1. Packages
  2. Tencentcloud Provider
  3. API Docs
  4. TeoSecurityPolicyConfig
tencentcloud 1.82.1 published on Monday, Jun 16, 2025 by tencentcloudstack

tencentcloud.TeoSecurityPolicyConfig

Explore with Pulumi AI

tencentcloud logo
tencentcloud 1.82.1 published on Monday, Jun 16, 2025 by tencentcloudstack

    Provides a resource to create a teo security policy

    NOTE: If the user’s EO version is the personal version, managed_rule_groups needs to set one; If the user’s EO version is a non personal version, managed_rule_groups needs to set 17. If the user does not set the managed_rule_groups parameter, the system will generate it by default.

    Example Usage

    If entity is ZoneDefaultPolicy

    Coming soon!
    
    Coming soon!
    
    Coming soon!
    
    Coming soon!
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.tencentcloud.TeoSecurityPolicyConfig;
    import com.pulumi.tencentcloud.TeoSecurityPolicyConfigArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyExceptionRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParametersArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParametersArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRateArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeoutArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new TeoSecurityPolicyConfig("example", TeoSecurityPolicyConfigArgs.builder()
                .entity("ZoneDefaultPolicy")
                .securityPolicy(TeoSecurityPolicyConfigSecurityPolicyArgs.builder()
                    .customRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs.builder()
                        .basicAccessRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs.builder()
                                .name("Deny")
                                .build())
                            .condition("${http.request.ip} in ['119.28.103.58']")
                            .enabled("off")
                            .name("rule2")
                            .build())
                        .preciseMatchRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs.builder()
                                .blockIpActionParameters(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs.builder()
                                    .duration("120s")
                                    .build())
                                .name("BlockIP")
                                .build())
                            .condition("${http.request.host} contain ['test']")
                            .enabled("on")
                            .name("rule1")
                            .priority(50)
                            .build())
                        .build())
                    .exceptionRules(TeoSecurityPolicyConfigSecurityPolicyExceptionRulesArgs.builder()
                        .rules(TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleArgs.builder()
                            .condition("${http.request.method} in ['POST'] and ${http.request.uri.path} in ['/api/EventLogUpload']")
                            .enabled("off")
                            .name("High-frequency API bypasses rate limits")
                            .skipOption("SkipOnAllRequestFields")
                            .skipScope("WebSecurityModules")
                            .webSecurityModulesForException("websec-mod-adaptive-control")
                            .build())
                        .build())
                    .httpDdosProtection(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionArgs.builder()
                        .adaptiveFrequencyControl(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionArgs.builder()
                                .challengeActionParameters(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParametersArgs.builder()
                                    .challengeOption("JSChallenge")
                                    .build())
                                .name("Challenge")
                                .build())
                            .enabled("on")
                            .sensitivity("Loose")
                            .build())
                        .bandwidthAbuseDefense(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionArgs.builder()
                                .name("Deny")
                                .build())
                            .enabled("on")
                            .build())
                        .clientFiltering(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionArgs.builder()
                                .challengeActionParameters(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParametersArgs.builder()
                                    .challengeOption("JSChallenge")
                                    .build())
                                .name("Challenge")
                                .build())
                            .enabled("on")
                            .build())
                        .slowAttackDefense(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionArgs.builder()
                                .name("Deny")
                                .build())
                            .enabled("on")
                            .minimalRequestBodyTransferRate(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRateArgs.builder()
                                .countingPeriod("60s")
                                .enabled("on")
                                .minimalAvgTransferRateThreshold("80bps")
                                .build())
                            .requestBodyTransferTimeout(TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeoutArgs.builder()
                                .enabled("on")
                                .idleTimeout("5s")
                                .build())
                            .build())
                        .build())
                    .managedRules(TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs.builder()
                        .autoUpdate(TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs.builder()
                            .autoUpdateToLatestVersion("off")
                            .build())
                        .detectionOnly("off")
                        .enabled("on")
                        .managedRuleGroups(                    
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-webshell-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-xxe-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-non-compliant-protocol-usages")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-file-upload-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-command-and-code-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ldap-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ssrf-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-unauthorized-accesses")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-xss-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-vulnerability-scanners")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-cms-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-other-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-sql-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-unauthorized-file-accesses")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-oa-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ssti-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-shiro-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build())
                        .semanticAnalysis("off")
                        .build())
                    .rateLimitingRules(TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesArgs.builder()
                        .rules(TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionArgs.builder()
                                .challengeActionParameters(TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParametersArgs.builder()
                                    .challengeOption("JSChallenge")
                                    .build())
                                .name("Challenge")
                                .build())
                            .actionDuration("30m")
                            .condition("${http.request.uri.path} contain ['/checkout/submit']")
                            .countBy("http.request.ip")
                            .countingPeriod("60s")
                            .enabled("on")
                            .maxRequestThreshold(300)
                            .name("Single IP request rate limit")
                            .priority(50)
                            .build())
                        .build())
                    .build())
                .zoneId("zone-37u62pwxfo8s")
                .build());
    
        }
    }
    
    resources:
      example:
        type: tencentcloud:TeoSecurityPolicyConfig
        properties:
          entity: ZoneDefaultPolicy
          securityPolicy:
            customRules:
              basicAccessRules:
                - action:
                    name: Deny
                  condition: $${http.request.ip} in ['119.28.103.58']
                  enabled: off
                  name: rule2
              preciseMatchRules:
                - action:
                    blockIpActionParameters:
                      duration: 120s
                    name: BlockIP
                  condition: $${http.request.host} contain ['test']
                  enabled: on
                  name: rule1
                  priority: 50
            exceptionRules:
              rules:
                - condition: $${http.request.method} in ['POST'] and $${http.request.uri.path} in ['/api/EventLogUpload']
                  enabled: off
                  name: High-frequency API bypasses rate limits
                  skipOption: SkipOnAllRequestFields
                  skipScope: WebSecurityModules
                  webSecurityModulesForException:
                    - websec-mod-adaptive-control
            httpDdosProtection:
              adaptiveFrequencyControl:
                action:
                  challengeActionParameters:
                    challengeOption: JSChallenge
                  name: Challenge
                enabled: on
                sensitivity: Loose
              bandwidthAbuseDefense:
                action:
                  name: Deny
                enabled: on
              clientFiltering:
                action:
                  challengeActionParameters:
                    challengeOption: JSChallenge
                  name: Challenge
                enabled: on
              slowAttackDefense:
                action:
                  name: Deny
                enabled: on
                minimalRequestBodyTransferRate:
                  countingPeriod: 60s
                  enabled: on
                  minimalAvgTransferRateThreshold: 80bps
                requestBodyTransferTimeout:
                  enabled: on
                  idleTimeout: 5s
            managedRules:
              autoUpdate:
                autoUpdateToLatestVersion: off
              detectionOnly: off
              enabled: on
              managedRuleGroups:
                - action:
                    name: Deny
                  groupId: wafgroup-webshell-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-xxe-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-non-compliant-protocol-usages
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-file-upload-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-command-and-code-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ldap-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ssrf-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-unauthorized-accesses
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-xss-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-vulnerability-scanners
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-cms-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-other-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-sql-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-unauthorized-file-accesses
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-oa-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ssti-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-shiro-vulnerabilities
                  sensitivityLevel: strict
              semanticAnalysis: off
            rateLimitingRules:
              rules:
                - action:
                    challengeActionParameters:
                      challengeOption: JSChallenge
                    name: Challenge
                  actionDuration: 30m
                  condition: $${http.request.uri.path} contain ['/checkout/submit']
                  countBy:
                    - http.request.ip
                  countingPeriod: 60s
                  enabled: on
                  maxRequestThreshold: 300
                  name: Single IP request rate limit
                  priority: 50
          zoneId: zone-37u62pwxfo8s
    

    If entity is Host

    import * as pulumi from "@pulumi/pulumi";
    import * as tencentcloud from "@pulumi/tencentcloud";
    
    const example = new tencentcloud.TeoSecurityPolicyConfig("example", {
        entity: "Host",
        host: "www.example.com",
        securityPolicy: {
            customRules: {
                basicAccessRules: [{
                    action: {
                        name: "Deny",
                    },
                    condition: "${http.request.ip} in ['119.28.103.58']",
                    enabled: "off",
                    name: "rule2",
                }],
                preciseMatchRules: [{
                    action: {
                        blockIpActionParameters: {
                            duration: "120s",
                        },
                        name: "BlockIP",
                    },
                    condition: "${http.request.host} contain ['abc']",
                    enabled: "on",
                    name: "rule1",
                    priority: 50,
                }],
            },
            managedRules: {
                autoUpdate: {
                    autoUpdateToLatestVersion: "off",
                },
                detectionOnly: "off",
                enabled: "on",
                managedRuleGroups: [
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-webshell-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-xxe-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-non-compliant-protocol-usages",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-file-upload-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-command-and-code-injections",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-ldap-injections",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-ssrf-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-unauthorized-accesses",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-xss-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-vulnerability-scanners",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-cms-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-other-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-sql-injections",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-unauthorized-file-accesses",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-oa-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-ssti-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-shiro-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                ],
                semanticAnalysis: "off",
            },
        },
        zoneId: "zone-37u62pwxfo8s",
    });
    
    import pulumi
    import pulumi_tencentcloud as tencentcloud
    
    example = tencentcloud.TeoSecurityPolicyConfig("example",
        entity="Host",
        host="www.example.com",
        security_policy={
            "custom_rules": {
                "basic_access_rules": [{
                    "action": {
                        "name": "Deny",
                    },
                    "condition": "${http.request.ip} in ['119.28.103.58']",
                    "enabled": "off",
                    "name": "rule2",
                }],
                "precise_match_rules": [{
                    "action": {
                        "block_ip_action_parameters": {
                            "duration": "120s",
                        },
                        "name": "BlockIP",
                    },
                    "condition": "${http.request.host} contain ['abc']",
                    "enabled": "on",
                    "name": "rule1",
                    "priority": 50,
                }],
            },
            "managed_rules": {
                "auto_update": {
                    "auto_update_to_latest_version": "off",
                },
                "detection_only": "off",
                "enabled": "on",
                "managed_rule_groups": [
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-webshell-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-xxe-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-non-compliant-protocol-usages",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-file-upload-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-command-and-code-injections",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-ldap-injections",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-ssrf-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-unauthorized-accesses",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-xss-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-vulnerability-scanners",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-cms-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-other-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-sql-injections",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-unauthorized-file-accesses",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-oa-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-ssti-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-shiro-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                ],
                "semantic_analysis": "off",
            },
        },
        zone_id="zone-37u62pwxfo8s")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/tencentcloud/tencentcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := tencentcloud.NewTeoSecurityPolicyConfig(ctx, "example", &tencentcloud.TeoSecurityPolicyConfigArgs{
    			Entity: pulumi.String("Host"),
    			Host:   pulumi.String("www.example.com"),
    			SecurityPolicy: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyArgs{
    				CustomRules: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs{
    					BasicAccessRules: tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArray{
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							Condition: pulumi.String("${http.request.ip} in ['119.28.103.58']"),
    							Enabled:   pulumi.String("off"),
    							Name:      pulumi.String("rule2"),
    						},
    					},
    					PreciseMatchRules: tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArray{
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs{
    								BlockIpActionParameters: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs{
    									Duration: pulumi.String("120s"),
    								},
    								Name: pulumi.String("BlockIP"),
    							},
    							Condition: pulumi.String("${http.request.host} contain ['abc']"),
    							Enabled:   pulumi.String("on"),
    							Name:      pulumi.String("rule1"),
    							Priority:  pulumi.Float64(50),
    						},
    					},
    				},
    				ManagedRules: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs{
    					AutoUpdate: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs{
    						AutoUpdateToLatestVersion: pulumi.String("off"),
    					},
    					DetectionOnly: pulumi.String("off"),
    					Enabled:       pulumi.String("on"),
    					ManagedRuleGroups: tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArray{
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-webshell-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-xxe-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-non-compliant-protocol-usages"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-file-upload-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-command-and-code-injections"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-ldap-injections"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-ssrf-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-unauthorized-accesses"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-xss-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-vulnerability-scanners"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-cms-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-other-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-sql-injections"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-unauthorized-file-accesses"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-oa-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-ssti-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-shiro-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    					},
    					SemanticAnalysis: pulumi.String("off"),
    				},
    			},
    			ZoneId: pulumi.String("zone-37u62pwxfo8s"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Tencentcloud = Pulumi.Tencentcloud;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Tencentcloud.TeoSecurityPolicyConfig("example", new()
        {
            Entity = "Host",
            Host = "www.example.com",
            SecurityPolicy = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyArgs
            {
                CustomRules = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs
                {
                    BasicAccessRules = new[]
                    {
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs
                            {
                                Name = "Deny",
                            },
                            Condition = "${http.request.ip} in ['119.28.103.58']",
                            Enabled = "off",
                            Name = "rule2",
                        },
                    },
                    PreciseMatchRules = new[]
                    {
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs
                            {
                                BlockIpActionParameters = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs
                                {
                                    Duration = "120s",
                                },
                                Name = "BlockIP",
                            },
                            Condition = "${http.request.host} contain ['abc']",
                            Enabled = "on",
                            Name = "rule1",
                            Priority = 50,
                        },
                    },
                },
                ManagedRules = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs
                {
                    AutoUpdate = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs
                    {
                        AutoUpdateToLatestVersion = "off",
                    },
                    DetectionOnly = "off",
                    Enabled = "on",
                    ManagedRuleGroups = new[]
                    {
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-webshell-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-xxe-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-non-compliant-protocol-usages",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-file-upload-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-command-and-code-injections",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-ldap-injections",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-ssrf-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-unauthorized-accesses",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-xss-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-vulnerability-scanners",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-cms-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-other-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-sql-injections",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-unauthorized-file-accesses",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-oa-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-ssti-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-shiro-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                    },
                    SemanticAnalysis = "off",
                },
            },
            ZoneId = "zone-37u62pwxfo8s",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.tencentcloud.TeoSecurityPolicyConfig;
    import com.pulumi.tencentcloud.TeoSecurityPolicyConfigArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new TeoSecurityPolicyConfig("example", TeoSecurityPolicyConfigArgs.builder()
                .entity("Host")
                .host("www.example.com")
                .securityPolicy(TeoSecurityPolicyConfigSecurityPolicyArgs.builder()
                    .customRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs.builder()
                        .basicAccessRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs.builder()
                                .name("Deny")
                                .build())
                            .condition("${http.request.ip} in ['119.28.103.58']")
                            .enabled("off")
                            .name("rule2")
                            .build())
                        .preciseMatchRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs.builder()
                                .blockIpActionParameters(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs.builder()
                                    .duration("120s")
                                    .build())
                                .name("BlockIP")
                                .build())
                            .condition("${http.request.host} contain ['abc']")
                            .enabled("on")
                            .name("rule1")
                            .priority(50)
                            .build())
                        .build())
                    .managedRules(TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs.builder()
                        .autoUpdate(TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs.builder()
                            .autoUpdateToLatestVersion("off")
                            .build())
                        .detectionOnly("off")
                        .enabled("on")
                        .managedRuleGroups(                    
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-webshell-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-xxe-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-non-compliant-protocol-usages")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-file-upload-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-command-and-code-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ldap-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ssrf-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-unauthorized-accesses")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-xss-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-vulnerability-scanners")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-cms-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-other-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-sql-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-unauthorized-file-accesses")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-oa-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ssti-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-shiro-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build())
                        .semanticAnalysis("off")
                        .build())
                    .build())
                .zoneId("zone-37u62pwxfo8s")
                .build());
    
        }
    }
    
    resources:
      example:
        type: tencentcloud:TeoSecurityPolicyConfig
        properties:
          entity: Host
          host: www.example.com
          securityPolicy:
            customRules:
              basicAccessRules:
                - action:
                    name: Deny
                  condition: $${http.request.ip} in ['119.28.103.58']
                  enabled: off
                  name: rule2
              preciseMatchRules:
                - action:
                    blockIpActionParameters:
                      duration: 120s
                    name: BlockIP
                  condition: $${http.request.host} contain ['abc']
                  enabled: on
                  name: rule1
                  priority: 50
            managedRules:
              autoUpdate:
                autoUpdateToLatestVersion: off
              detectionOnly: off
              enabled: on
              managedRuleGroups:
                - action:
                    name: Deny
                  groupId: wafgroup-webshell-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-xxe-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-non-compliant-protocol-usages
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-file-upload-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-command-and-code-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ldap-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ssrf-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-unauthorized-accesses
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-xss-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-vulnerability-scanners
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-cms-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-other-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-sql-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-unauthorized-file-accesses
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-oa-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ssti-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-shiro-vulnerabilities
                  sensitivityLevel: strict
              semanticAnalysis: off
          zoneId: zone-37u62pwxfo8s
    

    If entity is Template

    import * as pulumi from "@pulumi/pulumi";
    import * as tencentcloud from "@pulumi/tencentcloud";
    
    const example = new tencentcloud.TeoSecurityPolicyConfig("example", {
        entity: "Template",
        securityPolicy: {
            customRules: {
                basicAccessRules: [{
                    action: {
                        name: "Deny",
                    },
                    condition: "${http.request.ip} in ['119.28.103.58']",
                    enabled: "off",
                    name: "rule2",
                }],
                preciseMatchRules: [{
                    action: {
                        blockIpActionParameters: {
                            duration: "120s",
                        },
                        name: "BlockIP",
                    },
                    condition: "${http.request.host} contain ['abc']",
                    enabled: "on",
                    name: "rule1",
                    priority: 50,
                }],
            },
            managedRules: {
                autoUpdate: {
                    autoUpdateToLatestVersion: "off",
                },
                detectionOnly: "off",
                enabled: "on",
                managedRuleGroups: [
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-webshell-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-xxe-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-non-compliant-protocol-usages",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-file-upload-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-command-and-code-injections",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-ldap-injections",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-ssrf-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-unauthorized-accesses",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-xss-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-vulnerability-scanners",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-cms-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-other-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-sql-injections",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-unauthorized-file-accesses",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-oa-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-ssti-attacks",
                        sensitivityLevel: "strict",
                    },
                    {
                        action: {
                            name: "Deny",
                        },
                        groupId: "wafgroup-shiro-vulnerabilities",
                        sensitivityLevel: "strict",
                    },
                ],
                semanticAnalysis: "off",
            },
        },
        templateId: "temp-05dtxkyw",
        zoneId: "zone-37u62pwxfo8s",
    });
    
    import pulumi
    import pulumi_tencentcloud as tencentcloud
    
    example = tencentcloud.TeoSecurityPolicyConfig("example",
        entity="Template",
        security_policy={
            "custom_rules": {
                "basic_access_rules": [{
                    "action": {
                        "name": "Deny",
                    },
                    "condition": "${http.request.ip} in ['119.28.103.58']",
                    "enabled": "off",
                    "name": "rule2",
                }],
                "precise_match_rules": [{
                    "action": {
                        "block_ip_action_parameters": {
                            "duration": "120s",
                        },
                        "name": "BlockIP",
                    },
                    "condition": "${http.request.host} contain ['abc']",
                    "enabled": "on",
                    "name": "rule1",
                    "priority": 50,
                }],
            },
            "managed_rules": {
                "auto_update": {
                    "auto_update_to_latest_version": "off",
                },
                "detection_only": "off",
                "enabled": "on",
                "managed_rule_groups": [
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-webshell-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-xxe-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-non-compliant-protocol-usages",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-file-upload-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-command-and-code-injections",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-ldap-injections",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-ssrf-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-unauthorized-accesses",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-xss-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-vulnerability-scanners",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-cms-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-other-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-sql-injections",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-unauthorized-file-accesses",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-oa-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-ssti-attacks",
                        "sensitivity_level": "strict",
                    },
                    {
                        "action": {
                            "name": "Deny",
                        },
                        "group_id": "wafgroup-shiro-vulnerabilities",
                        "sensitivity_level": "strict",
                    },
                ],
                "semantic_analysis": "off",
            },
        },
        template_id="temp-05dtxkyw",
        zone_id="zone-37u62pwxfo8s")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/tencentcloud/tencentcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := tencentcloud.NewTeoSecurityPolicyConfig(ctx, "example", &tencentcloud.TeoSecurityPolicyConfigArgs{
    			Entity: pulumi.String("Template"),
    			SecurityPolicy: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyArgs{
    				CustomRules: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs{
    					BasicAccessRules: tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArray{
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							Condition: pulumi.String("${http.request.ip} in ['119.28.103.58']"),
    							Enabled:   pulumi.String("off"),
    							Name:      pulumi.String("rule2"),
    						},
    					},
    					PreciseMatchRules: tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArray{
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs{
    								BlockIpActionParameters: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs{
    									Duration: pulumi.String("120s"),
    								},
    								Name: pulumi.String("BlockIP"),
    							},
    							Condition: pulumi.String("${http.request.host} contain ['abc']"),
    							Enabled:   pulumi.String("on"),
    							Name:      pulumi.String("rule1"),
    							Priority:  pulumi.Float64(50),
    						},
    					},
    				},
    				ManagedRules: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs{
    					AutoUpdate: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs{
    						AutoUpdateToLatestVersion: pulumi.String("off"),
    					},
    					DetectionOnly: pulumi.String("off"),
    					Enabled:       pulumi.String("on"),
    					ManagedRuleGroups: tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArray{
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-webshell-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-xxe-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-non-compliant-protocol-usages"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-file-upload-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-command-and-code-injections"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-ldap-injections"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-ssrf-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-unauthorized-accesses"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-xss-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-vulnerability-scanners"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-cms-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-other-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-sql-injections"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-unauthorized-file-accesses"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-oa-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-ssti-attacks"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    						&tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs{
    							Action: &tencentcloud.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs{
    								Name: pulumi.String("Deny"),
    							},
    							GroupId:          pulumi.String("wafgroup-shiro-vulnerabilities"),
    							SensitivityLevel: pulumi.String("strict"),
    						},
    					},
    					SemanticAnalysis: pulumi.String("off"),
    				},
    			},
    			TemplateId: pulumi.String("temp-05dtxkyw"),
    			ZoneId:     pulumi.String("zone-37u62pwxfo8s"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Tencentcloud = Pulumi.Tencentcloud;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Tencentcloud.TeoSecurityPolicyConfig("example", new()
        {
            Entity = "Template",
            SecurityPolicy = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyArgs
            {
                CustomRules = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs
                {
                    BasicAccessRules = new[]
                    {
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs
                            {
                                Name = "Deny",
                            },
                            Condition = "${http.request.ip} in ['119.28.103.58']",
                            Enabled = "off",
                            Name = "rule2",
                        },
                    },
                    PreciseMatchRules = new[]
                    {
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs
                            {
                                BlockIpActionParameters = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs
                                {
                                    Duration = "120s",
                                },
                                Name = "BlockIP",
                            },
                            Condition = "${http.request.host} contain ['abc']",
                            Enabled = "on",
                            Name = "rule1",
                            Priority = 50,
                        },
                    },
                },
                ManagedRules = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs
                {
                    AutoUpdate = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs
                    {
                        AutoUpdateToLatestVersion = "off",
                    },
                    DetectionOnly = "off",
                    Enabled = "on",
                    ManagedRuleGroups = new[]
                    {
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-webshell-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-xxe-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-non-compliant-protocol-usages",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-file-upload-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-command-and-code-injections",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-ldap-injections",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-ssrf-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-unauthorized-accesses",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-xss-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-vulnerability-scanners",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-cms-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-other-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-sql-injections",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-unauthorized-file-accesses",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-oa-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-ssti-attacks",
                            SensitivityLevel = "strict",
                        },
                        new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs
                        {
                            Action = new Tencentcloud.Inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs
                            {
                                Name = "Deny",
                            },
                            GroupId = "wafgroup-shiro-vulnerabilities",
                            SensitivityLevel = "strict",
                        },
                    },
                    SemanticAnalysis = "off",
                },
            },
            TemplateId = "temp-05dtxkyw",
            ZoneId = "zone-37u62pwxfo8s",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.tencentcloud.TeoSecurityPolicyConfig;
    import com.pulumi.tencentcloud.TeoSecurityPolicyConfigArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs;
    import com.pulumi.tencentcloud.inputs.TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new TeoSecurityPolicyConfig("example", TeoSecurityPolicyConfigArgs.builder()
                .entity("Template")
                .securityPolicy(TeoSecurityPolicyConfigSecurityPolicyArgs.builder()
                    .customRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs.builder()
                        .basicAccessRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs.builder()
                                .name("Deny")
                                .build())
                            .condition("${http.request.ip} in ['119.28.103.58']")
                            .enabled("off")
                            .name("rule2")
                            .build())
                        .preciseMatchRules(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs.builder()
                            .action(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs.builder()
                                .blockIpActionParameters(TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs.builder()
                                    .duration("120s")
                                    .build())
                                .name("BlockIP")
                                .build())
                            .condition("${http.request.host} contain ['abc']")
                            .enabled("on")
                            .name("rule1")
                            .priority(50)
                            .build())
                        .build())
                    .managedRules(TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs.builder()
                        .autoUpdate(TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs.builder()
                            .autoUpdateToLatestVersion("off")
                            .build())
                        .detectionOnly("off")
                        .enabled("on")
                        .managedRuleGroups(                    
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-webshell-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-xxe-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-non-compliant-protocol-usages")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-file-upload-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-command-and-code-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ldap-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ssrf-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-unauthorized-accesses")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-xss-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-vulnerability-scanners")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-cms-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-other-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-sql-injections")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-unauthorized-file-accesses")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-oa-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-ssti-attacks")
                                .sensitivityLevel("strict")
                                .build(),
                            TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs.builder()
                                .action(TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs.builder()
                                    .name("Deny")
                                    .build())
                                .groupId("wafgroup-shiro-vulnerabilities")
                                .sensitivityLevel("strict")
                                .build())
                        .semanticAnalysis("off")
                        .build())
                    .build())
                .templateId("temp-05dtxkyw")
                .zoneId("zone-37u62pwxfo8s")
                .build());
    
        }
    }
    
    resources:
      example:
        type: tencentcloud:TeoSecurityPolicyConfig
        properties:
          entity: Template
          securityPolicy:
            customRules:
              basicAccessRules:
                - action:
                    name: Deny
                  condition: $${http.request.ip} in ['119.28.103.58']
                  enabled: off
                  name: rule2
              preciseMatchRules:
                - action:
                    blockIpActionParameters:
                      duration: 120s
                    name: BlockIP
                  condition: $${http.request.host} contain ['abc']
                  enabled: on
                  name: rule1
                  priority: 50
            managedRules:
              autoUpdate:
                autoUpdateToLatestVersion: off
              detectionOnly: off
              enabled: on
              managedRuleGroups:
                - action:
                    name: Deny
                  groupId: wafgroup-webshell-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-xxe-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-non-compliant-protocol-usages
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-file-upload-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-command-and-code-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ldap-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ssrf-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-unauthorized-accesses
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-xss-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-vulnerability-scanners
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-cms-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-other-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-sql-injections
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-unauthorized-file-accesses
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-oa-vulnerabilities
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-ssti-attacks
                  sensitivityLevel: strict
                - action:
                    name: Deny
                  groupId: wafgroup-shiro-vulnerabilities
                  sensitivityLevel: strict
              semanticAnalysis: off
          templateId: temp-05dtxkyw
          zoneId: zone-37u62pwxfo8s
    

    Create TeoSecurityPolicyConfig Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new TeoSecurityPolicyConfig(name: string, args: TeoSecurityPolicyConfigArgs, opts?: CustomResourceOptions);
    @overload
    def TeoSecurityPolicyConfig(resource_name: str,
                                args: TeoSecurityPolicyConfigArgs,
                                opts: Optional[ResourceOptions] = None)
    
    @overload
    def TeoSecurityPolicyConfig(resource_name: str,
                                opts: Optional[ResourceOptions] = None,
                                zone_id: Optional[str] = None,
                                entity: Optional[str] = None,
                                host: Optional[str] = None,
                                security_policy: Optional[TeoSecurityPolicyConfigSecurityPolicyArgs] = None,
                                template_id: Optional[str] = None,
                                teo_security_policy_config_id: Optional[str] = None)
    func NewTeoSecurityPolicyConfig(ctx *Context, name string, args TeoSecurityPolicyConfigArgs, opts ...ResourceOption) (*TeoSecurityPolicyConfig, error)
    public TeoSecurityPolicyConfig(string name, TeoSecurityPolicyConfigArgs args, CustomResourceOptions? opts = null)
    public TeoSecurityPolicyConfig(String name, TeoSecurityPolicyConfigArgs args)
    public TeoSecurityPolicyConfig(String name, TeoSecurityPolicyConfigArgs args, CustomResourceOptions options)
    
    type: tencentcloud:TeoSecurityPolicyConfig
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args TeoSecurityPolicyConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args TeoSecurityPolicyConfigArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args TeoSecurityPolicyConfigArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args TeoSecurityPolicyConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args TeoSecurityPolicyConfigArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    TeoSecurityPolicyConfig Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The TeoSecurityPolicyConfig resource accepts the following input properties:

    ZoneId string
    Zone ID.
    Entity string
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    Host string
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    SecurityPolicy TeoSecurityPolicyConfigSecurityPolicy
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    TemplateId string
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    TeoSecurityPolicyConfigId string
    ID of the resource.
    ZoneId string
    Zone ID.
    Entity string
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    Host string
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    SecurityPolicy TeoSecurityPolicyConfigSecurityPolicyArgs
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    TemplateId string
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    TeoSecurityPolicyConfigId string
    ID of the resource.
    zoneId String
    Zone ID.
    entity String
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host String
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    securityPolicy TeoSecurityPolicyConfigSecurityPolicy
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    templateId String
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teoSecurityPolicyConfigId String
    ID of the resource.
    zoneId string
    Zone ID.
    entity string
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host string
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    securityPolicy TeoSecurityPolicyConfigSecurityPolicy
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    templateId string
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teoSecurityPolicyConfigId string
    ID of the resource.
    zone_id str
    Zone ID.
    entity str
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host str
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    security_policy TeoSecurityPolicyConfigSecurityPolicyArgs
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    template_id str
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teo_security_policy_config_id str
    ID of the resource.
    zoneId String
    Zone ID.
    entity String
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host String
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    securityPolicy Property Map
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    templateId String
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teoSecurityPolicyConfigId String
    ID of the resource.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the TeoSecurityPolicyConfig resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing TeoSecurityPolicyConfig Resource

    Get an existing TeoSecurityPolicyConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: TeoSecurityPolicyConfigState, opts?: CustomResourceOptions): TeoSecurityPolicyConfig
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            entity: Optional[str] = None,
            host: Optional[str] = None,
            security_policy: Optional[TeoSecurityPolicyConfigSecurityPolicyArgs] = None,
            template_id: Optional[str] = None,
            teo_security_policy_config_id: Optional[str] = None,
            zone_id: Optional[str] = None) -> TeoSecurityPolicyConfig
    func GetTeoSecurityPolicyConfig(ctx *Context, name string, id IDInput, state *TeoSecurityPolicyConfigState, opts ...ResourceOption) (*TeoSecurityPolicyConfig, error)
    public static TeoSecurityPolicyConfig Get(string name, Input<string> id, TeoSecurityPolicyConfigState? state, CustomResourceOptions? opts = null)
    public static TeoSecurityPolicyConfig get(String name, Output<String> id, TeoSecurityPolicyConfigState state, CustomResourceOptions options)
    resources:  _:    type: tencentcloud:TeoSecurityPolicyConfig    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Entity string
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    Host string
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    SecurityPolicy TeoSecurityPolicyConfigSecurityPolicy
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    TemplateId string
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    TeoSecurityPolicyConfigId string
    ID of the resource.
    ZoneId string
    Zone ID.
    Entity string
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    Host string
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    SecurityPolicy TeoSecurityPolicyConfigSecurityPolicyArgs
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    TemplateId string
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    TeoSecurityPolicyConfigId string
    ID of the resource.
    ZoneId string
    Zone ID.
    entity String
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host String
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    securityPolicy TeoSecurityPolicyConfigSecurityPolicy
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    templateId String
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teoSecurityPolicyConfigId String
    ID of the resource.
    zoneId String
    Zone ID.
    entity string
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host string
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    securityPolicy TeoSecurityPolicyConfigSecurityPolicy
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    templateId string
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teoSecurityPolicyConfigId string
    ID of the resource.
    zoneId string
    Zone ID.
    entity str
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host str
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    security_policy TeoSecurityPolicyConfigSecurityPolicyArgs
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    template_id str
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teo_security_policy_config_id str
    ID of the resource.
    zone_id str
    Zone ID.
    entity String
    Security policy type. the following parameter values can be used: ZoneDefaultPolicy: used to specify a site-level policy; Template: used to specify a policy Template. you need to simultaneously specify the TemplateId parameter; Host: used to specify a domain-level policy (note: when using a domain name to specify a dns service policy, only dns services or policy templates that have applied a domain-level policy are supported)..
    host String
    Specifies the specified domain. when the Entity parameter value is Host, use the domain-level policy specified by this parameter. for example: use www.example.com to configure the domain-level policy of the domain.
    securityPolicy Property Map
    Security policy configuration. it is recommended to use for custom policies and managed rule configurations of Web protection. it supports configuring security policies with expression grammar.
    templateId String
    Specify the policy Template ID. use this parameter to specify the ID of the policy Template when the Entity parameter value is Template.
    teoSecurityPolicyConfigId String
    ID of the resource.
    zoneId String
    Zone ID.

    Supporting Types

    TeoSecurityPolicyConfigSecurityPolicy, TeoSecurityPolicyConfigSecurityPolicyArgs

    customRules Property Map
    Custom rule configuration.
    exceptionRules Property Map
    Exception rule configuration.
    httpDdosProtection Property Map
    HTTP DDOS protection configuration.
    managedRules Property Map
    Managed rule configuration.
    rateLimitingRules Property Map
    Rate limiting rule configuration.

    TeoSecurityPolicyConfigSecurityPolicyCustomRules, TeoSecurityPolicyConfigSecurityPolicyCustomRulesArgs

    BasicAccessRules List<TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRule>
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    PreciseMatchRules List<TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRule>
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    Rules List<TeoSecurityPolicyConfigSecurityPolicyCustomRulesRule>
    It has been deprecated from version 1.81.184. Please use precise_match_rules or basic_access_rules instead. List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.

    Deprecated: Deprecated

    BasicAccessRules []TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRule
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    PreciseMatchRules []TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRule
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    Rules []TeoSecurityPolicyConfigSecurityPolicyCustomRulesRule
    It has been deprecated from version 1.81.184. Please use precise_match_rules or basic_access_rules instead. List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.

    Deprecated: Deprecated

    basicAccessRules List<TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRule>
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    preciseMatchRules List<TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRule>
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    rules List<TeoSecurityPolicyConfigSecurityPolicyCustomRulesRule>
    It has been deprecated from version 1.81.184. Please use precise_match_rules or basic_access_rules instead. List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.

    Deprecated: Deprecated

    basicAccessRules TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRule[]
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    preciseMatchRules TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRule[]
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    rules TeoSecurityPolicyConfigSecurityPolicyCustomRulesRule[]
    It has been deprecated from version 1.81.184. Please use precise_match_rules or basic_access_rules instead. List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.

    Deprecated: Deprecated

    basic_access_rules Sequence[TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRule]
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    precise_match_rules Sequence[TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRule]
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    rules Sequence[TeoSecurityPolicyConfigSecurityPolicyCustomRulesRule]
    It has been deprecated from version 1.81.184. Please use precise_match_rules or basic_access_rules instead. List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.

    Deprecated: Deprecated

    basicAccessRules List<Property Map>
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    preciseMatchRules List<Property Map>
    List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.
    rules List<Property Map>
    It has been deprecated from version 1.81.184. Please use precise_match_rules or basic_access_rules instead. List of custom rule definitions. when modifying the Web protection configuration using ModifySecurityPolicy: - if the Rules parameter is not specified or the parameter length of Rules is zero: clear all custom rule configurations. - if the parameter value of CustomRules in the SecurityPolicy parameter is not specified: keep the existing custom rule configuration without modification.

    Deprecated: Deprecated

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRule, TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleArgs

    Action TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    Condition string
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    Enabled string
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    Name string
    The name of the custom rule.
    Id string
    ID of the resource.
    Priority double
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    RuleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    Action TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    Condition string
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    Enabled string
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    Name string
    The name of the custom rule.
    Id string
    ID of the resource.
    Priority float64
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    RuleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition String
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled String
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name String
    The name of the custom rule.
    id String
    ID of the resource.
    priority Double
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    ruleType String
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition string
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled string
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name string
    The name of the custom rule.
    id string
    ID of the resource.
    priority number
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    ruleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition str
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled str
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name str
    The name of the custom rule.
    id str
    ID of the resource.
    priority float
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    rule_type str
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action Property Map
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition String
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled String
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name String
    The name of the custom rule.
    id String
    ID of the resource.
    priority Number
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    ruleType String
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleAction, TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionArgs

    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesBasicAccessRuleActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRule, TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleArgs

    Action TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    Condition string
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    Enabled string
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    Name string
    The name of the custom rule.
    Id string
    ID of the resource.
    Priority double
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    RuleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    Action TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    Condition string
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    Enabled string
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    Name string
    The name of the custom rule.
    Id string
    ID of the resource.
    Priority float64
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    RuleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition String
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled String
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name String
    The name of the custom rule.
    id String
    ID of the resource.
    priority Double
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    ruleType String
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition string
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled string
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name string
    The name of the custom rule.
    id string
    ID of the resource.
    priority number
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    ruleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleAction
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition str
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled str
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name str
    The name of the custom rule.
    id str
    ID of the resource.
    priority float
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    rule_type str
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action Property Map
    Execution actions for custom rules. the Name parameter value of SecurityAction supports: Deny: block; Monitor: observe; ReturnCustomPage: block using a specified page; Redirect: Redirect to URL; BlockIP: IP blocking; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge; Allow: Allow..
    condition String
    The specific content of the custom rule must comply with the expression grammar. please refer to the product document for detailed specifications.
    enabled String
    Indicates whether the custom rule is enabled. valid values: on: enabled off: disabled.
    name String
    The name of the custom rule.
    id String
    ID of the resource.
    priority Number
    Customizes the priority of rules. value range: 0-100. it defaults to 0. only supports rule_type is PreciseMatchRule.
    ruleType String
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleAction, TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionArgs

    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesPreciseMatchRuleActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesRule, TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleArgs

    Action TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    Condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    Enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    Name string
    The name of the precise rate limit.
    Id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    Priority double
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    RuleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    Action TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    Condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    Enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    Name string
    The name of the precise rate limit.
    Id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    Priority float64
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    RuleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    condition String
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled String
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    name String
    The name of the precise rate limit.
    id String
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    priority Double
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    ruleType String
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    name string
    The name of the precise rate limit.
    id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    priority number
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    ruleType string
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    condition str
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled str
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    name str
    The name of the precise rate limit.
    id str
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    priority float
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    rule_type str
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.
    action Property Map
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    condition String
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled String
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    name String
    The name of the precise rate limit.
    id String
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    priority Number
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    ruleType String
    Type of custom rule. valid values: BasicAccessRule: basic access control; PreciseMatchRule: exact matching rule, default; ManagedAccessRule: expert customized rule, for output only. the default value is PreciseMatchRule.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleAction, TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionArgs

    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name string
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name str
    The specific action of security execution. The values are:

    block_ip_action_parameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    redirect_action_parameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    return_custom_page_action_parameters TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyCustomRulesRuleActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyExceptionRules, TeoSecurityPolicyConfigSecurityPolicyExceptionRulesArgs

    Rules List<TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRule>
    Definition list of exception rules. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the length of the Rules parameter is zero: clear all exception rule configurations. .If the ExceptionRules parameter value is not specified in the SecurityPolicy parameter: keep the existing exception rule configurations and do not modify them. .
    Rules []TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRule
    Definition list of exception rules. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the length of the Rules parameter is zero: clear all exception rule configurations. .If the ExceptionRules parameter value is not specified in the SecurityPolicy parameter: keep the existing exception rule configurations and do not modify them. .
    rules List<TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRule>
    Definition list of exception rules. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the length of the Rules parameter is zero: clear all exception rule configurations. .If the ExceptionRules parameter value is not specified in the SecurityPolicy parameter: keep the existing exception rule configurations and do not modify them. .
    rules TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRule[]
    Definition list of exception rules. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the length of the Rules parameter is zero: clear all exception rule configurations. .If the ExceptionRules parameter value is not specified in the SecurityPolicy parameter: keep the existing exception rule configurations and do not modify them. .
    rules Sequence[TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRule]
    Definition list of exception rules. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the length of the Rules parameter is zero: clear all exception rule configurations. .If the ExceptionRules parameter value is not specified in the SecurityPolicy parameter: keep the existing exception rule configurations and do not modify them. .
    rules List<Property Map>
    Definition list of exception rules. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the length of the Rules parameter is zero: clear all exception rule configurations. .If the ExceptionRules parameter value is not specified in the SecurityPolicy parameter: keep the existing exception rule configurations and do not modify them. .

    TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRule, TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleArgs

    Condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    Enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    Id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    ManagedRuleGroupsForExceptions List<string>
    Specifies the managed rule group for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRulesForException cannot be specified.
    ManagedRulesForExceptions List<string>
    Specifies the specific managed rule for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRuleGroupsForException cannot be specified.
    Name string
    The name of the precise rate limit.
    RequestFieldsForExceptions List<TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForException>
    Specifies the specific configuration of the exception rule to skip the specified request field. This is only valid when SkipScope is ManagedRules and SkipOption is SkipOnSpecifiedRequestFields.
    SkipOption string
    The specific type of the skipped request. The possible values are: SkipOnAllRequestFields: skip all requests; SkipOnSpecifiedRequestFields: skip specified request fields. . This option is only valid when SkipScope is ManagedRules.
    SkipScope string
    Exception rule execution options, the values are: WebSecurityModules: Specifies the security protection module for the exception rule. .ManagedRules: Specifies the managed rules. .
    WebSecurityModulesForExceptions List<string>
    Specifies the security protection module for the exception rule. It is valid only when SkipScope is WebSecurityModules. The possible values are: websec-mod-managed-rules: managed rules; websec-mod-rate-limiting: rate limiting; websec-mod-custom-rules: custom rules; websec-mod-adaptive-control: adaptive frequency control, intelligent client filtering, slow attack protection, traffic theft protection; websec-mod-bot: Bot management. .
    Condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    Enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    Id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    ManagedRuleGroupsForExceptions []string
    Specifies the managed rule group for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRulesForException cannot be specified.
    ManagedRulesForExceptions []string
    Specifies the specific managed rule for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRuleGroupsForException cannot be specified.
    Name string
    The name of the precise rate limit.
    RequestFieldsForExceptions []TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForException
    Specifies the specific configuration of the exception rule to skip the specified request field. This is only valid when SkipScope is ManagedRules and SkipOption is SkipOnSpecifiedRequestFields.
    SkipOption string
    The specific type of the skipped request. The possible values are: SkipOnAllRequestFields: skip all requests; SkipOnSpecifiedRequestFields: skip specified request fields. . This option is only valid when SkipScope is ManagedRules.
    SkipScope string
    Exception rule execution options, the values are: WebSecurityModules: Specifies the security protection module for the exception rule. .ManagedRules: Specifies the managed rules. .
    WebSecurityModulesForExceptions []string
    Specifies the security protection module for the exception rule. It is valid only when SkipScope is WebSecurityModules. The possible values are: websec-mod-managed-rules: managed rules; websec-mod-rate-limiting: rate limiting; websec-mod-custom-rules: custom rules; websec-mod-adaptive-control: adaptive frequency control, intelligent client filtering, slow attack protection, traffic theft protection; websec-mod-bot: Bot management. .
    condition String
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled String
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id String
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    managedRuleGroupsForExceptions List<String>
    Specifies the managed rule group for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRulesForException cannot be specified.
    managedRulesForExceptions List<String>
    Specifies the specific managed rule for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRuleGroupsForException cannot be specified.
    name String
    The name of the precise rate limit.
    requestFieldsForExceptions List<TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForException>
    Specifies the specific configuration of the exception rule to skip the specified request field. This is only valid when SkipScope is ManagedRules and SkipOption is SkipOnSpecifiedRequestFields.
    skipOption String
    The specific type of the skipped request. The possible values are: SkipOnAllRequestFields: skip all requests; SkipOnSpecifiedRequestFields: skip specified request fields. . This option is only valid when SkipScope is ManagedRules.
    skipScope String
    Exception rule execution options, the values are: WebSecurityModules: Specifies the security protection module for the exception rule. .ManagedRules: Specifies the managed rules. .
    webSecurityModulesForExceptions List<String>
    Specifies the security protection module for the exception rule. It is valid only when SkipScope is WebSecurityModules. The possible values are: websec-mod-managed-rules: managed rules; websec-mod-rate-limiting: rate limiting; websec-mod-custom-rules: custom rules; websec-mod-adaptive-control: adaptive frequency control, intelligent client filtering, slow attack protection, traffic theft protection; websec-mod-bot: Bot management. .
    condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    managedRuleGroupsForExceptions string[]
    Specifies the managed rule group for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRulesForException cannot be specified.
    managedRulesForExceptions string[]
    Specifies the specific managed rule for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRuleGroupsForException cannot be specified.
    name string
    The name of the precise rate limit.
    requestFieldsForExceptions TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForException[]
    Specifies the specific configuration of the exception rule to skip the specified request field. This is only valid when SkipScope is ManagedRules and SkipOption is SkipOnSpecifiedRequestFields.
    skipOption string
    The specific type of the skipped request. The possible values are: SkipOnAllRequestFields: skip all requests; SkipOnSpecifiedRequestFields: skip specified request fields. . This option is only valid when SkipScope is ManagedRules.
    skipScope string
    Exception rule execution options, the values are: WebSecurityModules: Specifies the security protection module for the exception rule. .ManagedRules: Specifies the managed rules. .
    webSecurityModulesForExceptions string[]
    Specifies the security protection module for the exception rule. It is valid only when SkipScope is WebSecurityModules. The possible values are: websec-mod-managed-rules: managed rules; websec-mod-rate-limiting: rate limiting; websec-mod-custom-rules: custom rules; websec-mod-adaptive-control: adaptive frequency control, intelligent client filtering, slow attack protection, traffic theft protection; websec-mod-bot: Bot management. .
    condition str
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled str
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id str
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    managed_rule_groups_for_exceptions Sequence[str]
    Specifies the managed rule group for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRulesForException cannot be specified.
    managed_rules_for_exceptions Sequence[str]
    Specifies the specific managed rule for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRuleGroupsForException cannot be specified.
    name str
    The name of the precise rate limit.
    request_fields_for_exceptions Sequence[TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForException]
    Specifies the specific configuration of the exception rule to skip the specified request field. This is only valid when SkipScope is ManagedRules and SkipOption is SkipOnSpecifiedRequestFields.
    skip_option str
    The specific type of the skipped request. The possible values are: SkipOnAllRequestFields: skip all requests; SkipOnSpecifiedRequestFields: skip specified request fields. . This option is only valid when SkipScope is ManagedRules.
    skip_scope str
    Exception rule execution options, the values are: WebSecurityModules: Specifies the security protection module for the exception rule. .ManagedRules: Specifies the managed rules. .
    web_security_modules_for_exceptions Sequence[str]
    Specifies the security protection module for the exception rule. It is valid only when SkipScope is WebSecurityModules. The possible values are: websec-mod-managed-rules: managed rules; websec-mod-rate-limiting: rate limiting; websec-mod-custom-rules: custom rules; websec-mod-adaptive-control: adaptive frequency control, intelligent client filtering, slow attack protection, traffic theft protection; websec-mod-bot: Bot management. .
    condition String
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    enabled String
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id String
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    managedRuleGroupsForExceptions List<String>
    Specifies the managed rule group for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRulesForException cannot be specified.
    managedRulesForExceptions List<String>
    Specifies the specific managed rule for the exception rule. This is only valid when SkipScope is ManagedRules and ManagedRuleGroupsForException cannot be specified.
    name String
    The name of the precise rate limit.
    requestFieldsForExceptions List<Property Map>
    Specifies the specific configuration of the exception rule to skip the specified request field. This is only valid when SkipScope is ManagedRules and SkipOption is SkipOnSpecifiedRequestFields.
    skipOption String
    The specific type of the skipped request. The possible values are: SkipOnAllRequestFields: skip all requests; SkipOnSpecifiedRequestFields: skip specified request fields. . This option is only valid when SkipScope is ManagedRules.
    skipScope String
    Exception rule execution options, the values are: WebSecurityModules: Specifies the security protection module for the exception rule. .ManagedRules: Specifies the managed rules. .
    webSecurityModulesForExceptions List<String>
    Specifies the security protection module for the exception rule. It is valid only when SkipScope is WebSecurityModules. The possible values are: websec-mod-managed-rules: managed rules; websec-mod-rate-limiting: rate limiting; websec-mod-custom-rules: custom rules; websec-mod-adaptive-control: adaptive frequency control, intelligent client filtering, slow attack protection, traffic theft protection; websec-mod-bot: Bot management. .

    TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForException, TeoSecurityPolicyConfigSecurityPolicyExceptionRulesRuleRequestFieldsForExceptionArgs

    Condition string
    The expression of the specific field to be skipped must conform to the expression syntax. Condition supports expression configuration syntax: Written according to the matching condition expression syntax of the rule, supporting references to key and value. . Supports in, like operators, and and logical combinations. . For example: ${key} in ['x-trace-id']: parameter name is equal to x-trace-id. .${key} in ['x-trace-id'] and ${value} like ['Bearer *']: parameter name is equal to x-trace-id and the parameter value wildcard matches Bearer *. .
    Scope string
    Specific fields to skip. Supported values:

    TargetField string
    When the Scope parameter uses different values, the supported values in the TargetField expression are as follows:

    Condition string
    The expression of the specific field to be skipped must conform to the expression syntax. Condition supports expression configuration syntax: Written according to the matching condition expression syntax of the rule, supporting references to key and value. . Supports in, like operators, and and logical combinations. . For example: ${key} in ['x-trace-id']: parameter name is equal to x-trace-id. .${key} in ['x-trace-id'] and ${value} like ['Bearer *']: parameter name is equal to x-trace-id and the parameter value wildcard matches Bearer *. .
    Scope string
    Specific fields to skip. Supported values:

    TargetField string
    When the Scope parameter uses different values, the supported values in the TargetField expression are as follows:

    condition String
    The expression of the specific field to be skipped must conform to the expression syntax. Condition supports expression configuration syntax: Written according to the matching condition expression syntax of the rule, supporting references to key and value. . Supports in, like operators, and and logical combinations. . For example: ${key} in ['x-trace-id']: parameter name is equal to x-trace-id. .${key} in ['x-trace-id'] and ${value} like ['Bearer *']: parameter name is equal to x-trace-id and the parameter value wildcard matches Bearer *. .
    scope String
    Specific fields to skip. Supported values:

    targetField String
    When the Scope parameter uses different values, the supported values in the TargetField expression are as follows:

    condition string
    The expression of the specific field to be skipped must conform to the expression syntax. Condition supports expression configuration syntax: Written according to the matching condition expression syntax of the rule, supporting references to key and value. . Supports in, like operators, and and logical combinations. . For example: ${key} in ['x-trace-id']: parameter name is equal to x-trace-id. .${key} in ['x-trace-id'] and ${value} like ['Bearer *']: parameter name is equal to x-trace-id and the parameter value wildcard matches Bearer *. .
    scope string
    Specific fields to skip. Supported values:

    targetField string
    When the Scope parameter uses different values, the supported values in the TargetField expression are as follows:

    condition str
    The expression of the specific field to be skipped must conform to the expression syntax. Condition supports expression configuration syntax: Written according to the matching condition expression syntax of the rule, supporting references to key and value. . Supports in, like operators, and and logical combinations. . For example: ${key} in ['x-trace-id']: parameter name is equal to x-trace-id. .${key} in ['x-trace-id'] and ${value} like ['Bearer *']: parameter name is equal to x-trace-id and the parameter value wildcard matches Bearer *. .
    scope str
    Specific fields to skip. Supported values:

    target_field str
    When the Scope parameter uses different values, the supported values in the TargetField expression are as follows:

    condition String
    The expression of the specific field to be skipped must conform to the expression syntax. Condition supports expression configuration syntax: Written according to the matching condition expression syntax of the rule, supporting references to key and value. . Supports in, like operators, and and logical combinations. . For example: ${key} in ['x-trace-id']: parameter name is equal to x-trace-id. .${key} in ['x-trace-id'] and ${value} like ['Bearer *']: parameter name is equal to x-trace-id and the parameter value wildcard matches Bearer *. .
    scope String
    Specific fields to skip. Supported values:

    targetField String
    When the Scope parameter uses different values, the supported values in the TargetField expression are as follows:

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtection, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionArgs

    adaptiveFrequencyControl Property Map
    Specific configuration of adaptive frequency control.
    bandwidthAbuseDefense Property Map
    Specific configuration of traffic fraud prevention.
    clientFiltering Property Map
    Specific configuration of intelligent client filtering.
    slowAttackDefense Property Map
    Specific configuration of slow attack protection.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControl, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlArgs

    Enabled string
    Whether adaptive frequency control is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlAction
    The handling method of adaptive frequency control. When Enabled is on, this field is required. SecurityAction's Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    Sensitivity string
    The restriction level of adaptive frequency control. When Enabled is on, this field is required. The values are: Loose: loose; Moderate: moderate; Strict: strict. .
    Enabled string
    Whether adaptive frequency control is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlAction
    The handling method of adaptive frequency control. When Enabled is on, this field is required. SecurityAction's Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    Sensitivity string
    The restriction level of adaptive frequency control. When Enabled is on, this field is required. The values are: Loose: loose; Moderate: moderate; Strict: strict. .
    enabled String
    Whether adaptive frequency control is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlAction
    The handling method of adaptive frequency control. When Enabled is on, this field is required. SecurityAction's Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    sensitivity String
    The restriction level of adaptive frequency control. When Enabled is on, this field is required. The values are: Loose: loose; Moderate: moderate; Strict: strict. .
    enabled string
    Whether adaptive frequency control is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlAction
    The handling method of adaptive frequency control. When Enabled is on, this field is required. SecurityAction's Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    sensitivity string
    The restriction level of adaptive frequency control. When Enabled is on, this field is required. The values are: Loose: loose; Moderate: moderate; Strict: strict. .
    enabled str
    Whether adaptive frequency control is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlAction
    The handling method of adaptive frequency control. When Enabled is on, this field is required. SecurityAction's Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    sensitivity str
    The restriction level of adaptive frequency control. When Enabled is on, this field is required. The values are: Loose: loose; Moderate: moderate; Strict: strict. .
    enabled String
    Whether adaptive frequency control is enabled. The possible values are: on: enabled; off: disabled. .
    action Property Map
    The handling method of adaptive frequency control. When Enabled is on, this field is required. SecurityAction's Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    sensitivity String
    The restriction level of adaptive frequency control. When Enabled is on, this field is required. The values are: Loose: loose; Moderate: moderate; Strict: strict. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlAction, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionArgs

    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name string
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name str
    The specific action of security execution. The values are:

    block_ip_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challenge_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    deny_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirect_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    return_custom_page_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters Property Map
    Additional parameters when Name is Challenge.
    denyActionParameters Property Map
    Additional parameters when Name is Deny.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionChallengeActionParametersArgs

    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challenge_option str
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attester_id str
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval str
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionDenyActionParametersArgs

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    blockIp string
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration string
    When BlockIP is on, the IP blocking duration.
    errorPageId string
    The PageId of the custom page.
    responseCode string
    Customize the status code of the page.
    returnCustomPage string
    Whether to use custom pages. The possible values are:

    stall string
    Whether to ignore the request source suspension. The value is:

    block_ip str
    Whether to extend the blocking of source IP. The possible values are:

    block_ip_duration str
    When BlockIP is on, the IP blocking duration.
    error_page_id str
    The PageId of the custom page.
    response_code str
    Customize the status code of the page.
    return_custom_page str
    Whether to use custom pages. The possible values are:

    stall str
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionAdaptiveFrequencyControlActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefense, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseArgs

    Enabled string
    Whether the anti-theft feature (only applicable to mainland China) is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseAction
    The method for preventing traffic fraud (only applicable to mainland China). When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    Enabled string
    Whether the anti-theft feature (only applicable to mainland China) is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseAction
    The method for preventing traffic fraud (only applicable to mainland China). When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled String
    Whether the anti-theft feature (only applicable to mainland China) is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseAction
    The method for preventing traffic fraud (only applicable to mainland China). When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled string
    Whether the anti-theft feature (only applicable to mainland China) is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseAction
    The method for preventing traffic fraud (only applicable to mainland China). When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled str
    Whether the anti-theft feature (only applicable to mainland China) is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseAction
    The method for preventing traffic fraud (only applicable to mainland China). When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled String
    Whether the anti-theft feature (only applicable to mainland China) is enabled. The possible values are: on: enabled; off: disabled. .
    action Property Map
    The method for preventing traffic fraud (only applicable to mainland China). When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseAction, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionArgs

    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name string
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name str
    The specific action of security execution. The values are:

    block_ip_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challenge_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    deny_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirect_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    return_custom_page_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters Property Map
    Additional parameters when Name is Challenge.
    denyActionParameters Property Map
    Additional parameters when Name is Deny.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionChallengeActionParametersArgs

    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challenge_option str
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attester_id str
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval str
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionDenyActionParametersArgs

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    blockIp string
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration string
    When BlockIP is on, the IP blocking duration.
    errorPageId string
    The PageId of the custom page.
    responseCode string
    Customize the status code of the page.
    returnCustomPage string
    Whether to use custom pages. The possible values are:

    stall string
    Whether to ignore the request source suspension. The value is:

    block_ip str
    Whether to extend the blocking of source IP. The possible values are:

    block_ip_duration str
    When BlockIP is on, the IP blocking duration.
    error_page_id str
    The PageId of the custom page.
    response_code str
    Customize the status code of the page.
    return_custom_page str
    Whether to use custom pages. The possible values are:

    stall str
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionBandwidthAbuseDefenseActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFiltering, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringArgs

    Enabled string
    Whether smart client filtering is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringAction
    The method of intelligent client filtering. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    Enabled string
    Whether smart client filtering is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringAction
    The method of intelligent client filtering. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled String
    Whether smart client filtering is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringAction
    The method of intelligent client filtering. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled string
    Whether smart client filtering is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringAction
    The method of intelligent client filtering. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled str
    Whether smart client filtering is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringAction
    The method of intelligent client filtering. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .
    enabled String
    Whether smart client filtering is enabled. The possible values are: on: enabled; off: disabled. .
    action Property Map
    The method of intelligent client filtering. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; Challenge: Challenge, where ChallengeActionParameters.Name only supports JSChallenge. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringAction, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionArgs

    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name string
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name str
    The specific action of security execution. The values are:

    block_ip_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challenge_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    deny_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirect_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    return_custom_page_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters Property Map
    Additional parameters when Name is Challenge.
    denyActionParameters Property Map
    Additional parameters when Name is Deny.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionChallengeActionParametersArgs

    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challenge_option str
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attester_id str
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval str
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionDenyActionParametersArgs

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    blockIp string
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration string
    When BlockIP is on, the IP blocking duration.
    errorPageId string
    The PageId of the custom page.
    responseCode string
    Customize the status code of the page.
    returnCustomPage string
    Whether to use custom pages. The possible values are:

    stall string
    Whether to ignore the request source suspension. The value is:

    block_ip str
    Whether to extend the blocking of source IP. The possible values are:

    block_ip_duration str
    When BlockIP is on, the IP blocking duration.
    error_page_id str
    The PageId of the custom page.
    response_code str
    Customize the status code of the page.
    return_custom_page str
    Whether to use custom pages. The possible values are:

    stall str
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionClientFilteringActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefense, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseArgs

    Enabled string
    Whether slow attack protection is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseAction
    The handling method of slow attack protection. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; .
    MinimalRequestBodyTransferRate TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRate
    Specific configuration of the minimum rate threshold for text transmission. This field is required when Enabled is on.
    RequestBodyTransferTimeout TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeout
    Specific configuration of the text transmission timeout. When Enabled is on, this field is required.
    Enabled string
    Whether slow attack protection is enabled. The possible values are: on: enabled; off: disabled. .
    Action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseAction
    The handling method of slow attack protection. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; .
    MinimalRequestBodyTransferRate TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRate
    Specific configuration of the minimum rate threshold for text transmission. This field is required when Enabled is on.
    RequestBodyTransferTimeout TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeout
    Specific configuration of the text transmission timeout. When Enabled is on, this field is required.
    enabled String
    Whether slow attack protection is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseAction
    The handling method of slow attack protection. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; .
    minimalRequestBodyTransferRate TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRate
    Specific configuration of the minimum rate threshold for text transmission. This field is required when Enabled is on.
    requestBodyTransferTimeout TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeout
    Specific configuration of the text transmission timeout. When Enabled is on, this field is required.
    enabled string
    Whether slow attack protection is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseAction
    The handling method of slow attack protection. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; .
    minimalRequestBodyTransferRate TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRate
    Specific configuration of the minimum rate threshold for text transmission. This field is required when Enabled is on.
    requestBodyTransferTimeout TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeout
    Specific configuration of the text transmission timeout. When Enabled is on, this field is required.
    enabled str
    Whether slow attack protection is enabled. The possible values are: on: enabled; off: disabled. .
    action TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseAction
    The handling method of slow attack protection. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; .
    minimal_request_body_transfer_rate TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRate
    Specific configuration of the minimum rate threshold for text transmission. This field is required when Enabled is on.
    request_body_transfer_timeout TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeout
    Specific configuration of the text transmission timeout. When Enabled is on, this field is required.
    enabled String
    Whether slow attack protection is enabled. The possible values are: on: enabled; off: disabled. .
    action Property Map
    The handling method of slow attack protection. When Enabled is on, this field is required. SecurityAction Name value supports: Monitor: Observe; Deny: Intercept; .
    minimalRequestBodyTransferRate Property Map
    Specific configuration of the minimum rate threshold for text transmission. This field is required when Enabled is on.
    requestBodyTransferTimeout Property Map
    Specific configuration of the text transmission timeout. When Enabled is on, this field is required.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseAction, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionArgs

    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name string
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name str
    The specific action of security execution. The values are:

    block_ip_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challenge_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    deny_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirect_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    return_custom_page_action_parameters TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters Property Map
    Additional parameters when Name is Challenge.
    denyActionParameters Property Map
    Additional parameters when Name is Deny.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionChallengeActionParametersArgs

    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challenge_option str
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attester_id str
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval str
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionDenyActionParametersArgs

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    blockIp string
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration string
    When BlockIP is on, the IP blocking duration.
    errorPageId string
    The PageId of the custom page.
    responseCode string
    Customize the status code of the page.
    returnCustomPage string
    Whether to use custom pages. The possible values are:

    stall string
    Whether to ignore the request source suspension. The value is:

    block_ip str
    Whether to extend the blocking of source IP. The possible values are:

    block_ip_duration str
    When BlockIP is on, the IP blocking duration.
    error_page_id str
    The PageId of the custom page.
    response_code str
    Customize the status code of the page.
    return_custom_page str
    Whether to use custom pages. The possible values are:

    stall str
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRate, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseMinimalRequestBodyTransferRateArgs

    CountingPeriod string
    The minimum text transmission rate statistics time range, the possible values are: 10s: 10 seconds; 30s: 30 seconds; 60s: 60 seconds; 120s: 120 seconds. .
    Enabled string
    Whether the text transmission minimum rate threshold is enabled. The possible values are: on: enabled; off: disabled. .
    MinimalAvgTransferRateThreshold string
    Minimum text transmission rate threshold. The unit only supports bps.
    CountingPeriod string
    The minimum text transmission rate statistics time range, the possible values are: 10s: 10 seconds; 30s: 30 seconds; 60s: 60 seconds; 120s: 120 seconds. .
    Enabled string
    Whether the text transmission minimum rate threshold is enabled. The possible values are: on: enabled; off: disabled. .
    MinimalAvgTransferRateThreshold string
    Minimum text transmission rate threshold. The unit only supports bps.
    countingPeriod String
    The minimum text transmission rate statistics time range, the possible values are: 10s: 10 seconds; 30s: 30 seconds; 60s: 60 seconds; 120s: 120 seconds. .
    enabled String
    Whether the text transmission minimum rate threshold is enabled. The possible values are: on: enabled; off: disabled. .
    minimalAvgTransferRateThreshold String
    Minimum text transmission rate threshold. The unit only supports bps.
    countingPeriod string
    The minimum text transmission rate statistics time range, the possible values are: 10s: 10 seconds; 30s: 30 seconds; 60s: 60 seconds; 120s: 120 seconds. .
    enabled string
    Whether the text transmission minimum rate threshold is enabled. The possible values are: on: enabled; off: disabled. .
    minimalAvgTransferRateThreshold string
    Minimum text transmission rate threshold. The unit only supports bps.
    counting_period str
    The minimum text transmission rate statistics time range, the possible values are: 10s: 10 seconds; 30s: 30 seconds; 60s: 60 seconds; 120s: 120 seconds. .
    enabled str
    Whether the text transmission minimum rate threshold is enabled. The possible values are: on: enabled; off: disabled. .
    minimal_avg_transfer_rate_threshold str
    Minimum text transmission rate threshold. The unit only supports bps.
    countingPeriod String
    The minimum text transmission rate statistics time range, the possible values are: 10s: 10 seconds; 30s: 30 seconds; 60s: 60 seconds; 120s: 120 seconds. .
    enabled String
    Whether the text transmission minimum rate threshold is enabled. The possible values are: on: enabled; off: disabled. .
    minimalAvgTransferRateThreshold String
    Minimum text transmission rate threshold. The unit only supports bps.

    TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeout, TeoSecurityPolicyConfigSecurityPolicyHttpDdosProtectionSlowAttackDefenseRequestBodyTransferTimeoutArgs

    Enabled string
    Whether the text transmission timeout is enabled. The possible values are: on: enabled; off: disabled. .
    IdleTimeout string
    The text transmission timeout period is between 5 and 120, and the unit only supports seconds (s).
    Enabled string
    Whether the text transmission timeout is enabled. The possible values are: on: enabled; off: disabled. .
    IdleTimeout string
    The text transmission timeout period is between 5 and 120, and the unit only supports seconds (s).
    enabled String
    Whether the text transmission timeout is enabled. The possible values are: on: enabled; off: disabled. .
    idleTimeout String
    The text transmission timeout period is between 5 and 120, and the unit only supports seconds (s).
    enabled string
    Whether the text transmission timeout is enabled. The possible values are: on: enabled; off: disabled. .
    idleTimeout string
    The text transmission timeout period is between 5 and 120, and the unit only supports seconds (s).
    enabled str
    Whether the text transmission timeout is enabled. The possible values are: on: enabled; off: disabled. .
    idle_timeout str
    The text transmission timeout period is between 5 and 120, and the unit only supports seconds (s).
    enabled String
    Whether the text transmission timeout is enabled. The possible values are: on: enabled; off: disabled. .
    idleTimeout String
    The text transmission timeout period is between 5 and 120, and the unit only supports seconds (s).

    TeoSecurityPolicyConfigSecurityPolicyManagedRules, TeoSecurityPolicyConfigSecurityPolicyManagedRulesArgs

    DetectionOnly string
    Indicates whether the evaluation mode is Enabled. it is valid only when the Enabled parameter is set to on. valid values: on: Enabled. all managed rules take effect in observation mode. off: disabled. all managed rules take effect according to the actual configuration..
    Enabled string
    Indicates whether the managed rule is enabled. valid values: on: enabled. all managed rules take effect as configured; off: disabled. all managed rules do not take effect..
    AutoUpdate TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdate
    Managed rule automatic update option.
    ManagedRuleGroups List<TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroup>
    Configuration of the managed rule group. if this structure is passed as an empty array or the GroupId is not included in the list, it will be processed based on the default method.
    SemanticAnalysis string
    Whether the managed rule semantic analysis option is Enabled is valid only when the Enabled parameter is on. valid values: on: enable. perform semantic analysis on requests before processing them; off: disable. process requests directly without semantic analysis. default off.
    DetectionOnly string
    Indicates whether the evaluation mode is Enabled. it is valid only when the Enabled parameter is set to on. valid values: on: Enabled. all managed rules take effect in observation mode. off: disabled. all managed rules take effect according to the actual configuration..
    Enabled string
    Indicates whether the managed rule is enabled. valid values: on: enabled. all managed rules take effect as configured; off: disabled. all managed rules do not take effect..
    AutoUpdate TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdate
    Managed rule automatic update option.
    ManagedRuleGroups []TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroup
    Configuration of the managed rule group. if this structure is passed as an empty array or the GroupId is not included in the list, it will be processed based on the default method.
    SemanticAnalysis string
    Whether the managed rule semantic analysis option is Enabled is valid only when the Enabled parameter is on. valid values: on: enable. perform semantic analysis on requests before processing them; off: disable. process requests directly without semantic analysis. default off.
    detectionOnly String
    Indicates whether the evaluation mode is Enabled. it is valid only when the Enabled parameter is set to on. valid values: on: Enabled. all managed rules take effect in observation mode. off: disabled. all managed rules take effect according to the actual configuration..
    enabled String
    Indicates whether the managed rule is enabled. valid values: on: enabled. all managed rules take effect as configured; off: disabled. all managed rules do not take effect..
    autoUpdate TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdate
    Managed rule automatic update option.
    managedRuleGroups List<TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroup>
    Configuration of the managed rule group. if this structure is passed as an empty array or the GroupId is not included in the list, it will be processed based on the default method.
    semanticAnalysis String
    Whether the managed rule semantic analysis option is Enabled is valid only when the Enabled parameter is on. valid values: on: enable. perform semantic analysis on requests before processing them; off: disable. process requests directly without semantic analysis. default off.
    detectionOnly string
    Indicates whether the evaluation mode is Enabled. it is valid only when the Enabled parameter is set to on. valid values: on: Enabled. all managed rules take effect in observation mode. off: disabled. all managed rules take effect according to the actual configuration..
    enabled string
    Indicates whether the managed rule is enabled. valid values: on: enabled. all managed rules take effect as configured; off: disabled. all managed rules do not take effect..
    autoUpdate TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdate
    Managed rule automatic update option.
    managedRuleGroups TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroup[]
    Configuration of the managed rule group. if this structure is passed as an empty array or the GroupId is not included in the list, it will be processed based on the default method.
    semanticAnalysis string
    Whether the managed rule semantic analysis option is Enabled is valid only when the Enabled parameter is on. valid values: on: enable. perform semantic analysis on requests before processing them; off: disable. process requests directly without semantic analysis. default off.
    detection_only str
    Indicates whether the evaluation mode is Enabled. it is valid only when the Enabled parameter is set to on. valid values: on: Enabled. all managed rules take effect in observation mode. off: disabled. all managed rules take effect according to the actual configuration..
    enabled str
    Indicates whether the managed rule is enabled. valid values: on: enabled. all managed rules take effect as configured; off: disabled. all managed rules do not take effect..
    auto_update TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdate
    Managed rule automatic update option.
    managed_rule_groups Sequence[TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroup]
    Configuration of the managed rule group. if this structure is passed as an empty array or the GroupId is not included in the list, it will be processed based on the default method.
    semantic_analysis str
    Whether the managed rule semantic analysis option is Enabled is valid only when the Enabled parameter is on. valid values: on: enable. perform semantic analysis on requests before processing them; off: disable. process requests directly without semantic analysis. default off.
    detectionOnly String
    Indicates whether the evaluation mode is Enabled. it is valid only when the Enabled parameter is set to on. valid values: on: Enabled. all managed rules take effect in observation mode. off: disabled. all managed rules take effect according to the actual configuration..
    enabled String
    Indicates whether the managed rule is enabled. valid values: on: enabled. all managed rules take effect as configured; off: disabled. all managed rules do not take effect..
    autoUpdate Property Map
    Managed rule automatic update option.
    managedRuleGroups List<Property Map>
    Configuration of the managed rule group. if this structure is passed as an empty array or the GroupId is not included in the list, it will be processed based on the default method.
    semanticAnalysis String
    Whether the managed rule semantic analysis option is Enabled is valid only when the Enabled parameter is on. valid values: on: enable. perform semantic analysis on requests before processing them; off: disable. process requests directly without semantic analysis. default off.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdate, TeoSecurityPolicyConfigSecurityPolicyManagedRulesAutoUpdateArgs

    AutoUpdateToLatestVersion string
    Indicates whether to enable automatic update to the latest version. valid values: on: enabled off: disabled.
    RulesetVersion string
    The currently used version, in the format compliant with ISO 8601 standard, such as 2023-12-21T12:00:32Z. it is empty by default and is only an output parameter.
    AutoUpdateToLatestVersion string
    Indicates whether to enable automatic update to the latest version. valid values: on: enabled off: disabled.
    RulesetVersion string
    The currently used version, in the format compliant with ISO 8601 standard, such as 2023-12-21T12:00:32Z. it is empty by default and is only an output parameter.
    autoUpdateToLatestVersion String
    Indicates whether to enable automatic update to the latest version. valid values: on: enabled off: disabled.
    rulesetVersion String
    The currently used version, in the format compliant with ISO 8601 standard, such as 2023-12-21T12:00:32Z. it is empty by default and is only an output parameter.
    autoUpdateToLatestVersion string
    Indicates whether to enable automatic update to the latest version. valid values: on: enabled off: disabled.
    rulesetVersion string
    The currently used version, in the format compliant with ISO 8601 standard, such as 2023-12-21T12:00:32Z. it is empty by default and is only an output parameter.
    auto_update_to_latest_version str
    Indicates whether to enable automatic update to the latest version. valid values: on: enabled off: disabled.
    ruleset_version str
    The currently used version, in the format compliant with ISO 8601 standard, such as 2023-12-21T12:00:32Z. it is empty by default and is only an output parameter.
    autoUpdateToLatestVersion String
    Indicates whether to enable automatic update to the latest version. valid values: on: enabled off: disabled.
    rulesetVersion String
    The currently used version, in the format compliant with ISO 8601 standard, such as 2023-12-21T12:00:32Z. it is empty by default and is only an output parameter.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroup, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupArgs

    Action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    GroupId string
    Group name of the managed rule. if the rule group for the configuration is not specified, it will be processed based on the default configuration. refer to product documentation for the specific value of GroupId.
    SensitivityLevel string
    Protection level of the managed rule group. valid values: loose: lenient, only contains ultra-high risk rules. at this point, configure Action, and RuleActions configuration is invalid; normal: normal, contains ultra-high risk and high-risk rules. at this point, configure Action, and RuleActions configuration is invalid; strict: strict, contains ultra-high risk, high-risk and medium-risk rules. at this point, configure Action, and RuleActions configuration is invalid; extreme: super strict, contains ultra-high risk, high-risk, medium-risk and low-risk rules. at this point, configure Action, and RuleActions configuration is invalid; custom: custom, refined strategy. configure the disposal method for each individual rule. at this point, the Action field is invalid. use RuleActions to configure the refined strategy for each individual rule..
    MetaDatas List<TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaData>
    Managed rule group information, for output only.
    RuleActions List<TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleAction>
    Specific configuration of rule items under the managed rule group. the configuration is effective only when SensitivityLevel is custom.
    Action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    GroupId string
    Group name of the managed rule. if the rule group for the configuration is not specified, it will be processed based on the default configuration. refer to product documentation for the specific value of GroupId.
    SensitivityLevel string
    Protection level of the managed rule group. valid values: loose: lenient, only contains ultra-high risk rules. at this point, configure Action, and RuleActions configuration is invalid; normal: normal, contains ultra-high risk and high-risk rules. at this point, configure Action, and RuleActions configuration is invalid; strict: strict, contains ultra-high risk, high-risk and medium-risk rules. at this point, configure Action, and RuleActions configuration is invalid; extreme: super strict, contains ultra-high risk, high-risk, medium-risk and low-risk rules. at this point, configure Action, and RuleActions configuration is invalid; custom: custom, refined strategy. configure the disposal method for each individual rule. at this point, the Action field is invalid. use RuleActions to configure the refined strategy for each individual rule..
    MetaDatas []TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaData
    Managed rule group information, for output only.
    RuleActions []TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleAction
    Specific configuration of rule items under the managed rule group. the configuration is effective only when SensitivityLevel is custom.
    action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    groupId String
    Group name of the managed rule. if the rule group for the configuration is not specified, it will be processed based on the default configuration. refer to product documentation for the specific value of GroupId.
    sensitivityLevel String
    Protection level of the managed rule group. valid values: loose: lenient, only contains ultra-high risk rules. at this point, configure Action, and RuleActions configuration is invalid; normal: normal, contains ultra-high risk and high-risk rules. at this point, configure Action, and RuleActions configuration is invalid; strict: strict, contains ultra-high risk, high-risk and medium-risk rules. at this point, configure Action, and RuleActions configuration is invalid; extreme: super strict, contains ultra-high risk, high-risk, medium-risk and low-risk rules. at this point, configure Action, and RuleActions configuration is invalid; custom: custom, refined strategy. configure the disposal method for each individual rule. at this point, the Action field is invalid. use RuleActions to configure the refined strategy for each individual rule..
    metaDatas List<TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaData>
    Managed rule group information, for output only.
    ruleActions List<TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleAction>
    Specific configuration of rule items under the managed rule group. the configuration is effective only when SensitivityLevel is custom.
    action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    groupId string
    Group name of the managed rule. if the rule group for the configuration is not specified, it will be processed based on the default configuration. refer to product documentation for the specific value of GroupId.
    sensitivityLevel string
    Protection level of the managed rule group. valid values: loose: lenient, only contains ultra-high risk rules. at this point, configure Action, and RuleActions configuration is invalid; normal: normal, contains ultra-high risk and high-risk rules. at this point, configure Action, and RuleActions configuration is invalid; strict: strict, contains ultra-high risk, high-risk and medium-risk rules. at this point, configure Action, and RuleActions configuration is invalid; extreme: super strict, contains ultra-high risk, high-risk, medium-risk and low-risk rules. at this point, configure Action, and RuleActions configuration is invalid; custom: custom, refined strategy. configure the disposal method for each individual rule. at this point, the Action field is invalid. use RuleActions to configure the refined strategy for each individual rule..
    metaDatas TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaData[]
    Managed rule group information, for output only.
    ruleActions TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleAction[]
    Specific configuration of rule items under the managed rule group. the configuration is effective only when SensitivityLevel is custom.
    action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    group_id str
    Group name of the managed rule. if the rule group for the configuration is not specified, it will be processed based on the default configuration. refer to product documentation for the specific value of GroupId.
    sensitivity_level str
    Protection level of the managed rule group. valid values: loose: lenient, only contains ultra-high risk rules. at this point, configure Action, and RuleActions configuration is invalid; normal: normal, contains ultra-high risk and high-risk rules. at this point, configure Action, and RuleActions configuration is invalid; strict: strict, contains ultra-high risk, high-risk and medium-risk rules. at this point, configure Action, and RuleActions configuration is invalid; extreme: super strict, contains ultra-high risk, high-risk, medium-risk and low-risk rules. at this point, configure Action, and RuleActions configuration is invalid; custom: custom, refined strategy. configure the disposal method for each individual rule. at this point, the Action field is invalid. use RuleActions to configure the refined strategy for each individual rule..
    meta_datas Sequence[TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaData]
    Managed rule group information, for output only.
    rule_actions Sequence[TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleAction]
    Specific configuration of rule items under the managed rule group. the configuration is effective only when SensitivityLevel is custom.
    action Property Map
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    groupId String
    Group name of the managed rule. if the rule group for the configuration is not specified, it will be processed based on the default configuration. refer to product documentation for the specific value of GroupId.
    sensitivityLevel String
    Protection level of the managed rule group. valid values: loose: lenient, only contains ultra-high risk rules. at this point, configure Action, and RuleActions configuration is invalid; normal: normal, contains ultra-high risk and high-risk rules. at this point, configure Action, and RuleActions configuration is invalid; strict: strict, contains ultra-high risk, high-risk and medium-risk rules. at this point, configure Action, and RuleActions configuration is invalid; extreme: super strict, contains ultra-high risk, high-risk, medium-risk and low-risk rules. at this point, configure Action, and RuleActions configuration is invalid; custom: custom, refined strategy. configure the disposal method for each individual rule. at this point, the Action field is invalid. use RuleActions to configure the refined strategy for each individual rule..
    metaDatas List<Property Map>
    Managed rule group information, for output only.
    ruleActions List<Property Map>
    Specific configuration of rule items under the managed rule group. the configuration is effective only when SensitivityLevel is custom.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupAction, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionArgs

    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaData, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaDataArgs

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaDataRuleDetail, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupMetaDataRuleDetailArgs

    Description string
    RiskLevel string
    RuleId string
    RuleVersion string
    Tags List<string>
    Description string
    RiskLevel string
    RuleId string
    RuleVersion string
    Tags []string
    description String
    riskLevel String
    ruleId String
    ruleVersion String
    tags List<String>
    description string
    riskLevel string
    ruleId string
    ruleVersion string
    tags string[]
    description str
    risk_level str
    rule_id str
    rule_version str
    tags Sequence[str]
    description String
    riskLevel String
    ruleId String
    ruleVersion String
    tags List<String>

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleAction, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionArgs

    Action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    RuleId string
    Specific items under the managed rule group, which are used to rewrite the configuration content of this individual rule item. refer to product documentation for details.
    Action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    RuleId string
    Specific items under the managed rule group, which are used to rewrite the configuration content of this individual rule item. refer to product documentation for details.
    action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    ruleId String
    Specific items under the managed rule group, which are used to rewrite the configuration content of this individual rule item. refer to product documentation for details.
    action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    ruleId string
    Specific items under the managed rule group, which are used to rewrite the configuration content of this individual rule item. refer to product documentation for details.
    action TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionAction
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    rule_id str
    Specific items under the managed rule group, which are used to rewrite the configuration content of this individual rule item. refer to product documentation for details.
    action Property Map
    Specify the handling action for the managed rule item in RuleId. the Name parameter value of SecurityAction supports: Deny: block and respond with an interception page; Monitor: observe, do not process the request and record the security event in logs; Disabled: Disabled, do not scan the request and skip this rule..
    ruleId String
    Specific items under the managed rule group, which are used to rewrite the configuration content of this individual rule item. refer to product documentation for details.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionAction, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionArgs

    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyManagedRulesManagedRuleGroupRuleActionActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRules, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesArgs

    Rules List<TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRule>
    A list of precise rate limiting definitions. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the Rules parameter length is zero: clear all precise rate limiting configurations. . If the RateLimitingRules parameter value is not specified in the SecurityPolicy parameter: keep the existing custom rule configuration and do not modify it. .
    Rules []TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRule
    A list of precise rate limiting definitions. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the Rules parameter length is zero: clear all precise rate limiting configurations. . If the RateLimitingRules parameter value is not specified in the SecurityPolicy parameter: keep the existing custom rule configuration and do not modify it. .
    rules List<TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRule>
    A list of precise rate limiting definitions. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the Rules parameter length is zero: clear all precise rate limiting configurations. . If the RateLimitingRules parameter value is not specified in the SecurityPolicy parameter: keep the existing custom rule configuration and do not modify it. .
    rules TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRule[]
    A list of precise rate limiting definitions. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the Rules parameter length is zero: clear all precise rate limiting configurations. . If the RateLimitingRules parameter value is not specified in the SecurityPolicy parameter: keep the existing custom rule configuration and do not modify it. .
    rules Sequence[TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRule]
    A list of precise rate limiting definitions. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the Rules parameter length is zero: clear all precise rate limiting configurations. . If the RateLimitingRules parameter value is not specified in the SecurityPolicy parameter: keep the existing custom rule configuration and do not modify it. .
    rules List<Property Map>
    A list of precise rate limiting definitions. When using ModifySecurityPolicy to modify the Web protection configuration: If the Rules parameter is not specified, or the Rules parameter length is zero: clear all precise rate limiting configurations. . If the RateLimitingRules parameter value is not specified in the SecurityPolicy parameter: keep the existing custom rule configuration and do not modify it. .

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRule, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleArgs

    Action TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    ActionDuration string
    Action The duration of the action. The supported units are: s: seconds, with a value of 1 to 120; m: minutes, with a value of 1 to 120; h: hours, with a value of 1 to 48; d: days, with a value of 1 to 30. .
    Condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    CountBies List<string>
    The matching method of the rate threshold request feature. When Enabled is on, this field is required. When there are multiple conditions, multiple conditions will be combined for statistical calculation. The number of conditions cannot exceed 5. The possible values are: http.request.ip: client IP; http.request.xff_header_ip: client IP (matching XFF header first); http.request.uri.path: requested access path; http.request.cookies['session']: cookie named session, where session can be replaced by the parameter you specify; http.request.headers['user-agent']: HTTP header named user-agent, where user-agent can be replaced by the parameter you specify; http.request.ja3: requested JA3 fingerprint; http.request.uri.query['test']: URL query parameter named test, where test can be replaced by the parameter you specify. .
    CountingPeriod string
    The statistical time window, the possible values are: 1s: 1 second; 5s: 5 seconds; 10s: 10 seconds; 20s: 20 seconds; 30s: 30 seconds; 40s: 40 seconds; 50s: 50 seconds; 1m: 1 minute; 2m: 2 minutes; 5m: 5 minutes; 10m: 10 minutes; 1h: 1 hour. .
    Enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    Id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    MaxRequestThreshold double
    The cumulative number of interceptions within the time range of the precise rate limit, ranging from 1 to 100000.
    Name string
    The name of the precise rate limit.
    Priority double
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    Action TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    ActionDuration string
    Action The duration of the action. The supported units are: s: seconds, with a value of 1 to 120; m: minutes, with a value of 1 to 120; h: hours, with a value of 1 to 48; d: days, with a value of 1 to 30. .
    Condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    CountBies []string
    The matching method of the rate threshold request feature. When Enabled is on, this field is required. When there are multiple conditions, multiple conditions will be combined for statistical calculation. The number of conditions cannot exceed 5. The possible values are: http.request.ip: client IP; http.request.xff_header_ip: client IP (matching XFF header first); http.request.uri.path: requested access path; http.request.cookies['session']: cookie named session, where session can be replaced by the parameter you specify; http.request.headers['user-agent']: HTTP header named user-agent, where user-agent can be replaced by the parameter you specify; http.request.ja3: requested JA3 fingerprint; http.request.uri.query['test']: URL query parameter named test, where test can be replaced by the parameter you specify. .
    CountingPeriod string
    The statistical time window, the possible values are: 1s: 1 second; 5s: 5 seconds; 10s: 10 seconds; 20s: 20 seconds; 30s: 30 seconds; 40s: 40 seconds; 50s: 50 seconds; 1m: 1 minute; 2m: 2 minutes; 5m: 5 minutes; 10m: 10 minutes; 1h: 1 hour. .
    Enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    Id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    MaxRequestThreshold float64
    The cumulative number of interceptions within the time range of the precise rate limit, ranging from 1 to 100000.
    Name string
    The name of the precise rate limit.
    Priority float64
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    action TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    actionDuration String
    Action The duration of the action. The supported units are: s: seconds, with a value of 1 to 120; m: minutes, with a value of 1 to 120; h: hours, with a value of 1 to 48; d: days, with a value of 1 to 30. .
    condition String
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    countBies List<String>
    The matching method of the rate threshold request feature. When Enabled is on, this field is required. When there are multiple conditions, multiple conditions will be combined for statistical calculation. The number of conditions cannot exceed 5. The possible values are: http.request.ip: client IP; http.request.xff_header_ip: client IP (matching XFF header first); http.request.uri.path: requested access path; http.request.cookies['session']: cookie named session, where session can be replaced by the parameter you specify; http.request.headers['user-agent']: HTTP header named user-agent, where user-agent can be replaced by the parameter you specify; http.request.ja3: requested JA3 fingerprint; http.request.uri.query['test']: URL query parameter named test, where test can be replaced by the parameter you specify. .
    countingPeriod String
    The statistical time window, the possible values are: 1s: 1 second; 5s: 5 seconds; 10s: 10 seconds; 20s: 20 seconds; 30s: 30 seconds; 40s: 40 seconds; 50s: 50 seconds; 1m: 1 minute; 2m: 2 minutes; 5m: 5 minutes; 10m: 10 minutes; 1h: 1 hour. .
    enabled String
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id String
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    maxRequestThreshold Double
    The cumulative number of interceptions within the time range of the precise rate limit, ranging from 1 to 100000.
    name String
    The name of the precise rate limit.
    priority Double
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    action TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    actionDuration string
    Action The duration of the action. The supported units are: s: seconds, with a value of 1 to 120; m: minutes, with a value of 1 to 120; h: hours, with a value of 1 to 48; d: days, with a value of 1 to 30. .
    condition string
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    countBies string[]
    The matching method of the rate threshold request feature. When Enabled is on, this field is required. When there are multiple conditions, multiple conditions will be combined for statistical calculation. The number of conditions cannot exceed 5. The possible values are: http.request.ip: client IP; http.request.xff_header_ip: client IP (matching XFF header first); http.request.uri.path: requested access path; http.request.cookies['session']: cookie named session, where session can be replaced by the parameter you specify; http.request.headers['user-agent']: HTTP header named user-agent, where user-agent can be replaced by the parameter you specify; http.request.ja3: requested JA3 fingerprint; http.request.uri.query['test']: URL query parameter named test, where test can be replaced by the parameter you specify. .
    countingPeriod string
    The statistical time window, the possible values are: 1s: 1 second; 5s: 5 seconds; 10s: 10 seconds; 20s: 20 seconds; 30s: 30 seconds; 40s: 40 seconds; 50s: 50 seconds; 1m: 1 minute; 2m: 2 minutes; 5m: 5 minutes; 10m: 10 minutes; 1h: 1 hour. .
    enabled string
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id string
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    maxRequestThreshold number
    The cumulative number of interceptions within the time range of the precise rate limit, ranging from 1 to 100000.
    name string
    The name of the precise rate limit.
    priority number
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    action TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleAction
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    action_duration str
    Action The duration of the action. The supported units are: s: seconds, with a value of 1 to 120; m: minutes, with a value of 1 to 120; h: hours, with a value of 1 to 48; d: days, with a value of 1 to 30. .
    condition str
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    count_bies Sequence[str]
    The matching method of the rate threshold request feature. When Enabled is on, this field is required. When there are multiple conditions, multiple conditions will be combined for statistical calculation. The number of conditions cannot exceed 5. The possible values are: http.request.ip: client IP; http.request.xff_header_ip: client IP (matching XFF header first); http.request.uri.path: requested access path; http.request.cookies['session']: cookie named session, where session can be replaced by the parameter you specify; http.request.headers['user-agent']: HTTP header named user-agent, where user-agent can be replaced by the parameter you specify; http.request.ja3: requested JA3 fingerprint; http.request.uri.query['test']: URL query parameter named test, where test can be replaced by the parameter you specify. .
    counting_period str
    The statistical time window, the possible values are: 1s: 1 second; 5s: 5 seconds; 10s: 10 seconds; 20s: 20 seconds; 30s: 30 seconds; 40s: 40 seconds; 50s: 50 seconds; 1m: 1 minute; 2m: 2 minutes; 5m: 5 minutes; 10m: 10 minutes; 1h: 1 hour. .
    enabled str
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id str
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    max_request_threshold float
    The cumulative number of interceptions within the time range of the precise rate limit, ranging from 1 to 100000.
    name str
    The name of the precise rate limit.
    priority float
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.
    action Property Map
    The precise rate limit handling method. The values are: Monitor: Observe; Deny: Intercept, where DenyActionParameters.Name supports Deny and ReturnCustomPage; Challenge: Challenge, where ChallengeActionParameters.Name supports JSChallenge and ManagedChallenge; Redirect: Redirect to URL; .
    actionDuration String
    Action The duration of the action. The supported units are: s: seconds, with a value of 1 to 120; m: minutes, with a value of 1 to 120; h: hours, with a value of 1 to 48; d: days, with a value of 1 to 30. .
    condition String
    The specific content of the precise rate limit must conform to the expression syntax. For detailed specifications, see the product documentation.
    countBies List<String>
    The matching method of the rate threshold request feature. When Enabled is on, this field is required. When there are multiple conditions, multiple conditions will be combined for statistical calculation. The number of conditions cannot exceed 5. The possible values are: http.request.ip: client IP; http.request.xff_header_ip: client IP (matching XFF header first); http.request.uri.path: requested access path; http.request.cookies['session']: cookie named session, where session can be replaced by the parameter you specify; http.request.headers['user-agent']: HTTP header named user-agent, where user-agent can be replaced by the parameter you specify; http.request.ja3: requested JA3 fingerprint; http.request.uri.query['test']: URL query parameter named test, where test can be replaced by the parameter you specify. .
    countingPeriod String
    The statistical time window, the possible values are: 1s: 1 second; 5s: 5 seconds; 10s: 10 seconds; 20s: 20 seconds; 30s: 30 seconds; 40s: 40 seconds; 50s: 50 seconds; 1m: 1 minute; 2m: 2 minutes; 5m: 5 minutes; 10m: 10 minutes; 1h: 1 hour. .
    enabled String
    Whether the precise rate limit rule is enabled. The possible values are: on: enabled; off: disabled. .
    id String
    The ID of the precise rate limit. The rule ID can support different rule configuration operations: Add a new rule: the ID is empty or the ID parameter is not specified; Modify an existing rule: specify the rule ID to be updated/modified; Delete an existing rule: in the RateLimitingRules parameter, the existing rules not included in the Rules list will be deleted. .
    maxRequestThreshold Number
    The cumulative number of interceptions within the time range of the precise rate limit, ranging from 1 to 100000.
    name String
    The name of the precise rate limit.
    priority Number
    The priority of precise rate limiting ranges from 0 to 100, and the default is 0.

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleAction, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionArgs

    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    Name string
    The specific action of security execution. The values are:

    BlockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    ChallengeActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    DenyActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParameters
    Additional parameters when Name is Deny.
    RedirectActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    ReturnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name string
    The specific action of security execution. The values are:

    blockIpActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    denyActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirectActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name str
    The specific action of security execution. The values are:

    block_ip_action_parameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParameters
    To be deprecated, additional parameter when Name is BlockIP.
    challenge_action_parameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParameters
    Additional parameters when Name is Challenge.
    deny_action_parameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParameters
    Additional parameters when Name is Deny.
    redirect_action_parameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParameters
    Additional parameters when Name is Redirect.
    return_custom_page_action_parameters TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParameters
    To be deprecated, additional parameter when Name is ReturnCustomPage.
    name String
    The specific action of security execution. The values are:

    blockIpActionParameters Property Map
    To be deprecated, additional parameter when Name is BlockIP.
    challengeActionParameters Property Map
    Additional parameters when Name is Challenge.
    denyActionParameters Property Map
    Additional parameters when Name is Deny.
    redirectActionParameters Property Map
    Additional parameters when Name is Redirect.
    returnCustomPageActionParameters Property Map
    To be deprecated, additional parameter when Name is ReturnCustomPage.

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParameters, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionBlockIpActionParametersArgs

    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    Duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration string
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration str
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .
    duration String
    The penalty duration for banning an IP. Supported units are: s: seconds, value range 1 to 120; m: minutes, value range 1 to 120; h: hours, value range 1 to 48. .

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParameters, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionChallengeActionParametersArgs

    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    ChallengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    AttesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    Interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption string
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId string
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval string
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challenge_option str
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attester_id str
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval str
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .
    challengeOption String
    The specific challenge action to be executed safely. The possible values are: InterstitialChallenge: interstitial challenge; InlineChallenge: embedded challenge; JSChallenge: JavaScript challenge; ManagedChallenge: managed challenge. .
    attesterId String
    Client authentication method ID. This field is required when Name is InterstitialChallenge/InlineChallenge.
    interval String
    The time interval for repeating the challenge. When Name is InterstitialChallenge/InlineChallenge, this field is required. The default value is 300s. Supported units are: s: seconds, value range 1 to 60; m: minutes, value range 1 to 60; h: hours, value range 1 to 24. .

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParameters, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionDenyActionParametersArgs

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    BlockIp string
    Whether to extend the blocking of source IP. The possible values are:

    BlockIpDuration string
    When BlockIP is on, the IP blocking duration.
    ErrorPageId string
    The PageId of the custom page.
    ResponseCode string
    Customize the status code of the page.
    ReturnCustomPage string
    Whether to use custom pages. The possible values are:

    Stall string
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    blockIp string
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration string
    When BlockIP is on, the IP blocking duration.
    errorPageId string
    The PageId of the custom page.
    responseCode string
    Customize the status code of the page.
    returnCustomPage string
    Whether to use custom pages. The possible values are:

    stall string
    Whether to ignore the request source suspension. The value is:

    block_ip str
    Whether to extend the blocking of source IP. The possible values are:

    block_ip_duration str
    When BlockIP is on, the IP blocking duration.
    error_page_id str
    The PageId of the custom page.
    response_code str
    Customize the status code of the page.
    return_custom_page str
    Whether to use custom pages. The possible values are:

    stall str
    Whether to ignore the request source suspension. The value is:

    blockIp String
    Whether to extend the blocking of source IP. The possible values are:

    blockIpDuration String
    When BlockIP is on, the IP blocking duration.
    errorPageId String
    The PageId of the custom page.
    responseCode String
    Customize the status code of the page.
    returnCustomPage String
    Whether to use custom pages. The possible values are:

    stall String
    Whether to ignore the request source suspension. The value is:

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParameters, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionRedirectActionParametersArgs

    Url string
    The URL to redirect.
    Url string
    The URL to redirect.
    url String
    The URL to redirect.
    url string
    The URL to redirect.
    url str
    The URL to redirect.
    url String
    The URL to redirect.

    TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParameters, TeoSecurityPolicyConfigSecurityPolicyRateLimitingRulesRuleActionReturnCustomPageActionParametersArgs

    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    ErrorPageId string
    The custom page ID of the response.
    ResponseCode string
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.
    errorPageId string
    The custom page ID of the response.
    responseCode string
    Response status code.
    error_page_id str
    The custom page ID of the response.
    response_code str
    Response status code.
    errorPageId String
    The custom page ID of the response.
    responseCode String
    Response status code.

    Import

    teo security policy can be imported using the id, e.g.

    If entity is ZoneDefaultPolicy

    $ pulumi import tencentcloud:index/teoSecurityPolicyConfig:TeoSecurityPolicyConfig example zone-37u62pwxfo8s#ZoneDefaultPolicy
    

    If entity is Host

    $ pulumi import tencentcloud:index/teoSecurityPolicyConfig:TeoSecurityPolicyConfig example zone-37u62pwxfo8s#Host#www.example.com
    

    If entity is Template

    $ pulumi import tencentcloud:index/teoSecurityPolicyConfig:TeoSecurityPolicyConfig example zone-37u62pwxfo8s#Template#temp-05dtxkyw
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    tencentcloud tencentcloudstack/terraform-provider-tencentcloud
    License
    Notes
    This Pulumi package is based on the tencentcloud Terraform Provider.
    tencentcloud logo
    tencentcloud 1.82.1 published on Monday, Jun 16, 2025 by tencentcloudstack