
420
Enabling remote access with clientless VPN
Using rules to allow or deny clientless VPN access
Building regular expressions for advanced rules
This section provides examples to demonstrate the power and versatility of using regular expressions.
Generally, intricacies arise when formulating the path element, and therefore,
shows
variations of the path element. Other elements, such as host name, can be formulated using similar
methods. Not all possible or incorrect matches are included.
Table 11-3
Path element variations
Path
Description
Examples with possible
path match
Examples with no match
“ ”
(blank space) matches any
possible path.
“ ”
a
dir
salesNW/projects.rtf
^
$
Matches an empty string only.
“ ”
dir, a, /subdir/status.doc
dir
Matches any path with the
string dir in it.
dir
directory
abc/subdirectory/subsub
dir/file.txt
a, /subdi, sub/text.pdf
^
dir
Matches any path that begins
with dir.
dir
directory
dir/file.txt
/dir, subdir/dir
dir$
Matches paths ending with dir
only.
dir
subdir
abc/subdir
directory, /dirt
^
dir$
Matches dir only.
dir
directory, /dirt
^
.$
Matches any single character
string.
a
/
X
xyz, /s, sales/status.doc
^
\$$
Matches $ only.
$
$$, $$$, $/Symantec.pdf
^
.*$
Matches any possible path.
a
/dir
/dir/file.txt
^
a*$
Matches any path that is filled
with any number of the
character a.
a
aa
aaaaaaaaaaa
/aaaa, abc, /sales, doc
^
\.*$
Matches a string filled with
any number of “.”
.
........
a, aa
^
/dir/subdir*$
Matches a string beginning
with /dir/subdi followed by any
number of the character r.
/dir/subdi
/dir/subdirrrrrr
/dir/subdirrrrrrrrrrrrrrrr
dir/subdi, dir/subdir
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...