From fa05015b2b51f68c2b5948d35e1bf707135380b9 Mon Sep 17 00:00:00 2001 From: Felipe Zimmerle Date: Mon, 4 May 2015 14:42:39 -0300 Subject: [PATCH] SecConnEngine --- Reference-Manual.mediawiki | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/Reference-Manual.mediawiki b/Reference-Manual.mediawiki index 1784730..5b4e113 100644 --- a/Reference-Manual.mediawiki +++ b/Reference-Manual.mediawiki @@ -543,7 +543,7 @@ You should be aware that the internal chroot feature might not be 100% reliable. This directive should be used to make the presence of significant rule sets known. The entire signature will be recorded in the transaction audit log. == SecConnEngine == -'''Description:''' Configures the connections engine. +'''Description:''' Configures the connections engine. This directive affect the commands: SecConnReadStateLimit and SecConnWriteStateLimit '''Syntax:''' SecConnEngine On|Off|DetectionOnly @@ -551,12 +551,12 @@ This directive should be used to make the presence of significant rule sets know '''Scope:''' Any -'''Version:''' 2.8.0 +'''Version:''' 2.8.0+ -Analog to SecRuleEngine, the possible values are: -*'''On''': process rules, quietly. -*'''Off''': do not process rules. -*'''DetectionOnly''': process rules in verbose mode but never executes any disruptive actions +Possible values are (Same as SecRuleEngine): +*'''On''': process SecConn[Read|Write]StateLimit. +*'''Off''': Ignore the directives SecConn[Read|Write]StateLimit +*'''DetectionOnly''': process SecConn[Read|Write]StateLimit definitions in verbose mode but never executes any disruptive actions == SecContentInjection == '''Description:''' Enables content injection using actions append and prepend.