Corrects doc strings in bigip_asm_policy_* modules (#50561)

pull/50416/head
Wojciech Wypior 6 years ago committed by Tim Rupp
parent 4648a441d2
commit 96f7cf394f

@ -34,9 +34,9 @@ options:
state:
description:
- When C(state) is C(present), and C(template) parameter is provided,
new ASM policy is created from template with the given C(name).
new ASM policy is created from template with the given policy C(name).
- When C(state) is present and no C(template) parameter is provided
new blank ASM policy is created with the given C(name).
new blank ASM policy is created with the given policy C(name).
- When C(state) is C(absent), ensures that the policy is removed, even if it is
currently active.
choices:

@ -22,7 +22,7 @@ version_added: 2.8
options:
name:
description:
- Specifies the name of the server technology to apply/remove to the ASM policy.
- Specifies the name of the server technology to apply on or remove from the ASM policy.
required: True
choices:
- jQuery

@ -22,9 +22,9 @@ version_added: 2.8
options:
name:
description:
- Specifies the name of the signature sets to apply/remove to the ASM policy.
- Apart from built-in signature sets that ship with the device, users can create and use
their own signature sets.
- Specifies the name of the signature sets to apply on or remove from the ASM policy.
- Apart from built-in signature sets that ship with the device, users can use user created
signature sets.
- When C(All Response Signatures), configures all signatures in the attack signature
pool that can review responses.
- When C(All Signatures), configures all attack signatures in the attack signature pool.
@ -60,9 +60,9 @@ options:
that attempt to run system level commands through a vulnerable application.
- When C(OWA Signatures), configures signatures that target attacks against
the Microsoft Outlook Web Access (OWA) application.
- When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks
including session fixation, local file access, injection attempts, header tampering,
and so on that could affect many applications.
- When C(Other Application Attacks Signatures), configures signatures targeting miscellaneous attacks,
including session fixation, local file access, injection attempts, header tampering
and so on, affecting many applications.
- When C(Path Traversal Signatures), configures signatures targeting attacks that attempt to access files
and directories that are stored outside the web root folder.
- When C(Predictable Resource Location Signatures), configures signatures targeting attacks that attempt
@ -78,7 +78,7 @@ options:
that are integrated using WebSphere including general database, Microsoft Windows, IIS,
Microsoft SQL Server, Apache, Oracle, Unix/Linux, IBM DB2, PostgreSQL, and XML.
- When C(XPath Injection Signatures), configures signatures targeting attacks that attempt to gain access
to data structures or bypass permissions or access when a web site uses user-supplied information
to data structures or bypass permissions when a web site uses user-supplied information
to construct XPath queries for XML data.
required: True
policy_name:
@ -87,12 +87,12 @@ options:
required: True
alarm:
description:
- Specifies whether the security policy logs the request data in the Statistics screen,
if a request matches a signature that is included in the signature set.
- Specifies if the security policy logs the request data in the Statistics screen,
when a request matches a signature that is included in the signature set.
type: bool
block:
description:
- Effective when the security policy's enforcement mode is Blocking.
- Effective when the security policy`s enforcement mode is Blocking.
- Determines how the system treats requests that match a signature included in the signature set.
- When C(yes) the system blocks all requests that match a signature,
and provides the client with a support ID number.

Loading…
Cancel
Save