Use this command to configure WebSocket rule related settings.
To use this command, your administrator account’s access control profile must have either
rw permission to the
wafgrp area. For details, see Permissions.
config waf websocket-security rule
set host <host_str>
set url <url_str>
|Enter the WebSocket security rule name.
|Enable to compare the WebSocket security rule to the
Host: field in the HTTP header.
|Select the IP address or fully qualified domain name (FQDN) of the
protected host to which this rule applies.
This option is available only if Host Status is enabled.
|Select whether the URL Pattern field will contain a literal URL (Simple String), or a regular expression designed to match multiple URLs (Regular Expression).
|The URL which hosts the web page containing the user input fields you want to protect.
|Enable to deny the WebSocket traffic, and FortiWeb will not check any WebSocket related traffic. This option is disabled by default.
|Select which action the FortiWeb appliance will take when it detects a
Alert—Accept the connection and generate an alert email and/or log message.
Alert & Deny—Block the request (or reset the connection) and generate an alert and/or log message.
Deny (no log)—Block the request (or reset the connection).
|Specifies the maximum acceptable frame header and body size in bytes. The valid range is 0–2147483647 bytes.
|Specifies the maximum acceptable message header and body size in bytes. The valid range is 0–2147483647 bytes.
|Enable to not check the extension header in WebSocket handshake packet. By default, this option is disabled.
|Enable to detect attack in WebSocket message body. But if WebSocket traffic has extension header and allow extension header in WebSocket security rule, FortiWeb can not detect attack signatures. When attack signature is detected, the actions FortiWeb will take follow those of related signatures.
|Enable to allow detecting the plain text.
|Enable to allow detecting the binary text.
|Enter the origin list ID in WebSocket handshake packet.