Policy > Networking > Network Services > Advanced Load Balancing > Alb Waf Crs

Read ALBWafCRS

Read a ALBWafCRS.
This API is only available when using VMware NSX-T.

Request:

Method:
GET
URI Path(s):
/policy/api/v1/infra/alb-waf-crs/<alb-wafcrs-id>
Request Headers:
n/a
Query Parameters:
n/a
Request Body:
n/a

Example Request:

GET https://<policy-mgr>/policy/api/v1/infra/alb-waf-crs/

Successful Response:

Response Code:
200 OK
Response Headers:
Content-type: application/json
Response Body:
ALBWafCRS+

Example Response:

{ "_create_time": 1598511039483, "_create_user": "admin", "_last_modified_time": 1598511039486, "_last_modified_user": "admin", "_protection": "NOT_PROTECTED", "_revision": 0, "_system_owned": false, "description": "DEMO Core Ruleset.\n\nThis is for demonstration and documentation only.\n", "display_name": "test-waf-crs", "groups": [ { "enable": true, "index": 0, "name": "CRS_402_Additional_Rules", "rules": [ { "enable": true, "index": 0, "is_sensitive": false, "name": "Desync attack detected", "rule": "SecRule &REQUEST_HEADERS:Content-Length \"@gt 0\" \"id:4022010, phase:1, block, t:none, msg:'Desync attack detected', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-protocol', ver:'AVI_CRS/2019_2', severity:'WARNING', chain\"\nSecRule &REQUEST_HEADERS:Transfer-Encoding \"@gt 0\" \"setvar:'tx.anomaly_score_pl1:+%{tx.warning_anomaly_score}', setvar:'tx.http_violation_score:+%{tx.warning_anomaly_score}'\"", "rule_id": "4022010" }, { "enable": true, "index": 1, "is_sensitive": false, "name": "Multiple Transfer Encoding Headers detected", "rule": "SecRule &REQUEST_HEADERS:Transfer-Encoding \"@gt 1\" \"id:4022020, phase:1, block, t:none, msg:'Multiple Transfer Encoding Headers detected', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-protocol', ver:'AVI_CRS/2019_2', severity:'WARNING', setvar:'tx.anomaly_score_pl1:+%{tx.warning_anomaly_score}', setvar:'tx.http_violation_score:+%{tx.warning_anomaly_score}'\"", "rule_id": "4022020" }, { "enable": true, "index": 2, "is_sensitive": false, "name": "Failed to parse request body.", "rule": "SecRule REQBODY_ERROR \"!@eq 0\" \"id:4022030, phase:2, block, t:none, msg:'Failed to parse request body.', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-protocol', ver:'AVI_CRS/2019_3', severity:'CRITICAL', setvar:'tx.anomaly_score_pl1:+%{tx.critical_anomaly_score}'\"", "rule_id": "4022030" }, { "enable": true, "index": 3, "is_sensitive": false, "name": "Multipart request body failed strict validation.", "rule": "SecRule MULTIPART_STRICT_ERROR \"!@eq 0\" \"id:4022031, phase:2, block, t:none, msg:'Multipart request body failed strict validation.', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-protocol', ver:'AVI_CRS/2019_3', severity:'CRITICAL', setvar:'tx.anomaly_score_pl1:+%{tx.critical_anomaly_score}'\"", "rule_id": "4022031" } ] } ], "id": "test-waf-crs", "integrity": "856e86e938bf4fe684ac4cf891b41d32be7e257f8f31804be3d98956c1cbcaf7", "marked_for_delete": false, "overridden": false, "parent_path": "/infra", "path": "/infra/alb-waf-crs/test-waf-crs", "relative_path": "test-waf-crs", "release_date": "2020-08-18", "resource_type": "ALBWafCRS", "unique_id": "d3d3cd45-ff7d-4f3b-9f56-6cc2fb58666c", "version": "20170101" }

Required Permissions:

read

Feature:

policy_lb

Additional Errors: