Invoke ADCUnsetAppfwprofile - j81blog/J81.ADCToolkit GitHub Wiki

Invoke-ADCUnsetAppfwprofile

SYNOPSIS

Unset Application Firewall configuration Object.

SYNTAX

Invoke-ADCUnsetAppfwprofile [[-Name] <String>] [[-starturlaction] <Boolean>]
 [[-infercontenttypexmlpayloadaction] <Boolean>] [[-contenttypeaction] <Boolean>]
 [[-inspectcontenttypes] <Boolean>] [[-starturlclosure] <Boolean>] [[-denyurlaction] <Boolean>]
 [[-refererheadercheck] <Boolean>] [[-cookieconsistencyaction] <Boolean>] [[-cookiehijackingaction] <Boolean>]
 [[-cookietransforms] <Boolean>] [[-cookieencryption] <Boolean>] [[-cookieproxying] <Boolean>]
 [[-addcookieflags] <Boolean>] [[-fieldconsistencyaction] <Boolean>] [[-csrftagaction] <Boolean>]
 [[-crosssitescriptingaction] <Boolean>] [[-crosssitescriptingtransformunsafehtml] <Boolean>]
 [[-crosssitescriptingcheckcompleteurls] <Boolean>] [[-sqlinjectionaction] <Boolean>]
 [[-cmdinjectionaction] <Boolean>] [[-cmdinjectiontype] <Boolean>]
 [[-sqlinjectiontransformspecialchars] <Boolean>] [[-sqlinjectiononlycheckfieldswithsqlchars] <Boolean>]
 [[-sqlinjectiontype] <Boolean>] [[-sqlinjectionchecksqlwildchars] <Boolean>]
 [[-sqlinjectiongrammar] <Boolean>] [[-fieldformataction] <Boolean>] [[-defaultfieldformattype] <Boolean>]
 [[-defaultfieldformatminlength] <Boolean>] [[-defaultfieldformatmaxlength] <Boolean>]
 [[-bufferoverflowaction] <Boolean>] [[-bufferoverflowmaxurllength] <Boolean>]
 [[-bufferoverflowmaxheaderlength] <Boolean>] [[-bufferoverflowmaxcookielength] <Boolean>]
 [[-bufferoverflowmaxquerylength] <Boolean>] [[-bufferoverflowmaxtotalheaderlength] <Boolean>]
 [[-creditcardaction] <Boolean>] [[-creditcard] <Boolean>] [[-creditcardmaxallowed] <Boolean>]
 [[-creditcardxout] <Boolean>] [[-dosecurecreditcardlogging] <Boolean>] [[-streaming] <Boolean>]
 [[-trace] <Boolean>] [[-requestcontenttype] <Boolean>] [[-responsecontenttype] <Boolean>]
 [[-jsonerrorobject] <Boolean>] [[-jsonerrorstatuscode] <Boolean>] [[-jsonerrorstatusmessage] <Boolean>]
 [[-jsondosaction] <Boolean>] [[-jsonsqlinjectionaction] <Boolean>] [[-jsonsqlinjectiontype] <Boolean>]
 [[-jsonsqlinjectiongrammar] <Boolean>] [[-jsoncmdinjectionaction] <Boolean>]
 [[-jsoncmdinjectiontype] <Boolean>] [[-jsonxssaction] <Boolean>] [[-xmldosaction] <Boolean>]
 [[-xmlformataction] <Boolean>] [[-xmlsqlinjectionaction] <Boolean>]
 [[-xmlsqlinjectiononlycheckfieldswithsqlchars] <Boolean>] [[-xmlsqlinjectiontype] <Boolean>]
 [[-xmlsqlinjectionchecksqlwildchars] <Boolean>] [[-xmlsqlinjectionparsecomments] <Boolean>]
 [[-xmlxssaction] <Boolean>] [[-xmlwsiaction] <Boolean>] [[-xmlattachmentaction] <Boolean>]
 [[-xmlvalidationaction] <Boolean>] [[-xmlerrorobject] <Boolean>] [[-xmlerrorstatuscode] <Boolean>]
 [[-xmlerrorstatusmessage] <Boolean>] [[-customsettings] <Boolean>] [[-signatures] <Boolean>]
 [[-xmlsoapfaultaction] <Boolean>] [[-usehtmlerrorobject] <Boolean>] [[-errorurl] <Boolean>]
 [[-htmlerrorobject] <Boolean>] [[-htmlerrorstatuscode] <Boolean>] [[-htmlerrorstatusmessage] <Boolean>]
 [[-logeverypolicyhit] <Boolean>] [[-stripcomments] <Boolean>] [[-striphtmlcomments] <Boolean>]
 [[-stripxmlcomments] <Boolean>] [[-clientipexpression] <Boolean>] [[-dynamiclearning] <Boolean>]
 [[-exemptclosureurlsfromsecuritychecks] <Boolean>] [[-defaultcharset] <Boolean>] [[-postbodylimit] <Boolean>]
 [[-postbodylimitaction] <Boolean>] [[-postbodylimitsignature] <Boolean>] [[-fileuploadmaxnum] <Boolean>]
 [[-canonicalizehtmlresponse] <Boolean>] [[-enableformtagging] <Boolean>]
 [[-sessionlessfieldconsistency] <Boolean>] [[-sessionlessurlclosure] <Boolean>]
 [[-semicolonfieldseparator] <Boolean>] [[-excludefileuploadfromchecks] <Boolean>]
 [[-sqlinjectionparsecomments] <Boolean>] [[-invalidpercenthandling] <Boolean>] [[-type] <Boolean>]
 [[-checkrequestheaders] <Boolean>] [[-inspectquerycontenttypes] <Boolean>] [[-optimizepartialreqs] <Boolean>]
 [[-urldecoderequestcookies] <Boolean>] [[-comment] <Boolean>] [[-percentdecoderecursively] <Boolean>]
 [[-multipleheaderaction] <Boolean>] [[-rfcprofile] <Boolean>] [[-fileuploadtypesaction] <Boolean>]
 [[-verboseloglevel] <Boolean>] [[-insertcookiesamesiteattribute] <Boolean>]
 [[-cookiesamesiteattribute] <Boolean>] [[-sqlinjectionruletype] <Boolean>] [-WhatIf] [-Confirm]
 [<CommonParameters>]

DESCRIPTION

Configuration for application firewall profile resource.

EXAMPLES

EXAMPLE 1

Invoke-ADCUnsetAppfwprofile -name <string>

An example how to unset appfwprofile configuration Object(s).

PARAMETERS

-Name

Name for the profile. Must begin with a letter, number, or the underscore character (), and must contain only letters, numbers, and the hyphen (-), period (.), pound (#), space ( ), at (@), equals (=), colon (:), and underscore () characters. Cannot be changed after the profile is added.

Type: String
Parameter Sets: (All)
Aliases:

Required: False
Position: 2
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-starturlaction

One or more Start URL actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -startURLaction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -startURLaction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 3
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-infercontenttypexmlpayloadaction

One or more infer content type payload actions. Available settings function as follows:

  • Block - Block connections that have mismatch in content-type header and payload.
  • Log - Log connections that have mismatch in content-type header and payload. The mismatched content-type in HTTP request header will be logged for the request.
  • Stats - Generate statistics when there is mismatch in content-type header and payload.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -inferContentTypeXMLPayloadAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -inferContentTypeXMLPayloadAction none". Please note "none" action cannot be used with any other action type. Possible values = block, log, stats, none
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 4
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-contenttypeaction

One or more Content-type actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -contentTypeaction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -contentTypeaction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 5
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-inspectcontenttypes

One or more InspectContentType lists.

  • application/x-www-form-urlencoded
  • multipart/form-data
  • text/x-gwt-rpc CLI users: To enable, type "set appfw profile -InspectContentTypes" followed by the content types to be inspected. Possible values = none, application/x-www-form-urlencoded, multipart/form-data, text/x-gwt-rpc
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 6
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-starturlclosure

Toggle the state of Start URL Closure. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 7
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-denyurlaction

One or more Deny URL actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. NOTE: The Deny URL check takes precedence over the Start URL check. If you enable blocking for the Deny URL check, the application firewall blocks any URL that is explicitly blocked by a Deny URL, even if the same URL would otherwise be allowed by the Start URL check. CLI users: To enable one or more actions, type "set appfw profile -denyURLaction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -denyURLaction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 8
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-refererheadercheck

Enable validation of Referer headers. Referer validation ensures that a web form that a user sends to your web site originally came from your web site, not an outside attacker. Although this parameter is part of the Start URL check, referer validation protects against cross-site request forgery (CSRF) attacks, not Start URL attacks. Possible values = OFF, if_present, AlwaysExceptStartURLs, AlwaysExceptFirstRequest

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 9
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cookieconsistencyaction

One or more Cookie Consistency actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -cookieConsistencyAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -cookieConsistencyAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 10
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cookiehijackingaction

One or more actions to prevent cookie hijacking. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. NOTE: Cookie Hijacking feature is not supported for TLSv1.3 CLI users: To enable one or more actions, type "set appfw profile -cookieHijackingAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -cookieHijackingAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 11
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cookietransforms

Perform the specified type of cookie transformation. Available settings function as follows:

  • Encryption - Encrypt cookies.
  • Proxying - Mask contents of server cookies by sending proxy cookie to users.
  • Cookie flags - Flag cookies as HTTP only to prevent scripts on user's browser from accessing and possibly modifying them. CAUTION: Make sure that this parameter is set to ON if you are configuring any cookie transformations. If it is set to OFF, no cookie transformations are performed regardless of any other settings. Possible values = ON, OFF
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 12
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cookieencryption

Type of cookie encryption. Available settings function as follows:

  • None - Do not encrypt cookies.
  • Decrypt Only - Decrypt encrypted cookies, but do not encrypt cookies.
  • Encrypt Session Only - Encrypt session cookies, but not permanent cookies.
  • Encrypt All - Encrypt all cookies. Possible values = none, decryptOnly, encryptSessionOnly, encryptAll
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 13
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cookieproxying

Cookie proxy setting. Available settings function as follows:

  • None - Do not proxy cookies.
  • Session Only - Proxy session cookies by using the Citrix ADC session ID, but do not proxy permanent cookies. Possible values = none, sessionOnly
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 14
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-addcookieflags

Add the specified flags to cookies. Available settings function as follows:

  • None - Do not add flags to cookies.
  • HTTP Only - Add the HTTP Only flag to cookies, which prevents scripts from accessing cookies.
  • Secure - Add Secure flag to cookies.
  • All - Add both HTTPOnly and Secure flags to cookies. Possible values = none, httpOnly, secure, all
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 15
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-fieldconsistencyaction

One or more Form Field Consistency actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -fieldConsistencyaction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -fieldConsistencyAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 16
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-csrftagaction

One or more Cross-Site Request Forgery (CSRF) Tagging actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -CSRFTagAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -CSRFTagAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 17
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-crosssitescriptingaction

One or more Cross-Site Scripting (XSS) actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -crossSiteScriptingAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -crossSiteScriptingAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 18
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-crosssitescriptingtransformunsafehtml

Transform cross-site scripts. This setting configures the application firewall to disable dangerous HTML instead of blocking the request. CAUTION: Make sure that this parameter is set to ON if you are configuring any cross-site scripting transformations. If it is set to OFF, no cross-site scripting transformations are performed regardless of any other settings. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 19
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-crosssitescriptingcheckcompleteurls

Check complete URLs for cross-site scripts, instead of just the query portions of URLs. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 20
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectionaction

One or more HTML SQL Injection actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -SQLInjectionAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -SQLInjectionAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 21
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cmdinjectionaction

Command injection action. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -cmdInjectionAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -cmdInjectionAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 22
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cmdinjectiontype

Available CMD injection types. -CMDSplChar : Checks for CMD Special Chars -CMDKeyword : Checks for CMD Keywords -CMDSplCharANDKeyword : Checks for both and blocks if both are found -CMDSplCharORKeyword : Checks for both and blocks if anyone is found. Possible values = CMDSplChar, CMDKeyword, CMDSplCharORKeyword, CMDSplCharANDKeyword

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 23
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectiontransformspecialchars

Transform injected SQL code. This setting configures the application firewall to disable SQL special strings instead of blocking the request. Since most SQL servers require a special string to activate an SQL keyword, in most cases a request that contains injected SQL code is safe if special strings are disabled. CAUTION: Make sure that this parameter is set to ON if you are configuring any SQL injection transformations. If it is set to OFF, no SQL injection transformations are performed regardless of any other settings. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 24
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectiononlycheckfieldswithsqlchars

Check only form fields that contain SQL special strings (characters) for injected SQL code. Most SQL servers require a special string to activate an SQL request, so SQL code without a special string is harmless to most SQL servers. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 25
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectiontype

Available SQL injection types. -SQLSplChar : Checks for SQL Special Chars -SQLKeyword : Checks for SQL Keywords -SQLSplCharANDKeyword : Checks for both and blocks if both are found -SQLSplCharORKeyword : Checks for both and blocks if anyone is found -None : Disables checking using both SQL Special Char and Keyword. Possible values = SQLSplChar, SQLKeyword, SQLSplCharORKeyword, SQLSplCharANDKeyword, None

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 26
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectionchecksqlwildchars

Check for form fields that contain SQL wild chars . Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 27
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectiongrammar

Check for SQL injection using SQL grammar. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 28
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-fieldformataction

One or more Field Format actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of suggested web form fields and field format assignments.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -fieldFormatAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -fieldFormatAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 29
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-defaultfieldformattype

Designate a default field type to be applied to web form fields that do not have a field type explicitly assigned to them.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 30
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-defaultfieldformatminlength

Minimum length, in characters, for data entered into a field that is assigned the default field type. To disable the minimum and maximum length settings and allow data of any length to be entered into the field, set this parameter to zero (0).

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 31
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-defaultfieldformatmaxlength

Maximum length, in characters, for data entered into a field that is assigned the default field type.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 32
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-bufferoverflowaction

One or more Buffer Overflow actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -bufferOverflowAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -bufferOverflowAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 33
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-bufferoverflowmaxurllength

Maximum length, in characters, for URLs on your protected web sites. Requests with longer URLs are blocked.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 34
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-bufferoverflowmaxheaderlength

Maximum length, in characters, for HTTP headers in requests sent to your protected web sites. Requests with longer headers are blocked.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 35
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-bufferoverflowmaxcookielength

Maximum length, in characters, for cookies sent to your protected web sites. Requests with longer cookies are blocked.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 36
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-bufferoverflowmaxquerylength

Maximum length, in bytes, for query string sent to your protected web sites. Requests with longer query strings are blocked.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 37
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-bufferoverflowmaxtotalheaderlength

Maximum length, in bytes, for the total HTTP header length in requests sent to your protected web sites. The minimum value of this and maxHeaderLen in httpProfile will be used. Requests with longer length are blocked.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 38
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-creditcardaction

One or more Credit Card actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -creditCardAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -creditCardAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 39
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-creditcard

Credit card types that the application firewall should protect. Possible values = none, visa, mastercard, discover, amex, jcb, dinersclub

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 40
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-creditcardmaxallowed

This parameter value is used by the block action. It represents the maximum number of credit card numbers that can appear on a web page served by your protected web sites. Pages that contain more credit card numbers are blocked.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 41
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-creditcardxout

Mask any credit card number detected in a response by replacing each digit, except the digits in the final group, with the letter "X.". Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 42
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-dosecurecreditcardlogging

Setting this option logs credit card numbers in the response when the match is found. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 43
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-streaming

Setting this option converts content-length form submission requests (requests with content-type "application/x-www-form-urlencoded" or "multipart/form-data") to chunked requests when atleast one of the following protections : Signatures, SQL injection protection, XSS protection, form field consistency protection, starturl closure, CSRF tagging, JSON SQL, JSON XSS, JSON DOS is enabled. Please make sure that the backend server accepts chunked requests before enabling this option. Citrix recommends enabling this option for large request sizes(>20MB). Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 44
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-trace

Toggle the state of trace. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 45
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-requestcontenttype

Default Content-Type header for requests. A Content-Type header can contain 0-255 letters, numbers, and the hyphen (-) and underscore (_) characters.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 46
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-responsecontenttype

Default Content-Type header for responses. A Content-Type header can contain 0-255 letters, numbers, and the hyphen (-) and underscore (_) characters.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 47
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonerrorobject

Name to the imported JSON Error Object to be set on application firewall profile.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 48
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonerrorstatuscode

Response status code associated with JSON error page.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 49
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonerrorstatusmessage

Response status message associated with JSON error page.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 50
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsondosaction

One or more JSON Denial-of-Service (JsonDoS) actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -JSONDoSAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -JSONDoSAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 51
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonsqlinjectionaction

One or more JSON SQL Injection actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -JSONSQLInjectionAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -JSONSQLInjectionAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 52
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonsqlinjectiontype

Available SQL injection types. -SQLSplChar : Checks for SQL Special Chars -SQLKeyword : Checks for SQL Keywords -SQLSplCharANDKeyword : Checks for both and blocks if both are found -SQLSplCharORKeyword : Checks for both and blocks if anyone is found, -None : Disables checking using both SQL Special Char and Keyword. Possible values = SQLSplChar, SQLKeyword, SQLSplCharORKeyword, SQLSplCharANDKeyword, None

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 53
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonsqlinjectiongrammar

Check for SQL injection using SQL grammar in JSON. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 54
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsoncmdinjectionaction

One or more JSON CMD Injection actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -JSONCMDInjectionAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -JSONCMDInjectionAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 55
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsoncmdinjectiontype

Available CMD injection types. -CMDSplChar : Checks for CMD Special Chars -CMDKeyword : Checks for CMD Keywords -CMDSplCharANDKeyword : Checks for both and blocks if both are found -CMDSplCharORKeyword : Checks for both and blocks if anyone is found. Possible values = CMDSplChar, CMDKeyword, CMDSplCharORKeyword, CMDSplCharANDKeyword

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 56
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-jsonxssaction

One or more JSON Cross-Site Scripting actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -JSONXssAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -JSONXssAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 57
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmldosaction

One or more XML Denial-of-Service (XDoS) actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLDoSAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLDoSAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 58
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlformataction

One or more XML Format actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLFormatAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLFormatAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 59
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlsqlinjectionaction

One or more XML SQL Injection actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLSQLInjectionAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLSQLInjectionAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 60
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlsqlinjectiononlycheckfieldswithsqlchars

Check only form fields that contain SQL special characters, which most SQL servers require before accepting an SQL command, for injected SQL. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 61
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlsqlinjectiontype

Available SQL injection types. -SQLSplChar : Checks for SQL Special Chars -SQLKeyword : Checks for SQL Keywords -SQLSplCharANDKeyword : Checks for both and blocks if both are found -SQLSplCharORKeyword : Checks for both and blocks if anyone is found. Possible values = SQLSplChar, SQLKeyword, SQLSplCharORKeyword, SQLSplCharANDKeyword, None

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 62
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlsqlinjectionchecksqlwildchars

Check for form fields that contain SQL wild chars . Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 63
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlsqlinjectionparsecomments

Parse comments in XML Data and exempt those sections of the request that are from the XML SQL Injection check. You must configure the type of comments that the application firewall is to detect and exempt from this security check. Available settings function as follows:

  • Check all - Check all content.
  • ANSI - Exempt content that is part of an ANSI (Mozilla-style) comment.
  • Nested - Exempt content that is part of a nested (Microsoft-style) comment.
  • ANSI Nested - Exempt content that is part of any type of comment. Possible values = checkall, ansi, nested, ansinested
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 64
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlxssaction

One or more XML Cross-Site Scripting actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLXSSAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLXSSAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 65
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlwsiaction

One or more Web Services Interoperability (WSI) actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLWSIAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLWSIAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 66
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlattachmentaction

One or more XML Attachment actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Learn - Use the learning engine to generate a list of exceptions to this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLAttachmentAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLAttachmentAction none". Possible values = none, block, learn, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 67
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlvalidationaction

One or more XML Validation actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLValidationAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLValidationAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 68
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlerrorobject

Name to assign to the XML Error Object, which the application firewall displays when a user request is blocked. Must begin with a letter, number, or the underscore character \(_\), and must contain only letters, numbers, and the hyphen \(-\), period \(.\) pound \(#\), space \( \), at (@), equals \(=\), colon \(:\), and underscore characters. Cannot be changed after the XML error object is added.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 69
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlerrorstatuscode

Response status code associated with XML error page.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 70
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlerrorstatusmessage

Response status message associated with XML error page.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 71
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-customsettings

Object name for custom settings. This check is applicable to Profile Type: HTML, XML. .

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 72
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-signatures

Object name for signatures. This check is applicable to Profile Type: HTML, XML. .

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 73
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-xmlsoapfaultaction

One or more XML SOAP Fault Filtering actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check.
  • Remove - Remove all violations for this security check. CLI users: To enable one or more actions, type "set appfw profile -XMLSOAPFaultAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -XMLSOAPFaultAction none". Possible values = none, block, log, remove, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 74
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-usehtmlerrorobject

Send an imported HTML Error object to a user when a request is blocked, instead of redirecting the user to the designated Error URL. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 75
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-errorurl

URL that application firewall uses as the Error URL.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 76
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-htmlerrorobject

Name to assign to the HTML Error Object. Must begin with a letter, number, or the underscore character \(_\), and must contain only letters, numbers, and the hyphen \(-\), period \(.\) pound \(#\), space \( \), at (@), equals \(=\), colon \(:\), and underscore characters. Cannot be changed after the HTML error object is added.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 77
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-htmlerrorstatuscode

Response status code associated with HTML error page.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 78
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-htmlerrorstatusmessage

Response status message associated with HTML error page.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 79
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-logeverypolicyhit

Log every profile match, regardless of security checks results. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 80
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-stripcomments

Strip HTML comments. This check is applicable to Profile Type: HTML. . Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 81
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-striphtmlcomments

Strip HTML comments before forwarding a web page sent by a protected web site in response to a user request. Possible values = none, all, exclude_script_tag

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 82
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-stripxmlcomments

Strip XML comments before forwarding a web page sent by a protected web site in response to a user request. Possible values = none, all

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 83
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-clientipexpression

Expression to get the client IP.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 84
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-dynamiclearning

One or more security checks. Available options are as follows:

  • SQLInjection - Enable dynamic learning for SQLInjection security check.
  • CrossSiteScripting - Enable dynamic learning for CrossSiteScripting security check.
  • fieldFormat - Enable dynamic learning for fieldFormat security check.
  • None - Disable security checks for all security checks. CLI users: To enable dynamic learning on one or more security checks, type "set appfw profile -dynamicLearning" followed by the security checks to be enabled. To turn off dynamic learning on all security checks, type "set appfw profile -dynamicLearning none". Possible values = none, SQLInjection, CrossSiteScripting, fieldFormat, startURL, cookieConsistency, fieldConsistency, CSRFtag, ContentType
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 85
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-exemptclosureurlsfromsecuritychecks

Exempt URLs that pass the Start URL closure check from SQL injection, cross-site script, field format and field consistency security checks at locations other than headers. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 86
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-defaultcharset

Default character set for protected web pages. Web pages sent by your protected web sites in response to user requests are assigned this character set if the page does not already specify a character set. The character sets supported by the application firewall are:

  • iso-8859-1 (English US)
  • big5 (Chinese Traditional)
  • gb2312 (Chinese Simplified)
  • sjis (Japanese Shift-JIS)
  • euc-jp (Japanese EUC-JP)
  • iso-8859-9 (Turkish)
  • utf-8 (Unicode)
  • euc-kr (Korean).
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 87
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-postbodylimit

Maximum allowed HTTP post body size, in bytes. Maximum supported value is 10GB. Citrix recommends enabling streaming option for large values of post body limit (>20MB).

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 88
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-postbodylimitaction

One or more Post Body Limit actions. Available settings function as follows:

  • Block - Block connections that violate this security check. Must always be set.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check. CLI users: To enable one or more actions, type "set appfw profile -PostBodyLimitAction block" followed by the other actions to be enabled. Possible values = block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 89
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-postbodylimitsignature

Maximum allowed HTTP post body size for signature inspection for location HTTP_POST_BODY in the signatures, in bytes. Note that the changes in value could impact CPU and latency profile.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 90
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-fileuploadmaxnum

Maximum allowed number of file uploads per form-submission request. The maximum setting (65535) allows an unlimited number of uploads.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 91
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-canonicalizehtmlresponse

Perform HTML entity encoding for any special characters in responses sent by your protected web sites. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 92
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-enableformtagging

Enable tagging of web form fields for use by the Form Field Consistency and CSRF Form Tagging checks. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 93
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sessionlessfieldconsistency

Perform sessionless Field Consistency Checks. Possible values = OFF, ON, postOnly

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 94
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sessionlessurlclosure

Enable session less URL Closure Checks. This check is applicable to Profile Type: HTML. . Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 95
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-semicolonfieldseparator

Allow ';' as a form field separator in URL queries and POST form bodies. . Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 96
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-excludefileuploadfromchecks

Exclude uploaded files from Form checks. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 97
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectionparsecomments

Parse HTML comments and exempt them from the HTML SQL Injection check. You must specify the type of comments that the application firewall is to detect and exempt from this security check. Available settings function as follows:

  • Check all - Check all content.
  • ANSI - Exempt content that is part of an ANSI (Mozilla-style) comment.
  • Nested - Exempt content that is part of a nested (Microsoft-style) comment.
  • ANSI Nested - Exempt content that is part of any type of comment. Possible values = checkall, ansi, nested, ansinested
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 98
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-invalidpercenthandling

Configure the method that the application firewall uses to handle percent-encoded names and values. Available settings function as follows:

  • apache_mode - Apache format.
  • asp_mode - Microsoft ASP format.
  • secure_mode - Secure format. Possible values = apache_mode, asp_mode, secure_mode
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 99
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-type

Application firewall profile type, which controls which security checks and settings are applied to content that is filtered with the profile. Available settings function as follows:

  • HTML - HTML-based web sites.
  • XML - XML-based web sites and services.
  • JSON - JSON-based web sites and services.
  • HTML XML (Web 2.0) - Sites that contain both HTML and XML content, such as ATOM feeds, blogs, and RSS feeds.
  • HTML JSON - Sites that contain both HTML and JSON content.
  • XML JSON - Sites that contain both XML and JSON content.
  • HTML XML JSON - Sites that contain HTML, XML and JSON content. Possible values = HTML, XML, JSON
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 100
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-checkrequestheaders

Check request headers as well as web forms for injected SQL and cross-site scripts. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 101
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-inspectquerycontenttypes

Inspect request query as well as web forms for injected SQL and cross-site scripts for following content types. Possible values = HTML, XML, JSON, OTHER

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 102
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-optimizepartialreqs

Optimize handle of HTTP partial requests i.e. those with range headers. Available settings are as follows:

  • ON - Partial requests by the client result in partial requests to the backend server in most cases.
  • OFF - Partial requests by the client are changed to full requests to the backend server. Possible values = ON, OFF
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 103
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-urldecoderequestcookies

URL Decode request cookies before subjecting them to SQL and cross-site scripting checks. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 104
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-comment

Any comments about the purpose of profile, or other useful information about the profile.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 105
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-percentdecoderecursively

Configure whether the application firewall should use percentage recursive decoding. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 106
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-multipleheaderaction

One or more multiple header actions. Available settings function as follows:

  • Block - Block connections that have multiple headers.
  • Log - Log connections that have multiple headers.
  • KeepLast - Keep only last header when multiple headers are present. CLI users: To enable one or more actions, type "set appfw profile -multipleHeaderAction" followed by the actions to be enabled. Possible values = block, keepLast, log, none
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 107
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-rfcprofile

Object name of the rfc profile.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 108
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-fileuploadtypesaction

One or more file upload types actions. Available settings function as follows:

  • Block - Block connections that violate this security check.
  • Log - Log violations of this security check.
  • Stats - Generate statistics for this security check.
  • None - Disable all actions for this security check. CLI users: To enable one or more actions, type "set appfw profile -fileUploadTypeAction" followed by the actions to be enabled. To turn off all actions, type "set appfw profile -fileUploadTypeAction none". Possible values = none, block, log, stats
Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 109
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-verboseloglevel

Detailed Logging Verbose Log Level. Possible values = pattern, patternPayload, patternPayloadHeader

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 110
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-insertcookiesamesiteattribute

Configure whether application firewall should add samesite attribute for set-cookies. Possible values = ON, OFF

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 111
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-cookiesamesiteattribute

Cookie Samesite attribute added to support adding cookie SameSite attribute for all set-cookies including appfw session cookies. Default value will be "SameSite=Lax". Possible values = None, LAX, STRICT

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 112
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-sqlinjectionruletype

Specifies SQL Injection rule type: ALLOW/DENY. If ALLOW rule type is configured then allow list rules are used, if DENY rule type is configured then deny rules are used. Possible values = ALLOW, DENY

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: 113
Default value: False
Accept pipeline input: False
Accept wildcard characters: False

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.

Type: SwitchParameter
Parameter Sets: (All)
Aliases: wi

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Confirm

Prompts you for confirmation before running the cmdlet.

Type: SwitchParameter
Parameter Sets: (All)
Aliases: cf

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

NOTES

File Name : Invoke-ADCUnsetAppfwprofile Version : v2111.2521 Author : John Billekens Reference : https://developer-docs.citrix.com/projects/citrix-adc-nitro-api-reference/en/latest/configuration/appfw/appfwprofile Requires : PowerShell v5.1 and up ADC 13.x and up. ADC 12 and lower may work, not guaranteed.

RELATED LINKS

https://blog.j81.nl

⚠️ **GitHub.com Fallback** ⚠️