- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- Blocking traffic based on HTTP Request Header
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Blocking traffic based on HTTP Request Header
We are trying to block access to specific URLs except cases where the request includes some specific HTTP Request header.
Example a: Allow the request if User-Agent includes *ABC*
Example b: Allow the request if Content-Type includes *application/json*
Example c: Allow the request if Some-Custom-Header equals 123123
How this can be achieved?
- Labels:
-
Anti-Virus
-
Application
-
Threat Emulation
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks @PhoneBoy . This looks like the right solution.
Did you manage to actually make it work?
When trying to export the custom signature - the tool crashes, and I get the error message:
An error has occurred and ACST was not able to complete the operation.
Any idea how to fix this?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This would need to be addressed via TAC: https://help.checkpoint.com.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi I have succeed without any error on the ACST app side.
I tryed the cnn sports from the support sk and change it to my specific header and when I import the xml to the smart console I get failed. can you help with the header itself?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Again, please consult with the TAC.