known attack source rule.
+Deleting a Known Attack Source Rule
DELETE /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}
@@ -94,14 +94,14 @@String
Rule ID
+Rule ID.
policyid
String
Policy ID
+Policy ID.
block_time
@@ -115,7 +115,7 @@String
Type of the know attack source rule.
+Type of the known attack source rule.
Enumeration values:
long_ip_block
long_cookie_block
@@ -130,14 +130,14 @@String
Description
+Rule description.
timestamp
Long
Timestamp the rule is created.
+Timestamp the rule was created.
400
WAF.00011016
+name.duplicate
+Duplicated name.
+Change the name.
+400
+WAF.00012001
invalid.token
diff --git a/docs/wafd/api-ref/ListAntileakageRules.html b/docs/wafd/api-ref/ListAntileakageRules.html index da65eed7..1bc6a5c8 100644 --- a/docs/wafd/api-ref/ListAntileakageRules.html +++ b/docs/wafd/api-ref/ListAntileakageRules.html @@ -143,7 +143,7 @@String
Rule ID
+Rule ID.
url
@@ -159,7 +159,7 @@Sensitive information type in the information leakage prevention rule.
sensitive: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-code: The rule blocks response pages of specified HTTP response code.
+code: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -171,8 +171,8 @@Array of strings
Content corresponding to the sensitive information type. Multiple options can be set.
-When category is set to code, the pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
+Content corresponding to the sensitive information type. Multiple options can be selected.
+When the value of category is code, the returned pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
When category is set to sensitive, parameters phone, id_card, and email can be set.
Long
Timestamp the rule is created.
+Timestamp the rule was created.
description
diff --git a/docs/wafd/api-ref/ListBandwidthTimeline.html b/docs/wafd/api-ref/ListBandwidthTimeline.html index 65136390..1435f4f2 100644 --- a/docs/wafd/api-ref/ListBandwidthTimeline.html +++ b/docs/wafd/api-ref/ListBandwidthTimeline.html @@ -80,10 +80,10 @@String
Data aggregation interval. If this parameter is not specified, data is displayed by a time range calculated based on parameters from and to.
+Data aggregation interval. Data display time range. For example, If the value is DAY, data is displayed by the day. If this parameter is not specified, data is displayed by a time range specified by parameters from and to.
If the time range between from and to is fewer than or equal to 1 day, the interval is one minute.
If the time range between from and to is greater than 1 day but fewer than or equal to 3 days, the interval is 5 minutes.
-If the time range between from and to is greater than 3 days but fewer than or equal 7 days, the interval is 10 minutes.
+If the time range between from and to is greater than 3 days but fewer than or equal to 7 days, the interval is 10 minutes.
If the time range between from and to is greater than 7 days but fewer than or equal to 30 days, the interval is 1 hour.
Integer
Quantity. Aggregated data is returned.
+Quantity. Aggregated data is returned. The num field indicates the statistical value between the time point and the previous time point.
This API is used to query the list of CC attack protection rules.
GET /v1/{project_id}/waf/policy/{policy_id}/cc
@@ -158,7 +158,7 @@String
When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
+When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
Prefix match: A path ending with * indicates that the path is used as a prefix. For example, to protect /admin/test.php or /adminabc, you can set Path to /admin*.
Exact match: The path you enter must exactly match the path you want to protect. If the path you want to protect is /admin, set url to /admin.
Array of CcCondition objects
Rate limit conditions of the CC protection rule. This parameter is mandatory when the CC protection rule is in advanced mode (i.e. the value of mode is 1).
+Rate limit conditions of the CC attack protection rule. This parameter is mandatory when the CC attack protection rule is in advanced mode (i.e. the value of mode is 1).
action
@@ -226,7 +226,7 @@String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
tag_condition object
User tag. This parameter is mandatory when the rate limit mode is set to other. -other: A website visitor is identified by the Referer field (user-defined request source).
+User tag. This parameter is mandatory when the rate limit mode is set to other. - other: A website visitor is identified by the Referer field (user-defined request source).
limit_num
@@ -264,14 +264,14 @@Integer
Block duration, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
String
Rule description
+Rule description.
total_num
@@ -306,7 +306,7 @@Long
Time the rule is created.
+Timestamp the rule was created.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
diff --git a/docs/wafd/api-ref/ListCertificates.html b/docs/wafd/api-ref/ListCertificates.html index f97ba1e7..86cae600 100644 --- a/docs/wafd/api-ref/ListCertificates.html +++ b/docs/wafd/api-ref/ListCertificates.html @@ -199,7 +199,7 @@Long
Timestamp when the certificate expire. This parameter is returned in the response body only when the value of host in the URL request is true.
+Timestamp when the certificate expires (unit: ms). This parameter is returned in the response body only when the value of host in the URL request is true.
exp_status
@@ -227,6 +227,27 @@Domain name associated with the certificate. This parameter is returned in the response body only when the value of host in the URL request is true.
enterprise_project_id
+String
+Enterprise project ID.
+share_status
+Integer
+Sharing status. This parameter is redundant and can be ignored.
+cert_type
+String
+Certificate type. This parameter is redundant and can be ignored.
+This API is used to query the list of precise protection rules.
GET /v1/{project_id}/waf/policy/{policy_id}/custom
@@ -257,7 +257,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
Protective action
+Protective action. The value can be:
+log
+block
+captcha
+request_line
@@ -298,7 +302,7 @@Integer
The time of the WAF service processing the request.
+The time of the WAF service processing the request, in milliseconds.
region
@@ -319,14 +323,14 @@Long
Time to response
+Backend server response time.
response_size
Integer
Response body size
+Response body size, in bytes.
response_body
diff --git a/docs/wafd/api-ref/ListInstance.html b/docs/wafd/api-ref/ListInstance.html index 690a82b6..e932d9d3 100644 --- a/docs/wafd/api-ref/ListInstance.html +++ b/docs/wafd/api-ref/ListInstance.html @@ -174,7 +174,7 @@String
AZ ID.
+available_zone ID.
arch
@@ -188,7 +188,7 @@String
ECS specification ID
+ECS specifications and the dedicated WAF instance specifications. You can view details about the supported specifications on the WAF console.
vpc_id
@@ -216,7 +216,7 @@String
IPv6 address of the service plane of the dedicated engine
+IPv6 address of the dedicated WAF instance on the service plane. This parameter is displayed when ipv6_enable is set to true.
security_group_ids
@@ -310,7 +310,7 @@String
ID of the ECS hosting the dedicated engine. This parameter is the same as server_id, and will be deleted.
+ID of the ECS housing the dedicated engine. This parameter can be ignored because it is the same as server_id.
create_time
@@ -331,7 +331,7 @@Integer
Type of the dedicated WAF instance. Its value is always 1, which means the type of the dedicated WAF instance is Network Interface.
+Type of the dedicated WAF instance If the type is Network Interface, the value is 1.
ModulexOptions object
Whether to enable intelligent CC protection. This parameter is reserved and can be ignored currently.
+Whether to enabling intelligent CC protection. This parameter is reserved and can be ignored currently.
timestamp
@@ -273,7 +273,7 @@Boolean
Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enabled any of these checks, keep this parameter enabled first. The value can be:
+Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enable any of these checks, keep this parameter enabled first. The value can be:
true: enabled
false: disabled
Boolean
JavaScript anti-crawler function.
+Whether to enable the JavaScript anti-crawler function.
true: Enabled
false: Disabled
Protection statuses for advanced settings in basic web protection. By default, this parameter is left blank, and the Deep Inspection and Header Inspection are disabled.
If deep_decode is set to true, the Deep Inspection is enabled.
If check_all_headers is set to true, the Header Inspection is enabled.
-If deep_decode and check_all_headers are set to false, the Deep Inspection and Header Inspection are disabled.
+If deep_decode and check_all_headers are set to true, the Deep Inspection and Header Inspection are disabled.
String
Protection mode of the global rate limiting function.
-log: WAF logs the event only.
-block: WAF blocks requests.
+Protection mode of the global rate limiting function. WAF logs the event only.
+block: WAF blocks requests.
Enumeration values:
log
@@ -628,8 +627,7 @@String
Management mode of the intelligent precise protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -641,8 +639,7 @@String
Aging mode of the intelligent precise protection.
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+auto: Automatic
Enumeration values:
auto
@@ -685,8 +682,7 @@String
Management mode of the intelligent CC attack protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -697,9 +693,8 @@String
Aging mode of the intelligent CC attack protection..
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+Aging mode of the intelligent CC attack protection.
+auto: Automatic
Enumeration values:
auto
diff --git a/docs/wafd/api-ref/ListPremiumHost.html b/docs/wafd/api-ref/ListPremiumHost.html index 70ff307a..d83b6ac2 100644 --- a/docs/wafd/api-ref/ListPremiumHost.html +++ b/docs/wafd/api-ref/ListPremiumHost.html @@ -232,6 +232,13 @@This parameter includes some extended information about the protected domain name.
vpc_ids
+Array of strings
+ID of the VPC where the dedicated WAF instance locates.
+String
Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Rule ID
+Rule ID.
policyid
String
Policy ID
+Policy ID.
block_time
@@ -164,21 +164,21 @@String
Type of the know attack source rule.
+Type of the known attack source rule.
description
String
Description
+Rule description.
timestamp
Long
Timestamp the rule is created.
+Timestamp the rule was created.
String
How the queried data is displayed. The data can be displayed by the day or by the minute. For example, if the value is set to DAY, data is displayed by the day. By default, this parameter is not included, and data is displayed by the minute.
+Data aggregation interval. Data display time range. For example, If the value is DAY, data is displayed by the day. If this parameter is not specified, data is displayed by a time range specified by parameters from and to. - If the time range between from and to is fewer than or equal to 1 day, the interval is one minute.
+If the time range between from and to is greater than 1 day but fewer than or equal to 3 days, the interval is 5 minutes.
+If the time range between from and to is greater than 3 days but fewer than or equal to 7 days, the interval is 10 minutes.
+If the time range between from and to is greater than 7 days but fewer than or equal to 30 days, the interval is 1 hour.
+Content-Type
Yes
+No
String
Integer
Quantity. Aggregated data is returned.
+Quantity. Aggregated data is returned. The num field indicates the statistical value between the time point and the previous time point.
CC: CC attacks identified
WEB_ATTACK: Attacks blocked against basic web protection
PRECISE: Attacks blocked against precise protection rules
-TOTAL_ATTACK: Total number of attacks
+ATTACK: Total number of attacks
Integer
Quantity
+The value of the statistical data corresponding to the key in the query interval.
Array of ValueList objects
Reference table list
+Array Length: 0 - 10
Array of strings
Value of the reference table
+The contents of condition matching of the rules, such as CC Attack Protection Rule or Precise Protection Rule.
producer
diff --git a/docs/wafd/api-ref/RenameInstance.html b/docs/wafd/api-ref/RenameInstance.html index 0c08f38b..bca500de 100644 --- a/docs/wafd/api-ref/RenameInstance.html +++ b/docs/wafd/api-ref/RenameInstance.html @@ -136,7 +136,7 @@String
AZ ID.
+available_zone ID.
arch
@@ -150,7 +150,7 @@String
ECS specification ID
+ECS specifications and the dedicated WAF instance specifications. You can view details about the supported specifications on the WAF console.
vpc_id
@@ -178,7 +178,7 @@String
IPv6 address of the service plane of the dedicated engine
+IPv6 address of the dedicated WAF instance on the service plane. This parameter is displayed when ipv6_enable is set to true.
security_group_ids
@@ -265,7 +265,7 @@String
ID of the ECS hosting the dedicated engine. This parameter is the same as server_id, and will be deleted.
+ID of the ECS housing the dedicated engine. This parameter can be ignored because it is the same as server_id.
create_time
@@ -286,7 +286,7 @@Integer
Type of the dedicated WAF instance. Its value is always 1, which means the type of the dedicated WAF instance is Network Interface.
+Type of the dedicated WAF instance If the type is Network Interface, the value is 1.
String
Rule ID
+Rule ID.
url
@@ -110,7 +110,7 @@Sensitive information type in the information leakage prevention rule.
sensitive: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-code: The rule blocks response pages of specified HTTP response code.
+code: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -122,8 +122,8 @@Array of strings
Content corresponding to the sensitive information type. Multiple options can be set.
-When category is set to code, the pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
+Content corresponding to the sensitive information type. Multiple options can be selected.
+When the value of category is code, the returned pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
When category is set to sensitive, parameters phone, id_card, and email can be set.
Long
Timestamp the rule is created.
+Timestamp the rule was created.
description
diff --git a/docs/wafd/api-ref/ShowCcRule.html b/docs/wafd/api-ref/ShowCcRule.html index 6c05efda..a2a04fb4 100644 --- a/docs/wafd/api-ref/ShowCcRule.html +++ b/docs/wafd/api-ref/ShowCcRule.html @@ -108,7 +108,7 @@String
When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
+When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
Prefix match: A path ending with * indicates that the path is used as a prefix. For example, to protect /admin/test.php or /adminabc, you can set Path to /admin*.
Exact match: The path you enter must exactly match the path you want to protect. If the path you want to protect is /admin, set url to /admin.
Array of CcCondition objects
Rate limit conditions of the CC protection rule. This parameter is mandatory when the CC protection rule is in advanced mode (i.e. the value of mode is 1).
+Rate limit conditions of the CC attack protection rule. This parameter is mandatory when the CC attack protection rule is in advanced mode (i.e. the value of mode is 1).
action
@@ -176,7 +176,7 @@String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
tag_condition object
User tag. This parameter is mandatory when the rate limit mode is set to other. -other: A website visitor is identified by the Referer field (user-defined request source).
+User tag. This parameter is mandatory when the rate limit mode is set to other. - other: A website visitor is identified by the Referer field (user-defined request source).
limit_num
@@ -214,14 +214,14 @@Integer
Block duration, in seconds. The value ranges from 0 to 65,535. Specifies the period within which access is blocked. An error page is displayed in this period.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
String
Rule description
+Rule description.
total_num
@@ -256,7 +256,7 @@Long
Time the rule is created.
+Timestamp the rule was created.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
@@ -358,7 +358,7 @@String
Action type:
-captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
+captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
block: WAF blocks the requests. When tag_type is set to other, the value can only be block.
log: WAF logs the event only.
dynamic_block: In the previous rate limit period, if the request frequency exceeds the value of Rate Limit Frequency, the request is blocked. In the next rate limit period, if the request frequency exceeds the value of Permit Frequency, the request is still blocked. Note: The dynamic_block protection action can be set only when the advanced protection mode is enabled for the CC protection rule.
diff --git a/docs/wafd/api-ref/ShowCertificate.html b/docs/wafd/api-ref/ShowCertificate.html index cdf4e75e..847512cd 100644 --- a/docs/wafd/api-ref/ShowCertificate.html +++ b/docs/wafd/api-ref/ShowCertificate.html @@ -113,7 +113,7 @@Long
Timestamp when the certificate expire
+Timestamp when the certificate expires (unit: ms).
timestamp
@@ -127,7 +127,14 @@Array of BindHost objects
Domain name associated with the certificate
+Domain name associated with the certificate.
+cert_type
+String
+Certificate type. This parameter is redundant and can be ignored.
String
Rule description
+Rule description.
status
@@ -219,7 +219,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
Protective action
+Protective action. The value can be:
+log
+block
+captcha
+request_line
@@ -232,7 +236,7 @@Integer
The time of the WAF service processing the request.
+The time of the WAF service processing the request, in milliseconds.
region
@@ -253,14 +257,14 @@Long
Time to response
+Backend server response time.
response_size
Integer
Response body size
+Response body size, in bytes.
response_body
diff --git a/docs/wafd/api-ref/ShowInstance.html b/docs/wafd/api-ref/ShowInstance.html index d792c86d..e49900df 100644 --- a/docs/wafd/api-ref/ShowInstance.html +++ b/docs/wafd/api-ref/ShowInstance.html @@ -113,7 +113,7 @@String
AZ ID.
+available_zone ID.
arch
@@ -127,7 +127,7 @@String
ECS specification ID
+ECS specifications and the dedicated WAF instance specifications. You can view details about the supported specifications on the WAF console.
vpc_id
@@ -155,7 +155,7 @@String
IPv6 address of the service plane of the dedicated engine
+IPv6 address of the dedicated WAF instance on the service plane. This parameter is displayed when ipv6_enable is set to true.
security_group_ids
@@ -242,7 +242,7 @@String
ID of the ECS hosting the dedicated engine. This parameter is the same as server_id, and will be deleted.
+ID of the ECS housing the dedicated engine. This parameter can be ignored because it is the same as server_id.
create_time
@@ -263,7 +263,7 @@Integer
Type of the dedicated WAF instance. Its value is always 1, which means the type of the dedicated WAF instance is Network Interface.
+Type of the dedicated WAF instance If the type is Network Interface, the value is 1.
ModulexOptions object
Whether to enable intelligent CC protection. This parameter is reserved and can be ignored currently.
+Whether to enabling intelligent CC protection. This parameter is reserved and can be ignored currently.
timestamp
@@ -221,7 +221,7 @@Boolean
Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enabled any of these checks, keep this parameter enabled first. The value can be:
+Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enable any of these checks, keep this parameter enabled first. The value can be:
true: enabled
false: disabled
Boolean
JavaScript anti-crawler function.
+Whether to enable the JavaScript anti-crawler function.
true: Enabled
false: Disabled
Protection statuses for advanced settings in basic web protection. By default, this parameter is left blank, and the Deep Inspection and Header Inspection are disabled.
If deep_decode is set to true, the Deep Inspection is enabled.
If check_all_headers is set to true, the Header Inspection is enabled.
-If deep_decode and check_all_headers are set to false, the Deep Inspection and Header Inspection are disabled.
+If deep_decode and check_all_headers are set to true, the Deep Inspection and Header Inspection are disabled.
String
Protection mode of the global rate limiting function.
-log: WAF logs the event only.
-block: WAF blocks requests.
+Protection mode of the global rate limiting function. WAF logs the event only.
+block: WAF blocks requests.
Enumeration values:
log
@@ -602,8 +601,7 @@String
Management mode of the intelligent precise protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -615,8 +613,7 @@String
Aging mode of the intelligent precise protection.
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+auto: Automatic
Enumeration values:
auto
@@ -659,8 +656,7 @@String
Management mode of the intelligent CC attack protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -671,9 +667,8 @@String
Aging mode of the intelligent CC attack protection..
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+Aging mode of the intelligent CC attack protection.
+auto: Automatic
Enumeration values:
auto
diff --git a/docs/wafd/api-ref/ShowPremiumHost.html b/docs/wafd/api-ref/ShowPremiumHost.html index 2de89c2f..14f5667b 100644 --- a/docs/wafd/api-ref/ShowPremiumHost.html +++ b/docs/wafd/api-ref/ShowPremiumHost.html @@ -188,7 +188,7 @@Integer
Lock status. This parameter is redundant and can be ignored. Default value: 0
+Lock status. This parameter is redundant and can be ignored. Default value: - 0:
Default: 0
String
Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Template type. The value can be:
-default: The default block page is returned when a request is blocked.
-custom: Your custom block page is returned when a request is blocked.
-redirect: The request is redirected to the URL you specify.
+Template type, the value can be:
+default: The default block page.
+custom: Your custom block page is returned when a request is blocked. The request is redirected to the URL you specify.
CustomPage object
Custom alarm page
+Custom alarm page.
redirect_url
String
Redirection URL
+Redirect URL. The root domain name of the redirection address must be the name of the currently protected domain (including a wildcard domain name).${http_host} can be used to indicate the currently protected domain name and port, for example, ${http_host}/error.html.
String
Content type of alarm page
+Content type of alarm page.
content
String
Page content
+Page content.
String
Rule ID
+Rule ID.
policyid
String
Policy ID
+Policy ID.
block_time
@@ -115,7 +115,7 @@String
Type of the know attack source rule.
+Type of the known attack source rule.
Enumeration values:
long_ip_block
long_cookie_block
@@ -130,14 +130,14 @@String
Description
+Rule description.
timestamp
Long
Timestamp the rule is created.
+Timestamp the rule was created.
This API is used to query a reference table.
+This API is used to query a reference table by ID.
GET /v1/{project_id}/waf/valuelist/{valuelist_id}
@@ -124,14 +124,14 @@Array of strings
Value of the reference table
+The contents of condition matching of the rules, such as CC Attack Protection Rule or Precise Protection Rule.
description
String
Reference table description
+Reference table description.
producer
diff --git a/docs/wafd/api-ref/ShowWhiteblackipRule.html b/docs/wafd/api-ref/ShowWhiteblackipRule.html index 0da4b985..4f43bf8e 100644 --- a/docs/wafd/api-ref/ShowWhiteblackipRule.html +++ b/docs/wafd/api-ref/ShowWhiteblackipRule.html @@ -1,6 +1,6 @@ -This API is used to query a blacklist or whitelist rule by ID.
GET /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}
diff --git a/docs/wafd/api-ref/UpdateAntiTamperRuleRefresh.html b/docs/wafd/api-ref/UpdateAntiTamperRuleRefresh.html index f66b8e64..eaefb9ba 100644 --- a/docs/wafd/api-ref/UpdateAntiTamperRuleRefresh.html +++ b/docs/wafd/api-ref/UpdateAntiTamperRuleRefresh.html @@ -1,7 +1,7 @@This API is used to updating the cache for a web tamper protection Rule.
+This API is used to update the cache for a web tamper protection rule
POST /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refresh
diff --git a/docs/wafd/api-ref/UpdateAntileakageRule.html b/docs/wafd/api-ref/UpdateAntileakageRule.html index 3a7409d7..e23c804e 100644 --- a/docs/wafd/api-ref/UpdateAntileakageRule.html +++ b/docs/wafd/api-ref/UpdateAntileakageRule.html @@ -107,7 +107,7 @@Sensitive information type in the information leakage prevention rule.
sensitive: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-code: The rule blocks response pages of specified HTTP response code.
+code: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -121,8 +121,8 @@Array of strings
Content corresponding to the sensitive information type. Multiple options can be set.
-When category is set to code, the pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
+Content corresponding to the sensitive information type. Multiple options can be selected.
+When the value of category is code, the returned pages that contain the following HTTP response codes will be blocked: 400, 401, 402, 403, 404, 405, 500, 501, 502, 503, 504 and 507.
When category is set to sensitive, parameters phone, id_card, and email can be set.
String
Description.
+Rule description.
String
Rule ID
+Rule ID.
url
@@ -170,7 +170,7 @@Sensitive information type in the information leakage prevention rule.
code: The rule masks sensitive user information, such as ID code, phone numbers, and email addresses.
-sensitive: The rule blocks response pages of specified HTTP response code.
+sensitive: The rule blocks returned pages of specified HTTP response code.
Enumeration values:
code
@@ -182,7 +182,7 @@Array of strings
Value
+Rule content.
description
diff --git a/docs/wafd/api-ref/UpdateCcRule.html b/docs/wafd/api-ref/UpdateCcRule.html index 8eb6edc4..9ba05b20 100644 --- a/docs/wafd/api-ref/UpdateCcRule.html +++ b/docs/wafd/api-ref/UpdateCcRule.html @@ -159,7 +159,7 @@String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
Integer
Block duration, in seconds. The value ranges from 0 to 65,535. Specifies the period within which access is blocked. An error page is displayed in this period.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
@@ -216,7 +216,7 @@String
Rule description
+Rule description.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
@@ -379,7 +379,7 @@response object
Returned page.
+Returned page
String
When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
+When the value of mode is 0, this parameter has a return value. URL to which the rule applies, excluding a domain name.
Prefix match: A path ending with * indicates that the path is used as a prefix. For example, to protect /admin/test.php or /adminabc, you can set Path to /admin*.
Exact match: The path you enter must exactly match the path you want to protect. If the path you want to protect is /admin, set url to /admin.
String
User identifier. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
+User tag. This parameter is mandatory when the rate limit mode is set to user (cookie or header).
cookie: Set the cookie field name. You need to configure an attribute variable name in the cookie that can uniquely identify a web visitor based on your website requirements. This field does not support regular expressions. Only complete matches are supported. For example, if a website uses the name field in the cookie to uniquely identify a website visitor, select name.
header: Set the user-defined HTTP header you want to protect. You need to configure the HTTP header that can identify web visitors based on your website requirements.
Integer
Block duration, in seconds. The value ranges from 0 to 65,535. The period within which access is blocked. An error page is displayed in this period.
+Block during, in seconds. The value ranges from 0 to 65,535. Access requests are blocked during the configured block duration, and an error page is displayed.
description
String
Rule description
+Rule description.
total_num
@@ -633,7 +633,7 @@String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
@@ -716,7 +716,7 @@String
Action type:
-captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
+captcha: Verification code. WAF requires visitors to enter a correct verification code to continue their access to requested page on your website.
block: WAF blocks the requests. When tag_type is set to other, the value can only be block.
log: WAF logs the event only.
dynamic_block: In the previous rate limit period, if the request frequency exceeds the value of Rate Limit Frequency, the request is blocked. In the next rate limit period, if the request frequency exceeds the value of Permit Frequency, the request is still blocked. Note: The dynamic_block protection action can be set only when the advanced protection mode is enabled for the CC protection rule.
diff --git a/docs/wafd/api-ref/UpdateCertificate.html b/docs/wafd/api-ref/UpdateCertificate.html new file mode 100644 index 00000000..d48e1208 --- /dev/null +++ b/docs/wafd/api-ref/UpdateCertificate.html @@ -0,0 +1,322 @@ + + +This API is used to modify a certificate. Note: The certificate in use cannot be updated.
+PUT /v1/{project_id}/waf/certificate/{certificate_id}
+ +Parameter + |
+Mandatory + |
+Type + |
+Description + |
+
---|---|---|---|
project_id + |
+Yes + |
+String + |
+Project ID. + |
+
certificate_id + |
+Yes + |
+String + |
+HTTPS certificate ID. It can be obtained by calling the ListCertificates API. + |
+
Parameter + |
+Mandatory + |
+Type + |
+Description + |
+
---|---|---|---|
enterprise_project_id + |
+No + |
+String + |
+You can obtain the ID by calling the ListEnterpriseProject API of EPS. + |
+
Parameter + |
+Mandatory + |
+Type + |
+Description + |
+
---|---|---|---|
X-Auth-Token + |
+Yes + |
+String + |
+User token. It can be obtained by calling the IAM API (value of X-Subject-Token in the response header). + |
+
Content-Type + |
+Yes + |
+String + |
+Content type. +Default: application/json;charset=utf8 + |
+
Parameter + |
+Mandatory + |
+Type + |
+Description + |
+
---|---|---|---|
name + |
+Yes + |
+String + |
+Certificate name. The value can contain a maximum of 64 characters. Only digits, letters, hyphens (-), underscores (_), and periods (.) are allowed. + |
+
content + |
+No + |
+String + |
+Certificate file. Only certificates and private key files in PEM format are supported, and the newline characters in the file must be replaced with \n. + |
+
key + |
+No + |
+String + |
+Certificate private key. Only certificates and private key files in PEM format are supported, and the newline characters in the files must be replaced with \n. + |
+
Status code: 200
+ +Parameter + |
+Type + |
+Description + |
+
---|---|---|
id + |
+String + |
+Certificate ID + |
+
name + |
+String + |
+Certificate name + |
+
expire_time + |
+Long + |
+Timestamp when the certificate expires (unit: ms). + |
+
timestamp + |
+Long + |
+Timestamp when the certificate is uploaded + |
+
cert_type + |
+String + |
+Certificate type. This parameter is redundant and can be ignored. + |
+
Status code: 400
+ +Parameter + |
+Type + |
+Description + |
+
---|---|---|
error_code + |
+String + |
+Error code + |
+
error_msg + |
+String + |
+Error message + |
+
Status code: 401
+ +Parameter + |
+Type + |
+Description + |
+
---|---|---|
error_code + |
+String + |
+Error code + |
+
error_msg + |
+String + |
+Error message + |
+
Status code: 500
+ +Parameter + |
+Type + |
+Description + |
+
---|---|---|
error_code + |
+String + |
+Error code + |
+
error_msg + |
+String + |
+Error message + |
+
PUT https://{Endpoint}/v1/{project_id}/waf/certificate/{certificate_id}? + +{ + "name" : "demo" +}+
Status code: 200
+OK
+{ + "id" : "360f992501a64de0a65c50a64d1ca7b3", + "name" : "demo", + "timestamp" : 1650593797892, + "expire_time" : 1596865564000 +}+
Status Code + |
+Description + |
+
---|---|
200 + |
+OK + |
+
400 + |
+Request failed. + |
+
401 + |
+The token does not have required permissions. + |
+
500 + |
+Internal server error. + |
+
See Error Codes.
+String
Rule description
+Rule description.
conditions
@@ -197,7 +197,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
Rule description
+Rule description.
status
@@ -432,7 +432,7 @@String
Subfield
+Subfield:
When the field type is url, user-agent, ip, refer, request_line, method, or request, index is not required.
When the field type is params, header, or cookie, and the subfield is customized, the value of index is the customized subfield.
String
Field type. The value can be url, ip, params, cookie, or header.
+Field type. The value can be url, ip, params, cookie, or header.
Enumeration values:
url
ip
diff --git a/docs/wafd/api-ref/UpdatePolicy.html b/docs/wafd/api-ref/UpdatePolicy.html index cc0a913a..ba7709a4 100644 --- a/docs/wafd/api-ref/UpdatePolicy.html +++ b/docs/wafd/api-ref/UpdatePolicy.html @@ -125,7 +125,7 @@Protection level
1: WAF detects wget, cURL, and more but does not detect XSS and command injection attacks in the header, so you may miss more vulnerabilities that actually exist. If you find out that configured protection rules are affecting your services, adjust the protection level to 1.
-2: WAF detects remote file inclusion, third-party software vulnerabilities, web shell, and cp and ftp commands. This is the default value.
+2: Medium. WAF detects remote file inclusion, third-party software vulnerabilities, web shell, and cp and ftp commands. This is the default value.
3: If you need a stricter protection level, set this parameter to 3. This may increase the false positive rate but decrease the false negative rate, such as nc, nmap, and kill.
Boolean
Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enabled any of these checks, keep this parameter enabled first. The value can be:
+Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enable any of these checks, keep this parameter enabled first. The value can be:
true: enabled
false: disabled
Boolean
JavaScript anti-crawler function.
+Whether to enable the JavaScript anti-crawler function.
true: Enabled
false: Disabled
Protection level
1: WAF detects wget, cURL, and more but does not detect XSS and command injection attacks in the header, so you may miss more vulnerabilities that actually exist. If you find out that configured protection rules are affecting your services, adjust the protection level to 1.
-2: WAF detects remote file inclusion, third-party software vulnerabilities, web shell and ftp commands. This is the default value.
+2: Medium. WAF detects remote file inclusion, third-party software vulnerabilities, web shell, and cp and ftp commands. This is the default value.
3: If you need a stricter protection level, set this parameter to 3. This may increase the false positive rate but decrease the false negative rate, such as nc, nmap, and kill.
ModulexOptions object
Whether to enable intelligent CC protection. This parameter is reserved and can be ignored currently.
+Whether to enabling intelligent CC protection. This parameter is reserved and can be ignored currently.
timestamp
@@ -617,7 +617,7 @@Boolean
Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enabled any of these checks, keep this parameter enabled first. The value can be:
+Basic web protection includes many specific checks under Advanced Settings, and there is a specific parameter allocated for each check, for example, common for General Check. To enable any of these checks, keep this parameter enabled first. The value can be:
true: enabled
false: disabled
Boolean
JavaScript anti-crawler function.
+Whether to enable the JavaScript anti-crawler function.
true: Enabled
false: Disabled
Protection statuses for advanced settings in basic web protection. By default, this parameter is left blank, and the Deep Inspection and Header Inspection are disabled.
If deep_decode is set to true, the Deep Inspection is enabled.
If check_all_headers is set to true, the Header Inspection is enabled.
-If deep_decode and check_all_headers are set to false, the Deep Inspection and Header Inspection are disabled.
+If deep_decode and check_all_headers are set to true, the Deep Inspection and Header Inspection are disabled.
String
Protection mode of the global rate limiting function.
-log: WAF logs the event only.
-block: WAF blocks requests.
+Protection mode of the global rate limiting function. WAF logs the event only.
+block: WAF blocks requests.
Enumeration values:
log
@@ -998,8 +997,7 @@String
Management mode of the intelligent precise protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -1011,8 +1009,7 @@String
Aging mode of the intelligent precise protection.
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+auto: Automatic
Enumeration values:
auto
@@ -1055,8 +1052,7 @@String
Management mode of the intelligent CC attack protection.
-auto: WAF manages automatically generated rules.
-manual: You can manage rules that are automatically generated by WAF.
+auto: Automatic
Enumeration values:
auto
@@ -1067,9 +1063,8 @@String
Aging mode of the intelligent CC attack protection..
-manual: You can customize the maximum age of the rule.
-auto: Automatic
+Aging mode of the intelligent CC attack protection.
+auto: Automatic
Enumeration values:
auto
diff --git a/docs/wafd/api-ref/UpdatePolicyRuleStatus.html b/docs/wafd/api-ref/UpdatePolicyRuleStatus.html index 23b400df..b6aeae97 100644 --- a/docs/wafd/api-ref/UpdatePolicyRuleStatus.html +++ b/docs/wafd/api-ref/UpdatePolicyRuleStatus.html @@ -1,7 +1,7 @@ -This API is used to change the status of a policy rule.
+This API is used to modify the status of a rule.
PUT /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/status
diff --git a/docs/wafd/api-ref/UpdatePremiumHost.html b/docs/wafd/api-ref/UpdatePremiumHost.html index b8da4a5a..29a0dc92 100644 --- a/docs/wafd/api-ref/UpdatePremiumHost.html +++ b/docs/wafd/api-ref/UpdatePremiumHost.html @@ -30,7 +30,7 @@String
This API is used to modify a domain name protected by a dedicated WAF instance.
+ID of the domain name protected by the dedicated WAF engine
String
Template type. The value can be:
-default: The default block page is returned when a request is blocked.
-custom: Your custom block page is returned when a request is blocked.
-redirect: The request is redirected to the URL you specify.
+Template type, the value can be:
+default: The default block page.
+custom: Your custom block page is returned when a request is blocked. The request is redirected to the URL you specify.
CustomPage object
Custom alarm page
+Custom alarm page.
redirect_url
@@ -353,7 +352,7 @@String
Redirection URL
+Redirect URL. The root domain name of the redirection address must be the name of the currently protected domain (including a wildcard domain name).${http_host} can be used to indicate the currently protected domain name and port, for example, ${http_host}/error.html.
String
Content type of alarm page
+Content type of alarm page.
content
@@ -394,7 +393,7 @@String
Page content
+Page content.
String
Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
Integer
Lock status. This parameter is redundant and can be ignored. Default value: 0
+Lock status. This parameter is redundant and can be ignored. Default value: - 0:
Default: 0
String
Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI 3DS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI 3DS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Once PCI 3DS is enabled, it cannot be disabled. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected.
+Whether to enable PCI DSS compliance check. This parameter must be used together with tls and cipher. tls must be set to TLS v1.2, and cipher must be set to cipher_2. Note: If PCI DSS compliance check is enabled and the minimum TLS is set to TLS v1.2, the website can be accessed using TLS v1.2, but cannot be accessed using TLS v1.1 or earlier. Before you enable it, ensure that your website services will not be affected. You can ignore it.
true: Enable this check.
false: Disable this check.
String
Template type. The value can be:
-default: The default block page is returned when a request is blocked.
-custom: Your custom block page is returned when a request is blocked.
-redirect: The request is redirected to the URL you specify.
+Template type, the value can be:
+default: The default block page.
+custom: Your custom block page is returned when a request is blocked. The request is redirected to the URL you specify.
CustomPage object
Custom alarm page
+Custom alarm page.
redirect_url
String
Redirection URL
+Redirect URL. The root domain name of the redirection address must be the name of the currently protected domain (including a wildcard domain name).${http_host} can be used to indicate the currently protected domain name and port, for example, ${http_host}/error.html.
String
Content type of alarm page
+Content type of alarm page.
content
String
Page content
+Page content.
String
Description
+Rule description.
String
Rule ID
+Rule ID.
policyid
String
Policy ID
+Policy ID.
block_time
@@ -147,7 +147,7 @@String
Type of the know attack source rule.
+Type of the known attack source rule.
Enumeration values:
long_ip_block
long_cookie_block
@@ -162,7 +162,7 @@String
Description
+Rule description.
String
Reference table description
+Reference table description.
Array of strings
Value of the reference table
+The contents of condition matching of the rules, such as CC Attack Protection Rule or Precise Protection Rule.
description
String
Reference table description
+Reference table description.
producer
diff --git a/docs/wafd/api-ref/UpgradeInstance.html b/docs/wafd/api-ref/UpgradeInstance.html index c61ca17c..db8276d0 100644 --- a/docs/wafd/api-ref/UpgradeInstance.html +++ b/docs/wafd/api-ref/UpgradeInstance.html @@ -87,7 +87,7 @@String
peration name.
+Operation name.
upgrade: Upgrade the software version of the dedicated WAF engine.
String
AZ ID.
+available_zone ID.
arch
@@ -152,7 +152,7 @@String
ECS specification ID
+ECS specifications and the dedicated WAF instance specifications. You can view details about the supported specifications on the WAF console.
vpc_id
@@ -180,7 +180,7 @@String
IPv6 address of the service plane of the dedicated engine
+IPv6 address of the dedicated WAF instance on the service plane. This parameter is displayed when ipv6_enable is set to true.
security_group_ids
@@ -267,7 +267,7 @@String
ID of the ECS hosting the dedicated engine. This parameter is the same as server_id, and will be deleted.
+ID of the ECS housing the dedicated engine. This parameter can be ignored because it is the same as server_id.
create_time
@@ -288,7 +288,7 @@Integer
Type of the dedicated WAF instance. If the type is Network Interface, this field is returned and its value is 1.
+Type of the dedicated WAF instance If the type is Network Interface, the value is 1.
2023-04-23
+2024-02-28
+2023-08-07
+Optimized descriptions of some parameters.
+2023-04-23
Revised the document based on review comments.