![]() ![]() When you add both conditions to the same rule and add ![]() Suppose you create two conditions, and each condition contains one of the two filters in Rule to a web ACL, web requests must match all the conditions for AWS WAF Classic toĪllow or block requests based on the conditions. You add the separate SQL injection match conditions to a rule and add the One filter per SQL injection match condition – When One filter instructs AWS WAF Classic to inspect the URI for malicious SQL code, and the other instructs AWS WAF Classic to inspect the query string.ĪWS WAF Classic allows or blocks requests if they appear to contain malicious SQL code either in the URI When you add a SQL injection match condition containing multiple filters to a rule and add the rule to a web ACL,Ī web request needs only to match one of the filters in the SQL injection match condition for AWS WAF Classic toĪllow or block the request based on that condition.įor example, suppose you create one SQL injection match condition, and the condition contains two filters. ![]() ![]() More than one filter per SQL injection match condition (recommended) – ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |