Action | Purpose | Action description | Subsequent action |
Block | Used to block request access to the site (including Cache or non-Cache content). | Responded with an intercept page and intercept status code. | No longer match other Rules. |
Allow | Used to skip the remaining rules of the current Security module. | In the current module, the remaining rules no longer match the request. | Continue to match other Effective rules. |
Observe | Used for evaluating or Canary security policy. | Only records log, does not take action. | Continue to match other rules. |
JavaScript challenge | Used to identify Clients that do not support JavaScript Note 1, commonly found in DDoS attack sources, scanning tools, etc. | Responded with a redirect (HTTP 302) page, the page carries JavaScript code to verify the browser behavior of the Client, and only visitors who pass the verification can continue to access. | Requests that pass the challenge continue to match other rules. |
Managed challenge | Used for bot confrontation, first perform JavaScript challenge verification, and then perform CAPTCHA human-machine verification for requests that pass the verification. | First, perform a JavaScript challenge; for Clients that pass the verification, respond with a redirect (HTTP 302) page, carry a CAPTCHA verification, and the user completes the verification through interactive operation. Only visitors who pass both verifications can continue to access. | Requests that pass the challenge continue to match other rules. |
Drop w/o response | Belongs to a more intense bot confrontation mechanism, limiting bot concurrent ability by consuming bot network connections. | Maintain TCP connections, but no longer respond to any HTTP Data. | No longer match other management strategies. |
Add short latency | Randomly wait 1-5 seconds before responding. | No longer match other management strategies. | |
Add long latency | Randomly wait 8-10 seconds before responding. | No longer match other management strategies. |
Was this page helpful?