Difference between revisions of "Auto Actions"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
− | |||
− | |||
− | |||
[[Category:Troubleshooting]] | [[Category:Troubleshooting]] | ||
''This page is about the menu SETTINGS -> GUEST MANAGEMENT -> AUTO ACTIONS'' | ''This page is about the menu SETTINGS -> GUEST MANAGEMENT -> AUTO ACTIONS'' | ||
− | + | This page explains what to do when you see "You don't have permission to access control2.php on this server' | |
− | + | This error message shows when something in your content triggering the firewall. | |
− | + | Try adding the content bit by bit until you find the item causing the problem. | |
− | |||
− | |||
− | |||
− | |||
− | + | Often it is a script or HTML item that appears to the firewall as a possible hacking attack.It can also be something that looks innocent like a combination of numbers and words like "and" or "or" that hackers often use in sql injection attacks. | |
− | + | Once you find the item causing the problem, try rewording it. You can nly use valid HTML. Scripts or meta tags can not be used. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 13:44, 30 April 2016
This page is about the menu SETTINGS -> GUEST MANAGEMENT -> AUTO ACTIONS
This page explains what to do when you see "You don't have permission to access control2.php on this server'
This error message shows when something in your content triggering the firewall.
Try adding the content bit by bit until you find the item causing the problem.
Often it is a script or HTML item that appears to the firewall as a possible hacking attack.It can also be something that looks innocent like a combination of numbers and words like "and" or "or" that hackers often use in sql injection attacks.
Once you find the item causing the problem, try rewording it. You can nly use valid HTML. Scripts or meta tags can not be used.