config security
The config security
commands configure web application firewall (WAF) settings.
This chapter is a reference for the following commands:
- config security antivirus profile
- config security antivirus quarantine
- config security antivirus settings
- config security dos dos-protection-profile
- config security dos http-access-limit
- config security dos http-connection-flood-protection
- config security dos http-request-flood-protection
- config security dos ip-fragmentation-protection
- config security dos tcp-access-flood-protection
- config security dos tcp-slowdata-attack-protection
- config security dos tcp-synflood-protection
- config security ips profile
- config security wad profile
- config security waf api-gateway-policy
- config security waf api-gateway-rule
- config security waf bot-detection
- config security waf exception
- config security waf heuristic-sql-xss-injection-detection
- config security waf http-protocol-constraint
- config security waf http-header-security
- config security waf action
- config security waf profile
- config security waf input-validation-policy
- config security waf parameter-validation-rule
- config security waf url-protection
- config security waf web-attack-signature
- config security waf json-schema file
- config security waf json-validation-detection
- config security waf xml-schema file
- config security waf xml-validation-detection
- config security waf openapi-schema-file
- config security waf openapi-validation-detection
- config security waf scanner
- config security waf brute-force-login
- config security waf advanced-protection
- config security waf cookie-security
- config security waf data-leak-protection
- config security waf csrf-protection