If the firewall configuration includes a custom managed ruleset, it will include a crs
item that has the following values: sd: Scanner Detection ma: Multipart Attack lfi: Local File Inclusion Attack rfi: Remote File Inclusion Attack rce: Remote Execution Attack php: PHP Attack gen: Generic Attack xss: XSS Attack sqli: SQL Injection Attack sf: Session Fixation Attack java: Java Attack
import { GetFirewallConfigResponseBody } from "@vercel/sdk/models/getfirewallconfigop.js";
let value: GetFirewallConfigResponseBody = {
ownerId: "<id>",
projectKey: "<value>",
id: "<id>",
version: 9651.16,
updatedAt: "1736187965656",
firewallEnabled: false,
crs: {
sd: {
active: false,
action: "log",
},
ma: {
active: false,
action: "deny",
},
lfi: {
active: false,
action: "log",
},
rfi: {
active: false,
action: "deny",
},
rce: {
active: false,
action: "deny",
},
php: {
active: false,
action: "deny",
},
gen: {
active: false,
action: "log",
},
xss: {
active: false,
action: "deny",
},
sqli: {
active: false,
action: "deny",
},
sf: {
active: false,
action: "log",
},
java: {
active: false,
action: "log",
},
},
rules: [
{
id: "<id>",
name: "<value>",
active: false,
conditionGroup: [
{
conditions: [
{
type: "geo_city",
op: "gte",
},
],
},
],
action: {},
},
],
ips: [
{
id: "<id>",
hostname: "unwritten-silk.info",
ip: "ac1b:9eab:391f:eb8c:6b6a:5fe1:0f46:4eeb",
action: "challenge",
},
],
changes: [
{},
],
};
Field | Type | Required | Description |
---|---|---|---|
ownerId |
string | ✔️ | N/A |
projectKey |
string | ✔️ | N/A |
id |
string | ✔️ | N/A |
version |
number | ✔️ | N/A |
updatedAt |
string | ✔️ | N/A |
firewallEnabled |
boolean | ✔️ | N/A |
crs |
models.GetFirewallConfigCrs | ✔️ | Custom Ruleset |
rules |
models.GetFirewallConfigRules[] | ✔️ | N/A |
ips |
models.GetFirewallConfigIps[] | ✔️ | N/A |
changes |
models.Changes[] | ✔️ | N/A |
managedRules |
models.GetFirewallConfigManagedRules | ➖ | N/A |