Layer7 Filtering - Bad Bots

cancel
Showing results for 
Search instead for 
Did you mean: 

Layer7 Filtering - Bad Bots

L2 Linker

Hi all,

I'm new to PAN OS and working on a project to migrate from a Cisco ASA to a PA 5020.

With the migration I need to bring over a policy that drops http traffic with a user-agent header matching on a regx.

I've created a custom vulnerability (see attached), but don't really have a way to test it out.

Is a custom Vulnerability the best approach to this type of layer 7 filtering, or is a custom application the better way to go? Other recommendations?

Also, does my pattern match look correct in the attached?

Thank you.

1 ACCEPTED SOLUTION

Accepted Solutions

L6 Presenter

Hi,

I think custom application will be better.

Also check this for information

https://live.paloaltonetworks.com/message/25949#25949

View solution in original post

5 REPLIES 5

L6 Presenter

Hi,

I think custom application will be better.

Also check this for information

https://live.paloaltonetworks.com/message/25949#25949

View solution in original post

L4 Transporter

Why can't you test it? Couldn't you use Firefox with User Agent Switcher and a custom user agent to "pretend" to have the user agent you're trying to block?

Thanks for the tip, egearhart. I'll research using Firefox to do that. I am also looking into what I can do with "wget" for testing

OK, no problem, glad I could help!

Created a custom application and it appears to be working for me.

Thanks for the tip.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!