Adding an access rule

To add an access rule:

  1. In the application web interface window, select one of the following sections:
    • For actions with rules of an individual workspace, in the section used for switching between workspaces, select the name of this workspace.
    • For actions with rules applied in all workspaces, select Global in the section used for switching between workspaces.

    Applicable only if you have access rights to multiple workspaces.

  2. Select the Rules section.
  3. Select the Access tab.

    The access rules table opens.

  4. Do one of the following:
    • If you want to add a rule to a group of rules, select the relevant group and click the Add rule button.in the opened window.
    • If you want to add a rule outside of a group, click the Add rule button in the upper part of the window.

    The window for adding a rule opens.

  5. Select the General settings tab.
  6. Select one of the following options in the Action drop-down list:
    • Block if you want to block access to web resources.
    • Allow if you want to allow access to web resources.
    • Next group if you want to skip scans for rules of this group.

      The application will perform a scan according to the rules that are positioned after this group in the table.

    • Redirect to add a rule to redirect the user to a specified URL.

    The default setting is Block.

    If the HTTP method CONNECT is used in the web resource request and the Block or Redirect action is defined in the rule, the connection will be terminated. The user will not be redirected to the web resource defined in the rule, and the block page will not be shown. This is applicable to all requests that use the HTTP method CONNECT, regardless of whether this method is specified in the traffic filtering criteria.

  7. If you selected the Block option and you want to use a block page different from the default page when there is an attempt to open a forbidden resource:
    1. Select the Specify text to display on the block page check box.
    2. Type the message text.
  8. If you want to add a macro to the message text, select one of the supported macros from the Insert macro drop-down list. If you selected the Allow option and want to remove the Range HTTP header, select the Delete Range HTTP header check box.

    IF the check box is selected, all objects are loaded completely for subsequent scanning using protection rules. Partial loading of objects is not possible in this mode.

  9. If you selected the Redirect option, in the Redirect URL box, enter the URL to which the original request must be redirected.
  10. In the Rule name box, type the name of the access rule.

    The name must be unique within the workspace if you are creating a workspace rule, or unique among the rules in the Global section if you are creating a rule outside of workspaces.

  11. If necessary, type a comment in the Comment field.
  12. If you want to apply a rule immediately after adding it, set the Status toggle switch to Enabled.
  13. Click Add.

The access rule is added.

See also

Using traffic processing rules

Scenario for configuring access to web resources

Adding a bypass rule

Adding a protection rule

Configuring a rule triggering initiator

Configuring traffic filtering

Adding an exclusion for a traffic processing rule

Configuring the schedule of a traffic processing rule

Modifying a traffic processing rule

Deleting a traffic processing rule

Creating a copy of a traffic processing rule

Enabling and disabling a traffic processing rule

Changing the order of applied rules

Working with traffic processing rule groups

Configuring a default protection policy

Monitoring traffic processing rules

Page top