- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
06-17-2013 01:16 PM
Hi all,
I'm new to PAN OS and working on a project to migrate from a Cisco ASA to a PA 5020.
With the migration I need to bring over a policy that drops http traffic with a user-agent header matching on a regx.
I've created a custom vulnerability (see attached), but don't really have a way to test it out.
Is a custom Vulnerability the best approach to this type of layer 7 filtering, or is a custom application the better way to go? Other recommendations?
Also, does my pattern match look correct in the attached?
Thank you.
06-17-2013 01:57 PM
Hi,
I think custom application will be better.
Also check this for information
06-17-2013 01:57 PM
Hi,
I think custom application will be better.
Also check this for information
06-17-2013 02:10 PM
Why can't you test it? Couldn't you use Firefox with User Agent Switcher and a custom user agent to "pretend" to have the user agent you're trying to block?
06-18-2013 05:46 AM
Thanks for the tip, egearhart. I'll research using Firefox to do that. I am also looking into what I can do with "wget" for testing
06-18-2013 07:18 AM
OK, no problem, glad I could help!
06-19-2013 12:29 PM
Created a custom application and it appears to be working for me.
Thanks for the tip.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!