list:
name=Name
head_len=Header Length
content_len=Content Length
body_len=Body Length
parameter_len=Total URL and Body Parameters Length
head_line_len=Header Line Length
Copy=Clone

dlg:
edit=Edit HTTP Protocol Constraints
new=New HTTP Protocol Constraints
name=Name
head_len=Header Length
content_len=Content Length
body_len=Body Length
parameter_len=Total URL and Body Parameters Length
http_version_check=Illegal HTTP Version
cookie_in_req=Number of Cookies in Request
url_param=Number of URL Parameters
host_name_check=Illegal Host Name
number_of_range=Number of Ranges in Range Header
alert=Alert
alert_deny=Alert & Deny
period_block=Period Block
block_period=Block Period
block_period_unit=(1~3600)(Seconds)
period_val_lim=is an invalid value.\nPeriod must be in 1~3600.
action=Action
severity=Severity
triggerAction=Trigger Action
severity_high=High
severity_medium=Medium
severity_low=Low
select=Please Select...
length=Length
expt_name=Exceptions Name
block_malformed_request=Malformed Request
or_head=The Header Length must be in 0~
or_head1=.
or_content=The Content Length must be in 0~67108864.
or_body=The Body Length must be in 0~67108864.
or_param=The Total URL & Body Parameters Length must be in 0~
or_param1=.
or_head_line=The Header Line Length must be in 0~
or_head_line1=.
or_http_req=The HTTP Request Length must be in 0~67108864.
or_url_param_len=The Total URL Parameters Length must be in 0~
or_url_param_len1=.
or_cookie=The Number of Cookies in Request must be in 0~32.
or_head_line_request=The Number of Header Lines in Request must be in 0~32.
or_url_param=The Number of URL Parameters must be in 0~64.
or_number_of_range=The Number of Ranges in Range Header must be in 0~64.
back_setting=Back To Scanner Integration
status=Status
http_header=HTTP Header
http_request=HTTP Request
http_parameter=HTTP Parameter
content_length=Content Length
head_name_len=Header Name Length
head_value_len=Header Value Length
illegal_head_name=Illegal Character in Header Name
illegal_head_value=Illegal Character in Header Value
illegal_http_request_method=Illegal HTTP Request Method
http_request_length=HTTP Request Length
header_line_request=Number of Header Lines in Request
post_req_ctype=Missing Content Type
max_bparam_len=Total Body Parameters Length
url_parameter_length=Total URL Parameters Length
url_parameter=Number of URL Parameters
illegal_content_length=Illegal Content Length
illegal_content_type=Illegal Content Type
illegal_res_code=Illegal Response Code
param_name=NULL Character in Parameter Name
param_value=NULL Character in Parameter Value
http_req_filename_len=HTTP Request Filename Length
web_socket=WebSocket Protocol
protocol_support=HTTP Protocol Support
connection_preface=Illegal Connection Preface
frame_type=Illegal Frame Type
frame_flags=Illegal Frame Flags
http2_frame=HTTP/2 Frame
header_table_size=Header Compression Table Size
concurrent_streams=Number of Concurrent Streams
window_size=Initial Window Size
frame_size=Frame Size
header_list_size=Header List Size
illegal_chunk=Illegal Chunk Size
redundant_header=Redundant HTTP Headers
null_url_check=NULL Character in URL
illegal_url_check=Illegal Character in URL
odd_even_space_attack_check=Odd and Even Space Attack
malformed_url_check=Malformed URL
max_param_name=Maximum URL Parameter Name Length
max_param_value=Maximum URL Parameter Value Length
urlparam_name_check=Illegal Character in Parameter Name
urlparam_value_check=Illegal Character in Parameter Value
threat_weight=Threat Weight
duplicate_param_name=Duplicate Parameter Name
internal_resource_limits=Internal Resource Limits
rpc_protocol=RPC Protocol

tips_1=Maximum acceptable size in bytes of all HTTP header lines (8192 bytes by default).
tips_2=Maximum acceptable size in bytes of a single HTTP header name (50 bytes by default).For example, Host, Content-Type, User-Agent
tips_3=Maximum acceptable size in bytes of a single HTTP header value (4096 bytes by default).For example, Host, Content-Type, User-Agent
tips_4=Checks for illegal characters in the HTTP header name.For example, Host, Content-Type, User-Agent
tips_5=Checks for illegal characters in the HTTP header value.For example, Host, Content-Type, User-Agent
tips_6=Checks for invalid HTTP request methods according to RFC 2616 or RFC 4918. Any method undefined in these RFCs — including misspellings like GETT as well as other HTTP extension methods (e.g. CalDAV) like MKCALENDAR — are considered illegal.
tips_7=Maximum acceptable length of the entire HTTP request, including both headers and body (2048 KB by default).
tips_8=Maximum acceptable number of lines in the HTTP header (64 by default).
tips_9=Checks that the content-type header is available.
tips_10=Maximum acceptable length in bytes of all parameters, including their names and values, in the URL (8192 bytes by default).
tips_11=Maximum total acceptable size in bytes of all parameters in the URL and/or, for HTTP POST requests, the HTTP body (8192 bytes by default).
tips_12=Maximum number of parameters in a URL (128 by default).
tips_13=Checks for NULL characters in parameter names.
tips_14=Checks for NULL characters in parameter values.
tips_15=Maximum acceptable length in bytes of the request body (16,384 by default). 
tips_16=Checks that the Content-Length header includes numeric characters only.
tips_17=Content type must be in the format of type/subtype.
tips_18=HTTP response code must be a 3 digit number.
tips_19=Checks for illegal characters in the Host: line of the HTTP header, such as null characters or encoded characters.For example, characters such as 0x0 or %2500* will be considered illegal.
tips_20=Checks for invalid HTTP version numbers. Currently, the only valid version strings are HTTP/0.9, HTTP/1.0 or HTTP/1.1.
tips_21=The length of HTTP body must not exceed the maximum defined length (16384KB by default).
tips_22=Maximum acceptable number of cookies in an HTTP request (128 by default).
tips_23=Maximum acceptable number of Range: lines in each HTTP header. The default value is 5.
tips_24=Request exceeds the maximum buffer size allowed by FortiWeb's HTTP parser or a specific malformed packet that causes the parser to work incorrectly.
tips_25=Maximum acceptable length of HTTP request filename (2048 bytes by default).
tips_26=Checks for WebSocket traffic.
tips_27=The client connection preface must start with the string "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n".
tips_28=Checks for invalid HTTP/2 frame types according to RFC7540. Only defined frame types are allowed.
tips_29=Checks for invalid HTTP/2 frame flags according to RFC7540. Only defined frame flags are allowed.
tips_30=Maximum acceptable header compression table size in request SETTINGS frame(65535 bytes by default).
tips_31=Maximum acceptable concurrent streams in request SETTINGS frame(1000 by default).
tips_32=Maximum acceptable initial window size in request SETTINGS frame(6291456 bytes by default).
tips_33=Maximum acceptable frame payload size in request SETTINGS frame(16384 bytes by default).
tips_34=Maximum acceptable header list size in request SETTINGS frame(65536 bytes by default).
tips_35=Checks for illegal characters in the Chunk size field. Only numeric values are allowed.
tips_36=Invoked if an HTTP request contains multiple redundant headers.
tips_37=Checks for NULL characters in URLs.
tips_38=Checks for illegal characters in URLs.
tips_39=Checks that the URL in a request begins with a '/' character, includes a protocol and host prefix (e.g. http://myserver.com/default.asp).
tips_40=Maximum acceptable length in bytes of a single URL parameter name (4096 bytes by default).
tips_41=Maximum acceptable length in bytes of a single URL parameter value (4096 bytes by default). 
tips_42=Checks for illegal characters in the parameter name. For example, non-printable ASCII characters.
tips_43=Checks for illegal characters in the parameter value. For example, non-printable ASCII characters.
tips_44=Checks for duplicated parameter name.
tips_45=Checks for odd and even space attack.
tips_46=Checks for RPC Over HTTP traffic.
