Corrects doc strings in bigip_asm_policy_* modules (#50561)

pull/50416/head
Wojciech Wypior 6 years ago committed by Tim Rupp
parent 4648a441d2
commit 96f7cf394f

@ -34,9 +34,9 @@ options:
state: state:
description: description:
- When C(state) is C(present), and C(template) parameter is provided, - When C(state) is C(present), and C(template) parameter is provided,
new ASM policy is created from template with the given C(name). new ASM policy is created from template with the given policy C(name).
- When C(state) is present and no C(template) parameter is provided - When C(state) is present and no C(template) parameter is provided
new blank ASM policy is created with the given C(name). new blank ASM policy is created with the given policy C(name).
- When C(state) is C(absent), ensures that the policy is removed, even if it is - When C(state) is C(absent), ensures that the policy is removed, even if it is
currently active. currently active.
choices: choices:

@ -22,7 +22,7 @@ version_added: 2.8
options: options:
name: name:
description: description:
- Specifies the name of the server technology to apply/remove to the ASM policy. - Specifies the name of the server technology to apply on or remove from the ASM policy.
required: True required: True
choices: choices:
- jQuery - jQuery

@ -22,9 +22,9 @@ version_added: 2.8
options: options:
name: name:
description: description:
- Specifies the name of the signature sets to apply/remove to the ASM policy. - Specifies the name of the signature sets to apply on or remove from the ASM policy.
- Apart from built-in signature sets that ship with the device, users can create and use - Apart from built-in signature sets that ship with the device, users can use user created
their own signature sets. signature sets.
- When C(All Response Signatures), configures all signatures in the attack signature - When C(All Response Signatures), configures all signatures in the attack signature
pool that can review responses. pool that can review responses.
- When C(All Signatures), configures all attack signatures in the attack signature pool. - When C(All Signatures), configures all attack signatures in the attack signature pool.
@ -60,9 +60,9 @@ options:
that attempt to run system level commands through a vulnerable application. that attempt to run system level commands through a vulnerable application.
- When C(OWA Signatures), configures signatures that target attacks against - When C(OWA Signatures), configures signatures that target attacks against
the Microsoft Outlook Web Access (OWA) application. the Microsoft Outlook Web Access (OWA) application.
- When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks - When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks,
including session fixation, local file access, injection attempts, header tampering, including session fixation, local file access, injection attempts, header tampering
and so on that could affect many applications. and so on, affecting many applications.
- When C(Path Traversal Signatures), configures signatures targeting attacks that attempt to access files - When C(Path Traversal Signatures), configures signatures targeting attacks that attempt to access files
and directories that are stored outside the web root folder. and directories that are stored outside the web root folder.
- When C(Predictable Resource Location Signatures), configures signatures targeting attacks that attempt - When C(Predictable Resource Location Signatures), configures signatures targeting attacks that attempt
@ -78,7 +78,7 @@ options:
that are integrated using WebSphere including general database, Microsoft Windows, IIS, that are integrated using WebSphere including general database, Microsoft Windows, IIS,
Microsoft SQL Server, Apache, Oracle, Unix/Linux, IBM DB2, PostgreSQL, and XML. Microsoft SQL Server, Apache, Oracle, Unix/Linux, IBM DB2, PostgreSQL, and XML.
- When C(XPath Injection Signatures), configures signatures targeting attacks that attempt to gain access - When C(XPath Injection Signatures), configures signatures targeting attacks that attempt to gain access
to data structures or bypass permissions or access when a web site uses user-supplied information to data structures or bypass permissions when a web site uses user-supplied information
to construct XPath queries for XML data. to construct XPath queries for XML data.
required: True required: True
policy_name: policy_name:
@ -87,12 +87,12 @@ options:
required: True required: True
alarm: alarm:
description: description:
- Specifies whether the security policy logs the request data in the Statistics screen, - Specifies if the security policy logs the request data in the Statistics screen,
if a request matches a signature that is included in the signature set. when a request matches a signature that is included in the signature set.
type: bool type: bool
block: block:
description: description:
- Effective when the security policy's enforcement mode is Blocking. - Effective when the security policy`s enforcement mode is Blocking.
- Determines how the system treats requests that match a signature included in the signature set. - Determines how the system treats requests that match a signature included in the signature set.
- When C(yes) the system blocks all requests that match a signature, - When C(yes) the system blocks all requests that match a signature,
and provides the client with a support ID number. and provides the client with a support ID number.

Loading…
Cancel
Save