- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
 nikoolayy1
		
			nikoolayy1
		
		
		
		
		
		
			I have made this article to show how to rate limit the file upload HTTP requests on the file upload URL for a source IP address.
The first condition matches the URL path for file uploads, with a qualifier for the POST method, which is typically used for file uploads.
The second condition matches the "Content-Type" header value, which is usually "multipart/form-data" for file uploads.
Optional: To limit only successful file uploads, you can add an extra condition that checks the HTTP response code. I found it easier using "http-rsp-reason" with matching "OK" which is returned after the 200 response. This signature is in direction of server to client as it is in the response and you just add it to the combination signature. You can try adding this under the file upload signature with direction set to "both" but I saw some issues doing that (During testing, it was observed that the "time" option appears to evaluate each individual signature within the combination signature separately. For example, to achieve a rate limit of 5 requests per minute, a rate of 15 might be required).
I hope this guide helps you implement effective rate-limiting policies for file uploads on your network.
| 
        
            by 
				
		
		
			kiwi
		
		
		
		
		
		
		
		
	
			 on 
    
	
		
		
		08-18-2022
	
		
		08:46 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
        
        
            
            
        
        
     
	Labels:
	 
 
        
            0 Comments
        
        
        
            2174
            
                Views
            
        
     | 
    
            
        0 Comments
    
        
    
 | 
    2174
    Views
 | 
 crasmussen
		
		
		
		
		
		
		
		
	
			
		
					on:
					Rate-Limiting File Uploads with Palo Alto Networks Custom Signatures.
		
			crasmussen
		
		
		
		
		
		
		
		
	
			
		
					on:
					Rate-Limiting File Uploads with Palo Alto Networks Custom Signatures.	
				 crasmussen
		
		
		
		
		
		
		
		
	
			
		
					on:
					Palo Alto Networks 7-byte Custom Signature Minimum Removed in Newer Versions and Why it Matters!
		
			crasmussen
		
		
		
		
		
		
		
		
	
			
		
					on:
					Palo Alto Networks 7-byte Custom Signature Minimum Removed in Newer Versions and Why it Matters!	
				 crasmussen
		
		
		
		
		
		
		
		
	
			
		
					on:
					Palo Alto Networks NAT Session Distribution as a Way to Implement Server Load Balancing
		
			crasmussen
		
		
		
		
		
		
		
		
	
			
		
					on:
					Palo Alto Networks NAT Session Distribution as a Way to Implement Server Load Balancing	
				 TomYoung
		
		
		
		
		
		
		
		
	
			
		
					on:
					Nominated Discussion: Move Firewall to New Panorama
		
			TomYoung
		
		
		
		
		
		
		
		
	
			
		
					on:
					Nominated Discussion: Move Firewall to New Panorama	
				 
					
				
				
			
		
 
					
				
				
			
		
 
					
				
				
			
		
 
					
				
				
			
		


