{ "Waf": { "Overview": { "index_1": "Request", "index_2": "Malicious request", "index_3": "Traffic filtering request chart", "index_4": "After filtering", "index_5": "Total requests", "index_6": "Time: {0} {1}", "index_7_1": "499 error: {0}", "index_7_2": "502 error: {0}", "index_8": "Automatically refresh every {0} seconds", "index_9": "Number of isolated Trojans", "index_10": "Unprotected website", "index_11": "One-click activation", "index_12": "View details", "index_13": "Possibly incorrect CC protection rule", "index_14": "Isolated Trojan details", "index_15": "Details of unprotected website", "index_16": "Details of possibly incorrect cc protection rule", "index_17": "File name", "index_18": "Site name", "index_19": "Status", "index_20": "Details", "index_21": "Real-time QPS: {0}/s", "index_22": "Time: {0}", "index_23": "Interception map (today)", "index_24": "Low", "index_25": "High", "index_26": "Attack times: {0}", "index_27": "Attack IP", "index_28": "Attack times", "index_29": "IP attribution", "index_30": "Today's Block report >>", "index_31": "Block type (today)", "index_32": "Today's Block", "index_33": "{0}\n{1}/Item, {2}%", "index_34": "3D Map", "index_35": "Enable 3D Map", "index_36": "Disable 3D Map", "index_37": "After enabling the 3D map, the map will switch to 3D mode. Confirm?", "index_38": "After disabling the 3D map, the map will switch to 2D mode. Confirm?", "index_39": "Real-time origin response: {0}ms", "index_40": "Origin response time", "index_41": "Traffic", "index_42": "IP count", "index_43": "Dynamic/Static (Traffic): {0}{2} / {1}{2}", "index_44": "Access/Block Map", "index_45": "Data uses top 10k records", "index_46": "(*Only shows TOP 5 coordinates)", "index_47": "Requests", "index_48": "Blocks", "index_49": "Attacked domains TOP10", "index_50": "Traffic ranking TOP10", "index_51": "Traffic ranking TOP100", "index_52": "IP inclusion criteria:", "index_53": "Dynamic requests exceed 100 and dynamic traffic exceeds 512KB", "index_54": "Static file count exceeds 500 and traffic exceeds 512KB", "index_55": "Total requests exceed 500", "index_56": "Static traffic exceeds 10MB", "index_57": "Dynamic traffic exceeds 1MB", "index_58": "Any one of the above is enough", "index_59": "URL inclusion criteria:", "index_60": "Current URL traffic exceeds 1MB and visits exceed 100", "index_61": "Current URL visits exceed 2000", "index_62": "Visited pages TOP10", "index_63": "Visited pages TOP100", "index_64": "Domain", "index_65": "IP", "index_66": "Visits", "index_67": "Static requests", "index_68": "Static traffic", "index_69": "URL", "index_70": "Time", "index_71": "IP address", "index_72": "Attack type", "index_73": "Latest block events", "index_74": "Block type", "index_75": "Today's blocks", "index_76": "Req IP", "index_77": "Req count", "index_78": "WAF protection is disabled", "index_79": "WAF is currently disabled. Your websites are no longer protected. ", "index_80": "Enable protection now", "index_81": "Real-time traffic: {0} KB/s", "index_82": "Content type", "index_83": "Cookie visits" }, "Site": { "index_1": "Intercept access from known malicious IPs of YakPanel", "index_2": "Please enter site name", "index_3": "CDN option: After enabling CDN for a website, the CDN button must be turned on. Otherwise, the IPs of CDN nodes will be intercepted. For detailed information, please refer to the tutorial.", "index_4": "Exporting defaults to export all. If you want to export a single site or specific sites, check the sites first and then export.", "index_5": "Total interception times [{0}]", "index_6": "Interception log [{0}]", "index_7": "No site logs for now", "index_8": "Site", "index_9": "Total interceptions", "index_10": "Intelligent CC defense will automatically determine if there is high load or slow response. If there is an abnormality, human-machine verification will be enabled for protection.", "index_11": "CC Defense", "index_12": "Status", "index_13": "Log", "index_15": "Type", "index_16": "Interception times", "index_17": "Select date:", "index_18": "IP filtering:", "index_19": "Supports IPs separated by commas. Supports searching IP ranges like 192.168.1.*", "index_20": "Search", "index_21": "Advanced search", "index_22": "URL filtering", "index_23": "Supports URLs separated by commas.", "index_24": "Please enter UserAgent", "index_26": "Start time", "index_27": "User IP", "index_28": "URL address", "index_29": "Intercepted", "index_30": "IP attribution", "index_31": "Intranet address", "index_32": "Filter", "index_33": "White URL", "index_34": "Details", "index_35": "times", "index_36": "Fake spider", "index_37": "Intercept forged spider IPs", "index_38": "Using CDN", "index_39": "CDN: A switch for obtaining IPs when a website enables CDN.", "index_40": "Smart CC defense", "index_41": "According to website load conditions and historical access data, automatically analyze whether an attack is in progress. Automatically adjust defense strategies according to the impact, thereby reducing the impact on business.", "index_42": "Interception times: {0} times", "index_43": "Crawl Protection", "index_44": "Waiting Room/Rate Limit", "index_45": "Crawl Protection [{0}]", "index_46": "Waiting Room/Rate Limit [{0}]", "Config": { "index_1": "Website Firewall Switch", "index_2": "Note: Most configurations here only apply to the current site!", "index_3": "Name", "index_4": "Description", "index_5": "Status", "index_6": "Maximize protection against intrusion, which may affect normal requests such as payments and APIs. Only web access is allowed; other actions will be intercepted. It is recommended to enable this only during attack-defense drills!", "index_7": "Rule", "index_8": "Request the same URI more than {index_2} times in {index_1} second, Block IP for {index_3} seconds.", "index_9": "If spider crawling is disabled, the website will not be crawled!", "index_10": "Note: Disabling may affect data entry.", "index_11": "Mode", "index_12": "After enabling, a CAPTCHA mechanism will appear when accessing the website, requiring manual verification to continue. It is recommended to enable this during CC attacks.", "index_13": "Request Type", "index_14": "Access Time", "index_16": "Access Count", "index_18": "Block Time", "index_19": "URL CC Defense", "index_20": "Regional Verification", "index_21": "`Please select a region`", "index_22": "Verification Method", "index_23": "CAPTCHA verification: If the site has CDN enabled, it is recommended not to use this.", "index_24": "Settings here only apply to the current site.", "index_29": "Please do not set overly strict CC rules to avoid affecting the normal user experience.", "index_34": "Please enter access time.", "index_35": "Recommended value is an integer greater than 30.", "index_36": "Please enter access count.", "index_37": "Please enter block time.", "index_38": "Standard Mode", "index_39": "Enhanced Mode", "index_40": "Loose", "index_41": "Standard (Recommended)", "index_42": "Strict", "index_43": "Super strict", "index_46": "Browser", "index_47": "Redirect", "index_48": "Code", "index_49": "Captcha", "index_50": "Slide", "index_51": "The current panel cannot enable CAPTCHA and slide verification.", "index_52": "Setting {0} CC configuration, please wait...", "index_53": "Attack Count", "index_56": "Please enter attack count.", "index_57": "Global Application", "index_58": "Global settings for current attack count interception, covering all sites. Do you wish to continue?", "index_59": "Header Name", "index_60": "The firewall will attempt to retrieve the client IP from the above headers.", "index_61": "Please enter Header.", "index_62": "File extension, excluding the dot (.), e.g., sql.", "index_63": "Rule values are case insensitive except for regular expression statements; it is recommended to use lowercase consistently.", "index_64": "Directly fill in the extension to be prohibited. For example, to prohibit access to *.sql files: sql.", "index_65": "Please enter extension.", "index_66": "Rule", "index_67": "URL address, e.g., /admin/update", "index_68": "Rule values are case insensitive except for regular expression statements; it is recommended to use lowercase consistently.", "index_69": "Do not include URI parameters here; generally targeted at directory URLs. Example: /admin.", "index_70": "Please enter URL address.", "index_71": "This inherits rules that have been enabled in global settings.", "index_72": "The settings here only apply to the current site.", "index_73": "Will filter both key and value; please set with caution.", "index_74": "Please use regular expressions; backup the original expressions before submitting.", "index_75": "Default allowed spiders to crawl means allowing crawling.", "index_76": "The status code after prohibition indicates the code returned after prohibiting that spider.", "index_77": "Status Code After Prohibition", "index_78": "Allow Crawling", "index_79": "Filter Value, e.g., date.", "index_80": "Can be used to enhance protection for login interfaces, comment sections, etc., quickly patching security vulnerabilities in third-party programs.", "index_81": "Parameter names and values are case sensitive.", "index_82": "This filter applies to both GET and POST parameters.", "index_83": "Example: /admin/update.php?update=_date&date=666. The update parameter contains _date, which has a risk of vulnerability. It can be set to:", "index_84": "URL address /admin/update.php, filtering rule _date, filtering the content of the parameter.", "index_85": "Please enter address or filtering rule.", "index_86": "URL Address", "index_87": "Filtering Rule", "index_88": "URI address, e.g., /admin/update.", "index_89": "Parameter Name", "index_90": "Parameter Value", "index_91": "Can be used to protect backend addresses, API interfaces, and other non-public URI addresses from penetration.", "index_92": "Set protected URL. Accessing this URL requires specified parameter name and value; otherwise, it will be intercepted by the firewall.", "index_93": "Assuming URI address: /admin/admin.php, parameter name: test, parameter value: example.com.", "index_94": "Correct access method: /admin/admin.php?test=example.com.", "index_95": "Please enter address or parameter.", "index_96": "URI Address", "index_97": "This IP has requested the same URL more than {index_1} times within {index_2} seconds, triggering CC defense and blocking this IP for {index_3} seconds", "index_98": "Regional verification: The selected region automatically turns on verification mode: {index_1}, access time: {index_2} seconds, If verification fails: {index_3} times, block: {index_4} seconds", "index_99": "Global", "index_100": "Site", "index_101": "Accumulated malicious requests exceeded {index_1} times within {index_2} seconds , blocked {index_3} seconds", "index_102": "Browser verification: Verify if it is a normal browser request. If the website encounters issues after opening, please close it", "index_103": "File extension, without the dot (.), e.g.: sql", "index_104": "Enable", "index_105": "Disable", "index_106": "Not Recommended", "index_107": "Recommended to enable. When a specific page is under CC attack, human verification will be triggered for the attacked URL without affecting other pages.", "index_108": "Intercept based on the number of visits per IP within 24 hours. Recommended to enable. The default threshold should not be lower than 2000 visits (the count will reset if Nginx is restarted).", "index_109": "Single IP Defense", "index_110": "Include Static Resources", "index_111": "The suggested value is greater than 5000; otherwise, false positives may occur.", "btn_1": "Global Apply", "title_1": "Website Configuration [{0}]", "title_5": "Edit Site Rules [{0}] - [{1}]", "title_6": "Common Scanner Filtering Rules", "title_7": "Manage Website CDN-Headers [{0}]", "title_8": "Prohibited URLs for PHP Execution [{0}]", "title_9": "Prohibited URLs [{0}]", "title_10": "Prohibited File Extensions [{0}]", "title_11": "Prohibited File Types for Upload [{0}]", "title_12": "Protected URI Addresses [{0}]", "title_13": "URL-Specific Filtering [{0}]", "title_14": "Set CC Rules {0} ", "title_15": "Set Attack Count Interception {0}", "desc_1": "Loose", "desc_2": "Poor effect, less interception", "desc_3": "Standard (recommended)", "desc_4": "Recommended, better effect, fewer false positives, use URL without parameters as the only value", "desc_5": "Strict", "desc_6": "Use with caution: good effect, more false positives, use IP+UA as the only value", "desc_7": "Super strict", "desc_8": "Not recommended: strong effect, large number of false positives, using IP as the only value", "desc_9": "Effect: Significantly improves interception effectiveness", "desc_10": "Impact: User experience may decline and some normal accesses might be mistakenly intercepted", "desc_11": "Suggestion: Temporarily enable when unable to defend in normal mode, and disable after the attack ends" }, "ReptileProtection": { "index_1": "Dynamic Encryption", "index_2": "Default (with YakPanel logo)", "index_3": "Custom Page Redirect Content", "index_4": "For example: The website www.yakpanel.com is being decrypted, please wait.", "index_5": "Image Watermark", "index_6": "Default (Website Domain)", "index_7": "Custom Watermark Content", "index_8": "For example: www.yakpanel.com is not supported yet, will be added in the next version.", "index_9": "Crawler Protection (Currently a beta feature)", "index_10": "Effect: ", "index_11": "When enabled, the webpage will be randomly encrypted, and each visit will display a different page, effectively preventing crawlers.", "index_12": "Impact: ", "index_13": "Enabling this feature will double the traffic compared to before, and in some rare cases, it may cause the webpage to fail to load.", "index_14": "Recommendation: ", "index_15": "You can try enabling it for testing purposes, but it is not recommended for live/production environments.", "index_16": "Effect: Webpage content is randomly encrypted on each visit, effectively preventing crawlers.", "index_17": "Impact: Enabling this feature will double the traffic compared to previous levels.", "index_18": "Recommendation: It is advised not to enable this for online services.", "index_19": "Warning: This is a beta feature. Do NOT enable it for production services!!" }, "WaitingRoom": { "index_1": "Waiting Room Switch", "index_2": "Max Number of Users", "index_3": "Active Timeout", "index_4": "Minutes, QPS exceeds", "index_5": "times to trigger", "index_6": "Identification Page", "index_7": "Default (with YakPanel logo 6KB)", "index_8": "Custom Web Content (3KB)", "index_9": "For example: Too many online users on the website, need to queue", "index_10": "Waiting Room/Rate Limiting currently in testing", "index_11": "Effect: ", "index_12": "Enabling the waiting room can help alleviate peak load issues", "index_13": "Impact: ", "index_14": "Older versions of browsers may experience continuous loading", "index_15": "Suggestion: ", "index_16": "Testing businesses can try enabling it, but it's recommended not to enable for online services", "index_17": "Default Policy: ", "index_18": "Website real-time traffic must exceed once to trigger. Up to 50 users can access simultaneously, with a timeout of 10 minutes", "index_19": "If QPS is 0, then the QPS count will not be detected" }, "API": { "index_1": "Setting up crawl protection, please wait...", "index_2": "Setting up waiting room/rate limiting, please wait..." } }, "Block": { "index_1": "Interception record", "index_2": "IP blocking record", "index_3": "Rule hit record", "index_4": "Match result: {0}", "index_5": "Query time: {0}", "index_6": "*Note: Only the latest 2000 data are recorded. Each IP triggers the same rule only once in 30 seconds, and the record is updated every 60 seconds", "index_8": "Domain name/IP/URL/User-Agent/Region", "index_9": "Clear log", "index_10": "Clear site log", "index_12": "Start time", "index_13": "User IP", "index_14": "Domain name", "index_15": "Type", "index_16": "URL address", "index_17": "Status", "index_18": "Intercepted", "index_19": "IP location", "index_20": "Intranet", "index_21": "Filter", "index_22": "Block IP", "index_23": "White URL", "index_24": "Details", "index_25": "Site", "index_27": "Please select a site", "index_28": "Clear log", "index_29": "Clear the log records of the selected site, do you want to continue?", "index_30": "Unblock all", "index_31": "Clear log", "index_32": "Clear all blocked log records, but blocked IPs will not be unblocked!", "index_33": "Unblock IP address", "index_34": "Do you want to unblock all IPs from the firewall?", "index_35": "Reason for blocking", "index_36": "Malicious IP in the cloud", "index_37": "Malicious IP in the cloud", "index_38": "Fake spider", "index_39": "IDC interception", "index_40": "ThinkPHP attack", "index_41": "Malicious file upload", "index_42": "xss interception", "index_43": "sql injection interception", "index_44": "Scanner interception", "index_45": "Malicious crawler interception", "index_46": "Custom interception rules", "index_47": "Enable enhanced blocking of foreign countries", "index_48": "Foreign countries", "index_49": "Multiple malicious requests", "index_50": "Time", "index_51": "{0}s", "index_52": "White URL", "index_53": "Unblock IP", "index_54": "Do you want to unblock IP [{0}] from the firewall", "index_55": "IP has been unblocked", "index_56": "Blocking", "index_57": "Configure record type", "index_58": "Intercept", "index_59": "Release", "index_60": "Clear rule hit records", "index_61": "Note: Rule hit records cannot be restored after being cleared! ", "index_62": "Hit rule", "index_63": "Access IP", "index_64": "Region", "index_66": "Time", "index_67": "Attack IP", "index_68": "URI address", "index_69": "Filter rule", "index_70": "Incoming value", "index_71": "Risk value", "index_72": "Empty", "index_73": "*Note: Check the logs that need to be recorded", "index_74": "Add to IP blacklist", "index_75": "Operation successful", "index_76": "The URI of the current IP is the root directory, and false alarm operations cannot be performed!", "index_77": "Add to URL whitelist", "index_78": "Details [{0}]", "index_79": "Do you pull the entire IP section?", "index_80": "After adding to the URL whitelist, this URL will no longer be defended. Do you want to continue the operation? ", "index_81": "Do you want to add a URI parameter whitelist?", "index_82": "Do you want to add {ip} to the IP blacklist?" }, "Rules": { "index_1": "IP whitelist", "index_2": "IP blacklist", "index_3": "UA whitelist", "index_4": "UA blacklist", "index_5": "URL whitelist", "index_6": "URL blacklist", "index_7": "Please enter IP/remarks", "index_8": "IP segments in the blacklist will be prohibited from access, except for those already in the IP whitelist", "index_9": "Add an IP: 192.168.10.6 The starting IP is 192.168.10.6 and the ending IP is 192.168.10.6", "index_10": "Add multiple IPs: 192.168.100.6-100 The starting IP is 192.168.100.6 and the ending IP is 192.168.100.100", "index_11": "Add IP segment: 192.168.1.0/24, starting IP is 192.168.1.1, ending IP is 192.168.1.254", "index_12": "Add IP segment: 172.16.10.1/16, starting IP is 172.16.1.1, ending IP is 172.16.255.255", "index_13": "For other address segment calculations, please refer to", "index_14": "IP address online calculation", "index_15": "Import IP blacklist", "index_16": "Clear IP blacklist", "index_17": "Are you sure you want to clear IP blacklist data?", "index_18": "Start IP - End IP / IPv6 address", "index_19": "Type", "index_20": "Remarks", "index_21": "Add the following IP addresses to the blacklist", "index_22": "Start IP", "index_23": "Please enter start IP address, e.g.: 192.168.1.1", "index_24": "End IP", "index_25": "Please enter end IP address, e.g.: 192.168.1.24", "index_26": "IPv6 address", "index_27": "Enter IP, e.g.: 2606:54c0:19c0:dc02::/63", "index_28": "Please enter remarks", "index_29": "Add", "index_30": "Starting IP cannot be empty", "index_31": "Ending IP cannot be empty", "index_32": "IPv6 address cannot be empty", "index_33": "The import format is as follows: one line per file (three formats are supported): \n192.168.1.1\n192.168.1.0/24\n192.168.10.1-192.168.10.255", "index_34": "Imported data cannot be empty", "index_35": "All rules are invalid for IP segments in the whitelist, including IP blacklist and URL blacklist. IP whitelist has the highest priority", "index_36": "Import IP whitelist", "index_37": "Clear IP whitelist", "index_38": "Are you sure you want to clear IP whitelist data?", "index_39": "Add the following IP addresses to the whitelist", "index_40": "Please enter UA", "index_41": "Search for keywords in the client UA during the initialization phase. Use with caution. ", "index_42": "Can be used as a secret key in the API interface", "index_43": "Skip any interception directly after querying the keyword", "index_44": "UA cannot be empty", "index_45": "Import UA blacklist", "index_46": "Clear UA blacklist", "index_47": "Are you sure you want to clear the UA blacklist data? ", "index_48": "One line per line, for example: \nuser_agent1\nuser_agent2", "index_49": "Import UA whitelist", "index_50": "Clear UA whitelist", "index_51": "Are you sure you want to clear the UA whitelist data? ", "index_52": "For example: ^/api/admin/update", "index_53": "Please enter URL", "index_54": "A list of URLs that are prohibited from access, except when they exist in the URL whitelist and IP whitelist. ", "index_55": "Example 1: /admin/admin.php?system=abc Add address: /admin/admin.php", "index_56": "Example 2: /admin/1 1 is variable 1-99 Add address: /admin/[1-99]", "index_57": "URL cannot be empty", "index_58": "Import URL blacklist", "index_59": "Clear URL blacklist", "index_60": "Are you sure you want to clear the URL blacklist data? ", "index_61": "One per line, for example: \n/admin.php\n/user.php", "index_62": "All rules are invalid for URLs in the whitelist, excluding IP blacklist. ", "index_63": "The current URL whitelist does not support parameters. ", "index_64": "Import URL whitelist", "index_65": "Clear URL whitelist", "index_66": "Are you sure you want to clear the URL whitelist data? " }, "Area": { "index_1": "Add Region Restriction", "index_2": "Area", "index_3": "Status", "index_4": "Status code", "index_5": "200 Normal access", "index_6": "404 File not exist", "index_7": "403 Access denied", "index_8": "444 Close connection (No content)", "index_9": "502 Connection timed out", "index_10": "503 Server is unavailable", "index_11": "Website", "index_12": "All websites", "index_13": "Type", "index_14": "Pass", "index_15": "Intercept", "index_16": "Response", "index_17": "Please choose Website...", "index_18": "Region (choose more):", "index_19": "Please search...", "index_21": "Hot area", "index_22": "Other regions" }, "Flow": { "index_1": "Add Restriction", "index_2": "The priority of traffic restrictions is the lowest", "index_3": "Traffic restrictions are generally used for API interfaces; it is not recommended to enable them for the entire site", "index_4": "The suggested return type is 503 or 502", "index_5": "If you want to modify the return content, the files in the /www/server/btwaf/html directory are limit.html and limit.json. Changes will take effect after restarting Nginx", "index_6": "Add Traffic Restriction", "index_7": "Modify Traffic Restriction", "index_8": "Rule Name", "index_9": "Website Name", "index_10": "Trigger Condition", "index_11": "Single IP", "index_12": "Single IP + UA", "index_13": "All IPs", "index_14": "Accessing the specified URL more than {0} times per second", "index_15": " or within ", "index_16": "{0} seconds, accessing this URL more than {1} times", "index_17": "At {0}, traffic restriction will be triggered", "index_18": "Execute Action", "index_19": "Status Code 403 (Access Denied)", "index_20": "Status Code 404 (File Not Found)", "index_21": "Status Code 502 (Connection Timeout)", "index_22": "Status Code 503 (Service Unavailable)", "index_23": "Return Web Content", "index_24": "Intercept (Block IP)", "index_25": "Status", "index_26": "Delete Traffic Restriction", "index_27": "Are you sure you want to delete the [{0}] rule?", "Form": { "index_1": "When the website", "index_2": "Name", "index_3": "Please enter the rule name", "index_4": "Apply to website", "index_5": "Trigger Condition", "index_6": "Path", "index_7": "Access Restriction", "index_8": "Single IP", "index_9": "All IPs", "index_10": "Access Limit Per Second", "index_11": "Time Access Limit", "index_12": "seconds, exceeding", "index_13": "Response Result", "index_14": "Action Options", "index_15": "Response Page", "index_16": "Status Code 403 (Access Denied)", "index_17": "Status Code 404 (File Not Found)", "index_18": "Status Code 502 (Connection Timeout)", "index_19": "Status Code 503 (Service Unavailable)", "index_20": "Return Web Content", "index_21": "Block IP", "index_22": "Default Traffic Limiting Page (HTML Format)", "index_23": "Default Traffic Limiting Page (JSON Format)", "index_24": "444 Response", "index_25": "Please select a website", "index_26": "Please enter URL", "index_27": "URL cannot be /", "index_28": "URL must start with /", "index_29": "Access limit per second cannot be less than 1", "index_30": "Please enter a time range", "index_31": "Time access limit cannot be less than 30 seconds", "index_32": "Please enter the number of requests", "index_33": "Time access limit count cannot be less than 20 times", "index_34": "Please select at least one restriction condition", "index_35": "Please enter URL", "index_36": "Specified URL", "index_37": "Entire Site", "index_38": "Please select a website", "index_39": "All Websites" }, "API": { "index_1": "Adding traffic limitation, please wait...", "index_2": "Editing traffic limitation, please wait...", "index_3": "Setting status, please wait...", "index_4": "Deleting traffic limitation, please wait..." } }, "Custom": { "index_1": "Add custom interception", "index_2": "Customized Priority: IP Whitelisting > IP Blacklisting > UA Whitelisting > URL Whitelisting > UA Blacklisting > URL Whitelisting > URL Blacklisting > Overseas Banning > Domestic Banning > Regional Blocking > Customized Blocking > IDC Blocking > User-Agent Blocking > CC Blocking", "index_3": "If a custom intercept is prioritized ahead it will execute the preceding", "index_4": "Add custom interception rule", "index_5": "Edit custom interception rule [{0}]", "index_6": "Rule name", "index_7": "Website name", "index_8": "Hits", "index_9": "Rule", "index_10": "Action", "index_11": "Copy rule [{0}]", "index_12": "Is the rule copied and created as a new rule?", "index_13": "Delete rule [{0}]", "index_14": "Are you sure you want to delete this rule?", "index_15": "When website", "index_16": "Apply to website", "index_17": "Rule name", "index_18": "Please enter the rule name", "index_19": "When matching rules", "index_20": "Operation Options", "index_21": "Response page", "index_22": "Please improve the matching rules", "index_23": "Copy domain", "index_24": "No replicable domain names", "index_25": "Please select website", "index_26": "Type", "index_27": "Rule", "index_28": "Match content", "index_29": ", Please press enter to create options", "index_30": "And", "index_31": "Or", "index_32": "Verification method" }, "Map": { "index_1": "Attack map details (map for reference only)", "index_2": "Longitude: {0}", "index_3": "Latitude: {0}", "index_5": "Full-screen", "index_6": "Set location", "index_7": "Zoom in", "index_8": "Zoom out", "index_9": "Attack IP", "index_10": "Local IP", "index_11": "Local IP: {0}", "index_14": "Attack IP: {0}", "index_16": "Longitude", "index_17": "Please enter longitude", "index_18": "Latitude", "index_19": "Please enter latitude", "index_20": "Longitude/Latitude", "index_21": "The location is for reference only!" }, "Report": { "index_1": "Total protection type", "index_2": "Attack IP Leader board", "index_3": "Report", "index_4": "IP Report", "index_5": "URI Report", "index_6": "Search", "index_7": "Attack IP", "index_8": "IP Location", "index_9": "Num of attacks", "index_10": "Attack ratio", "index_11": "Blacklist", "index_12": "Malicious IP [{0}] Attack Details", "index_13": "Attack Time", "index_14": "Protected Website", "index_15": "Today's URI (TOP 5)", "index_16": "Total Attack Count for Current URI: {0}", "index_17": "Total attack", "index_18": "Protection Type", "index_19": "Add to URL Blacklist", "index_20": "Protection Records for Attacked URI [{0}]", "index_21": "Attacked Site", "index_22": "Search Type", "index_23": "Note: If the current interception information is /111.php?uid=1, the URI is /111.php, and the URL is /111.php?uid=1.", "index_24": "View Tutorial", "index_25": "Search Content", "index_26": "Custom Time", "index_27": "Search now", "index_28": "Please enter search content", "index_29": "Please select custom time", "index_30": "All Sites", "index_31": "Time", "index_32": "HTTP Details [{0}]", "index_33": "Do you want to add {index_1} to the URL blacklist?", "index_34": "Protected type" }, "Setting": { "index_1": "CC defense", "index_2": "Access filter", "index_3": "Website vulnerability defense", "index_4": "Sensitive words", "index_5": "Search setting", "index_6": "Inheritance: The global setting will automatically inherit the default value in the site configuration", "index_7": "Priority: IP whitelist > IP blacklist > UA whitelist > UA blacklist > URL keyword interception > URL CC defense > URL whitelist > URL blacklist > Non-browser > User-Agent > CC defense > Cookie > URI filter > URL parameter > ThinkPHP defense > POST > Website custom defense", "index_8": "Global", "index_9": "Switch", "index_10": "All protection will be ineffective when this switch is turned off", "index_11": "Simulated attack", "index_12": "Export", "index_13": "Import", "index_14": "Restore default config", "index_15": "Export Firewall global configuration", "index_16": "Import Firewall global configuration", "index_17": "Restoring site default configuration", "index_18": "All configurations will be cleared and restored to the default configuration, including URL black and white list, IP black and white list...", "index_19": "Only export global configuration (CC configuration, malicious request tolerance configuration, IP black and white list, UA black and white list, URL black and white list, sensitive text replacement, URL keyword blocking), excluding firewall website configuration", "index_20": "GET, POST, URL, UA, Cookie only export response code and switch status, do not include internal rules", "index_21": "It is recommended to use the copy or download button, the key may be missed if copy is selected", "index_22": "This simulated attack is: hackers perform SQL injection to obtain database permissions. It will not affect the normal operation of the business", "index_23": "If your IP is in the IP whitelist, the test will have no effect", "index_24": "If you need to test other websites, you can use [http://your_domain_name?id=etc/passwd] to check", "index_25": "If the interception information is returned, the interception is successful. If it is found that it is not intercepted, it is recommended to update to the latest version", "index_26": "If you have any questions, please go to the forum for feedback!", "index_27": "Simulated attack website list", "index_28": "Protection result", "index_29": "Attack", "index_30": "Protecting", "index_31": "Please paste the encrypted configuration text here", "config_1": "CC defense", "config_2": "Defense against CC attacks, please adjust the specific defense parameters in the site configuration", "config_3": "Request defence", "config_4": "Malicious request blocking threshold.", "config_5": "SQL injection defense", "config_6": "Detect malicious SQL statements and prevent malicious tampering of the database due to SQL injection", "config_7": "XSS Defense", "config_8": "Detect XSS syntax to prevent web pages from being maliciously tampered with, user information leaked, and permissions stolen", "config_9": "Command Execution Interception", "config_10": "Determine and block the execution of potentially dangerous commands through the syntax model, effectively preventing hackers from invading the server through the website", "config_11": "Malicious file upload defense", "config_12": "Detect malicious file uploads, prevent Trojans from being uploaded, and prevent server permissions from being lost", "config_13": "Malicious Download Defense", "config_14": "Detect malicious downloads and prevent backup files, source code, and other critical data from being downloaded", "config_15": "Malicious crawler defense", "config_16": "Detect malicious crawlers and prevent malicious crawlers from accessing the website", "config_17": "Cookie filter", "config_18": "Scanner", "config_19": "Spider pond", "config_20": "Default allowed spiders to crawl", "config_21": "CDN", "config_22": "If the site uses CDN, the client IP can be obtained correctly after turn on, Get the last IP address of the request header as the client IP by default", "config_23": "Get the first IP", "config_24": "When CDN is turned on, start with the first request header or the real IP", "config_25": "Block php exec", "config_26": "Prohibit running PHP scripts at the specified URL", "config_27": "Forbidden URL", "config_28": "Prohibit access to the specified URL", "config_29": "Forbidden extension", "config_30": "Prohibit access to the specified extension", "config_31": "Block File types", "config_32": "File types prohibited from uploading", "config_33": "Protected URL", "config_34": "Encrypt the URL address with custom parameters, parameter errors will be intercepted", "config_35": "URL filter", "config_36": "Set filtering rules for specific URL addresses", "config_37": "Set rule", "config_38": "Static file protection", "config_39": "CC protection by default will not protect: JS, CSS, GiF, JPG, JPEG, PNG, these static files, if it is not brushed image traffic is not recommended to always open.", "config_40": "Malicious IP Sharing Program", "config_41": "Join the Malicious IP Sharing Program to gain access to the \"Fortress Malicious IP Library\"", "config_42": "Synchronize", "config_43": "URL CC defense", "config_44": "URL defense CC rule, priority is higher than URL whitelist", "config_45": "Machine verification whitelist", "config_46": "Add URL CC defense", "config_47": "Modify URL CC defense", "config_48": "Frequency", "config_49": "Cycle", "config_50": "{0} Sec", "config_51": "* URL without parameters", "config_52": "Time(s)", "config_53": "Sec", "config_54": "Set CC defense for a single URL, the recommended minimum range is 60 seconds and 30 times", "config_55": "URL content cannot be empty!", "config_56": "Access time cannot be empty!", "config_57": "Time range cannot be empty!", "config_58": "URL enhancement mode", "config_59": "Setting up a URL validation rule independently", "config_60": "Priority: Enhanced Mode > URL Enhanced Mode > Standard Mode", "config_61": "The current mode enables human verification for a single URL, a measure to protect a certain URL", "config_62": "e.g.: a URL is the registration page www.example.com/register.html, then add the URL as: /register.html Authentication mode arbitrary", "config_63": "Note: If the site exists CDN, it is recommended to set up for the jump verification, other verification may exist by the CDN cache problems", "config_64": "Add URL rule", "config_65": "Parameter value", "config_66": "Matching method", "config_67": "Verification method", "config_68": "Redirect verification", "config_69": "Verification code verification", "config_70": "Machine verification", "config_71": "Slide verification", "config_72": "Regular", "config_73": "Type", "config_74": "The default is an empty parameter. If you need to fill in multiple parameters, fill in one line each", "config_75": "URL matching", "config_76": "Regular matching", "config_77": "Use when you need to not validate certain pages when enabling human authentication", "config_78": "URL address, e.g.: /admin/update", "config_79": "e.g.: /admin/admin.php?system=abc --> Add to: /admin/admin.php", "config_80": "e.g.: /admin/1 --> Add to: /admin/[1-99]", "config_81": "Please enter the URL address", "config_82": "Rule", "config_83": "Access filtering", "config_84": "Non-browser interception", "config_85": "Can defend against crawler attacks and non-browser access. Currently, it will be applied to all websites. If the website has CDN enabled, it is recommended not to enable it (there is a cache false alarm)", "config_86": "HTTP request filtering", "config_87": "HTTP request type filtering/request header filtering/semantic analysis switch", "config_88": "Request type filtering", "config_89": "Request header filtering", "config_90": "Request quantity filtering", "config_91": "By default, all request types are allowed. If you need to close a request type, close the button for this type", "config_92": "For example: only GET and POST are allowed to access, then all types except GET and POST are closed", "config_93": "Request type", "config_94": "Please enter the header name", "config_95": "Length", "config_96": "The current request filter is length filter restriction", "config_97": "For example: if the host value is less than 500, it will pass. If it is greater than 500, it will be intercepted", "config_98": "Request type cannot be empty", "config_99": "Length cannot be empty", "config_100": "Parse base64 encrypted string", "config_101": "Content is the longest", "config_102": "Post maximum parameter", "config_103": "Pieces", "config_104": "Get maximum parameter", "config_105": "Save settings", "config_106": "URL request type interception", "config_107": "Set URL interception request type separately", "config_108": "Intercept: Specify that the current URL does not allow certain request types", "config_109": "Only release: Specify that the current URL only allows certain request types", "config_110": "Only release", "config_111": "Intercept", "config_112": "Choose at least one request type!", "config_113": "By default, all major search engine spiders are allowed to crawl", "config_114": "API interface defense", "config_115": "When some interfaces are in the whitelist, one of them needs to be used under CC defense", "config_116": "For example: ^/api/getInfo$", "config_117": "API defense means that some APIs need to be CC-defended when they are in the whitelist", "config_118": "API examples are as follows: ^/api/getUserInfo$", "config_119": "Must start with ^ and end with $", "config_120": "Website vulnerability defense", "config_121": "Note: If the content published on your website contains SQL statements (such as database-related tutorial articles), enabling this defense may cause the publication of related content to be blocked", "config_122": "Response content", "config_123": "Note: If the content published on your website contains tutorials on malicious use of javascript, enabling this defense may result in the publication of related content being blocked", "config_124": "Weak password defense", "config_125": "Real-time detection of weak password login and interception", "config_126": "Sensitive information detection", "config_127": "Intercept sensitive information in error messages, including SQL errors, PHP errors, etc.", "config_128": "Note: If you upload a file with the keyword php in the file name, enabling this defense may result in the IP being blocked", "config_129": "Name", "config_130": "Description", "config_131": "Status settings", "config_132": "Please confirm whether to turn off the From-data protocol switch?", "config_133": "From-data protocol", "config_134": "From-data is the default format for file uploads, and the firewall only trusts the default format. If your website changes the upload format, you need to turn off this function. After turning it off, the upload package format will not be checked. ", "config_135": "Note: If you need to download backup files from a website, and if the compressed file contains the website name, enabling this defense may cause the download file to be intercepted. You can download it through the panel", "config_136": "Custom rule interception", "config_137": "Detect php code execution, detect directory detection, detect SSRF detection, and custom detection", "config_138": "Note: The current rules can be edited, and the default is that both GET/POST request methods will take effect. ", "config_139": "Note: If your website needs to be included in the search engine, be sure not to add the search engine features", "config_140": "Malicious Cookie Defense", "config_141": "Detect whether the cookie contains malicious code, SQL injection, XSS attack", "config_142": "Malicious Scanner Defense", "config_143": "Detect malicious scanners, prevent all kinds of scanners, Trojan connection tools, and access to the website", "config_144": "Note: If your website is doing security testing, it may be blocked", "config_145": "Directory Scan Defense", "config_146": "Prevent directory/file scanning, and perform statistical interception through the 404 status code of the access. ", "config_147": "Note: If your webpage has many 404 images, it may cause access to be blocked", "config_148": "Switch", "config_149": "Access time", "config_150": "Number of attacks", "config_151": "The current scanner switch is only valid for the current defense scanning directory/file settings. ", "config_152": "This interception is to defend against 404 links generated by accessing url", "config_153": "The minimum cannot be less than 20 times in 20 seconds. ", "config_154": "Access time cannot be empty", "config_155": "Number of attacks cannot be empty", "config_156": "Trojan detection", "config_157": "Webshell inspection is performed through real-time access files. The results are on the isolation box page. It is recommended not to turn off this function. ", "config_158": "Note: If your normal files are pulled into the isolation box, please add white in the isolation box. ", "config_159": "Logging", "config_160": "The default firewall only records HTTP intercepted data packets within 1M. If you need to record larger data packets, turn on this function. ", "config_161": "Sensitive words", "config_162": "Sensitive text replacement", "config_163": "Replace the set sensitive text. If the Baota website acceleration is installed, this function will be invalid. ", "config_164": "Sensitive text", "config_165": "Replace text", "config_166": "Sensitive text replacement, for example: sensitive text Hello replaced with Hello", "config_167": "Please do not fill it in randomly, it may cause the entire site to be blank", "config_168": "After adding here, it will be applied to all websites", "config_169": "If the setting conflicts with the website's individual settings, the website settings will be used first", "config_170": "Please enter sensitive text or replacement text", "config_171": "URL keyword interception", "config_172": "Intercept keywords from URL", "config_173": "For example: find.zip", "config_174": "URL interception in the initialization phase", "config_175": "URL keyword interception addition, for example: /aa/bb/?a=hello needs to intercept a=hello, you can add a=hello, =hello, hello", "config_176": "Keywords cannot be empty", "config_177": "Import URL keyword interception", "config_178": "One in a row, e.g. \nhello\nworld One in a row, e.g. \nhello\nworld", "config_179": "Import data cannot be empty", "config_180": "Clear list", "config_181": "Whether to clear the list data?", "config_182": "Banned words", "config_183": "Banned banned words or phrases in text", "config_184": "Illegal word", "config_185": "Please do not fill in randomly, all prohibited words are suggested to be a complete word", "config_186": "Detect whether the client's submission contains prohibited words, and if so, ban it", "config_187": "Import Illegal words", "config_188": "Import format: One per line, if entered on the same line, it is regarded as one", "config_189": "Rule content, please use regular expression", "config_190": "Description", "config_191": "Note: If you do not understand regular expressions, please do not modify the content of the rules at will", "config_192": "You can add or modify the content of the rule, but please use regular expressions", "config_193": "The built-in rules allow modification, but cannot be deleted directly. You can set the rule status to define whether the firewall uses this rule", "config_194": "The rules cannot be empty", "config_195": "Delete Rule [{0}]", "config_196": "Do you really want to delete this filter rule?", "config_197": "Status [{0}]", "config_198": "200 Normal access", "config_199": "404 File not exist", "config_200": "403 Access denied", "config_201": "444 Close connection", "config_202": "500 Application error", "config_203": "502 Connection timed out", "config_204": "503 Server is unavailable", "config_205": "Online Edit [{0}]", "config_206": "Edit rule [{0}]", "config_207": "Filter out penetration attacks using cookies", "config_208": "Filter penetration testing for common scan testing tools" }, "Install": { "index_1": "Tip: This page can be turned off in the panel settings", "index_2": "Nginx WAF function introduction", "index_3": "Only supports Nginx", "index_4": "Defend against CC attacks", "index_5": "Keyword blocking", "index_6": "Block malicious scans", "index_7": "Stop hackers", "index_8": "Install now", "index_9": "Buy now" }, "Api": { "overview_1": "One-click activation in progress, please wait...", "overview_2": "Setting, please wait...", "site_2": "Setting global configuration switch, please wait...", "site_3": "Setting site status, please wait...", "site_4": "Detecting CAPTCHA environment, please wait...", "site_5": "Setting attack count interception, please wait...", "site_6": "Adding website rules, please wait...", "site_7": "Deleting website rules, please wait...", "site_8": "Setting website rule status, please wait...", "site_9": "Saving scanner rules, please wait...", "site_10": "Setting spider pool status, please wait...", "site_11": "Adding website CDN-Header, please wait...", "site_12": "Deleting website CDN-Header, please wait...", "site_13": "Fetching site log list, please wait...", "block_14": "Adding IP to blacklist, please wait...", "block_15": "Adding URL to whitelist, please wait...", "block_16": "Cleaning logs, please wait...", "block_17": "Unblocking IP, please wait...", "block_18": "Unblocking all IPs, please wait...", "block_19": "Clearing rule hit records, please wait...", "block_20": "Configuring record types, please wait...", "rules_21": "Importing, please wait...", "rules_22": "Exporting data, please wait...", "rules_23": "Clearing data, please wait...", "rules_24": "Adding IP to whitelist, please wait...", "rules_25": "Adding IP to blacklist, please wait...", "rules_26": "Deleting IP {0}, please wait...", "rules_27": "Adding UA to whitelist, please wait...", "rules_28": "Adding UA to blacklist, please wait...", "rules_29": "Deleting UA {0}, please wait...", "rules_30": "Adding URL to blacklist, please wait...", "rules_31": "Deleting URL {0}, please wait...", "rules_32": "whitelist", "rules_33": "blacklist", "area_32": "Adding area restriction, please wait...", "area_33": "Deleting area restriction, please wait...", "area_34": "Setting area status, please wait...", "custom_35": "Setting rule status, please wait...", "custom_36": "Adding custom rule, please wait...", "custom_37": "Editing custom rule, please wait...", "custom_38": "Deleting custom rule, please wait...", "map_39": "Setting latitude and longitude, please wait...", "report_1": "Fetching attack IP information, please wait...", "setting_40": "Setting firewall status, please wait...", "setting_41": "Restoring default configuration, please wait...", "setting_42": "Fetching global configuration, please wait...", "setting_43": "Importing firewall configuration, please wait...", "setting_44": "Setting global configuration switch, please wait...", "setting_45": "Setting response code, please wait...", "setting_46": "Synchronizing, please wait...", "setting_47": "Adding single URL CC defense, please wait...", "setting_48": "Editing single URL CC defense, please wait...", "setting_49": "Deleting single URL CC defense, please wait...", "setting_50": "Adding URL enhancement mode, please wait...", "setting_51": "Deleting URL enhancement mode, please wait...", "setting_52": "Adding URL request type interception, please wait...", "setting_53": "Deleting URL request type interception, please wait...", "setting_54": "Adding request type, please wait...", "setting_55": "Adding Header filter, please wait...", "setting_56": "Modifying Header filter, please wait...", "setting_57": "Deleting Header filter, please wait...", "setting_58": "Setting HTTP request data, please wait...", "setting_59": "Adding API defense, please wait...", "setting_60": "Deleting API defense, please wait...", "setting_61": "Updating spider pool from the cloud, please wait...", "setting_62": "Adding rule, please wait...", "setting_63": "Saving rule, please wait...", "setting_64": "Setting rule status, please wait...", "setting_65": "Deleting rule, please wait...", "setting_66": "Setting directory scan defense, please wait...", "setting_67": "Adding URL to whitelist, please wait...", "setting_68": "Deleting URL from whitelist, please wait...", "setting_69": "Adding sensitive text replacement, please wait...", "setting_70": "Deleting sensitive text list, please wait...", "setting_71": "Adding URL keywords, please wait...", "setting_72": "Importing URL keywords, please wait...", "setting_73": "Deleting URL keywords, please wait...", "setting_74": "Clearing list, please wait...", "setting_75": "Adding prohibited words, please wait...", "setting_76": "Importing prohibited words, please wait...", "setting_77": "Deleting prohibited words, please wait...", "setting_78": "Clearing prohibited words, please wait..." } } }