admintools:wafdeny:add

What it does: Creates a new Admin Tools WAF deny rule.

Syntax: admintools:wafdeny:add --application=APPLICATION [--component=COMPONENT] [--view=VIEW] [--task=TASK] [--query=QUERY] --query_type=QUERY_TYPE [--query_content=QUERY_CONTENT] [--verb=VERB] [--enabled=ENABLED] [--format=FORMAT]

Arguments

This command takes no arguments.

Options

--application=APPLICATION

Application side where the rule should be applied. One of site, administrator

--component=COMPONENT

Component name where the rule should be applied, e.g. com_foobar. Skip to apply to all components.

--view=VIEW

View name where the rule should be applied. Skip to apply to all views.

--task=TASK

Task where the rule should be applied. Skip to apply to all tasks.

--query=QUERY

Request query parameter name where the rule should be applied. Skip to apply to all request parameters.

--query_type=QUERY_TYPE

Match type for the query_content. E for exact match, P for partial match, R for regular expression

--query_content=QUERY_CONTENT

The content of the query, matched using the query_type, to trigger this rule.

--verb=VERB

HTTP verb to apply the rule to. One of GET, POST, PUT, HEAD, DELETE, OPTIONS, TRACE. Skip to apply to all HTTP verbs.

--enabled=ENABLED

Should the rule be enabled? 0 or 1. Default (if skipped) is 1 (enabled).