Configuring or modifying a signatures object 编辑

You configure a signatures object after creating it, or modify an existing signatures object, to enable or disable signature categories or specific signatures, and configure how the Web App Firewall responds when a signature matches a connection.

To configure or modify a signatures object

  1. Navigate to Security > Citrix Web App Firewall > Signatures.

  2. In the details pane, select the signatures object that you want to configure, and then click Open.

  3. In the Modify Signatures Object dialog box, set the Display Filter Criteria options at the left to display the filter items that you want to configure.

    As you modify these options, the results that you requested are displayed in the Filtered Results window at the right.

    • To display only selected categories of signatures, check or clear the appropriate signature-category check boxes. The signature categories are:
    NameType of Attack that this Signature Protects Against
    cgiCGI scripts. Includes Perl and UNIX shell scripts.
    clientBrowsers and other clients.
    coldfusionwebsites that use the Adobe Systems ColdFusion application server.
    frontpagewebsites that use Microsoft’s FrontPage server.
    iiswebsites that use the Microsoft Internet Information Server (IIS).
    miscMiscellaneous attacks.
    phpwebsites that use PHP
    web-activexwebsites that contain ActiveX controls.
    web-strutswebsites that contain Apache struts, which are java-ee based applets.
    • To display only signatures that have specific check actions enabled, select the ON check box for each of those actions, clear the ON check boxes for the other actions, and clear all of the OFF check boxes. To display only signatures that have a specific check action disabled, select their respective OFF check boxes and clear all of the ON check boxes. To display signatures regardless of whether they have a check action enabled or disabled, select or clear both the ON and the OFF check boxes for that action. The check actions are:
    CriterionDescription
    EnabledThe signature is enabled. The Web App Firewall checks only for signatures that are enabled when it processes traffic.
    BlockConnections that match this signature are blocked.
    LogA log entry is produced for any connection that matches this signature.
    StatsThe Web App Firewall includes any connection that matches this signature in the statistics that it generates for that check.
    • To display only signatures that contain a specific string, type the string into the text box under the filter criteria, and then click Search.
    • To reset all display filter criteria to the default settings and display all signatures, click Show All.
  4. For information about a specific signature, select the signature, and then click the blue double arrow in the More field. The Signature Rule Vulnerability Detail message box appears. It contains information about the purpose of the signature and provides links to external web-based information about the vulnerability or vulnerabilities that this signature addresses. To access an external link, click the blue double arrow to the left of the description of that link.

  5. Configure the settings for a signature by selecting the appropriate check boxes.

  6. If you want to add a local signature rule to the signatures object, or modify an existing local signature rule, see The Signatures Editor.

  7. If you have no need for SQL injection, cross-site scripting, or Xpath injection patterns, click OK, and then click Close. Otherwise, in the lower left-hand corner of the details pane, click Manage SQL/cross-site scripting Patterns.

  8. In the Manage SQL/cross-site scripting Patterns dialog box, Filtered Results window, navigate to the pattern category and pattern that you want to configure. For information about the SQL injection patterns, see HTML SQL Injection Check. For information about the cross-site scripting patterns, see HTML Cross-Site Scripting Check.

  9. To add a new pattern:

    1. Select the branch to which you want to add the new pattern.
    2. Click the Add button directly below the lower section of the Filtered Results window.
    3. In the Create Signature Item dialog box, fill in the Element text box with the pattern that you want to add. If you are adding a transformation pattern to the transform rules branch, under Elements, fill in the From text box with the pattern that you want to change and the To text box with the pattern to which you want to change the previous pattern.
    4. Click OK.
  10. To modify an existing pattern:

    1. In the Filtered Results window, select the branch that contains the pattern that you want to modify.
    2. In the detail window beneath the Filtered Results window, select the pattern that you want to modify.
    3. Click Modify.
    4. In the Modify Signature Item dialog box, Element text box, modify the pattern. If you are modifying a transformation pattern, you can modify either or both patterns under Elements, in the From and the To text boxes.
    5. Click OK.
  11. To remove a pattern, select the pattern that you want to remove, then click the Remove button below the details pane beneath the Filtered Results window. When prompted, confirm your choice by clicking Close.

  12. To add the patterns category to the cross-site scripting branch:

    1. Select the branch to which you want to add the patterns category.
    2. Click the Add button directly below the Filtered Results window.

      Note: Currently you can add only one category, named patterns, to the cross-site scripting branch, so after you click Add,you must accept the default choice, which is patterns.

    3. Click OK.
  13. To remove a branch, select that branch, and then click the Remove button directly below the Filtered Results window. When prompted, confirm your choice by clicking OK.

    Note: If you remove a default branch, you remove all of the patterns in that branch. Doing so can disable the security checks that use that information.

  14. When you are finished modifying the SQL injection, cross-site scripting, and XPath injection patterns, click OK, and then click Close to return to the Modify Signatures Object dialog box.

  15. Click OK at any point to save your changes, and when you are finished configuring the signatures object, click Close.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:78 次

字数:9141

最后编辑:7年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文