Web Application Firewall Configuration | 271
The action for the rule chain would be set to
Prevent
.
Figure 44
shows the rule chain for this
example.
Figure 44
Example Rule Chain – Blocking Bad Logins
Example – Positive Security Model: Blocking a Form Submission with Unwanted Parameters
This rule chain blocks a form submission if the form has a request parameter other than
formId
or if the value of
formId
contains more than 4 digits. To accomplish this, you would need two
rule chains:
1.
The first rule chain contains two rules:
–
The first rule identifies the URL where the form is submitted.
–
The second rule checks if
Parameter Names
does not match the name of the valid
parameter,
formId
. It uses the
Equals String
operator with the
Not
inversion check box
selected.
2.
The second rule chain contains two rules:
–
The first rule identifies the URL where the form is submitted.
Summary of Contents for PowerEdge 4200 Series
Page 1: ... 1 SRA 6 0 Administrator s Guide ...
Page 10: ...10 SRA 6 0 Administrator s Guide ...
Page 128: ...128 SRA 6 0 Administrator s Guide ...
Page 176: ...176 SRA 6 0 Administrator s Guide ...
Page 190: ...190 SRA 6 0 Administrator s Guide ...
Page 212: ...212 SRA 6 0 Administrator s Guide ...
Page 228: ...228 SRA 6 0 Administrator s Guide ...
Page 342: ...342 SRA 6 0 Administrator s Guide ...
Page 356: ...356 SRA 6 0 Administrator s Guide ...
Page 358: ...358 SRA 6 0 Administrator s Guide ...
Page 392: ...392 SRA 6 0 Administrator s Guide ...
Page 416: ...416 SRA 6 0 Administrator s Guide ...
Page 426: ...426 SRA 6 0 Administrator s Guide ...
Page 436: ...436 SRA 6 0 Administrator s Guide ...
Page 438: ...438 SRA 6 0 Administrator s Guide ...
Page 439: ... 439 ...
Page 440: ......