Dell SonicWall SRA 4200 Administrator's Manual page 261

Sra 6.0
Table of Contents

Advertisement

During profiling, the SRA records inputs and stores them as URL profiles. The URL profiles are
listed as a tree structure on the Web Application Firewall > Rules page in the Application
Profiling section.
After a period of time adequate to record inputs from normal application use, click End
Step 5
Profiling to stop the profiling process.
Optionally click any of the links in the URL profile tree display to edit the learned values. The
Step 6
editing page for the clicked URL is displayed. Click Expand to expand all URLs at that level in
the tree.
To add a value, type the value into the field next to the parameter and then click the plus button.
Step 7
To remove a value, select it in the list and then click the minus button.
Click Accept when finished editing. Repeat for other URLs as needed.
Step 8
Before generating the rules from the URL profiles, select one of the following actions from the
Step 9
Default Action for generated Rule Chains drop-down list:
Disabled – The generated rules will be disabled rather than active.
Detect Only – Content triggering the generated rule will be detected and logged.
Prevent – Content triggering the generated rule will be blocked and logged.
Select the Overwrite existing Rule Chains for URL Profiles check box to overwrite rule
Step 10
chains that have already been generated from a URL profile.
Click the Generate Rules button to generate rules from the URL profiles. If a URL profile has
Step 11
been modified, those changes are incorporated.
If rule chains are successfully generated, the status bar indicates how many rule chains were
generated, including any that were overwritten.
If you do not want to accept the generated rule chains, click the Delete Selected Rule Chains
Step 12
button, which is available below the rule chain list. All of the automatically added rule chains
are pre-selected right after generation for easy deletion of the group.
Click Accept to apply the generated rule chains to the SRA configuration.
Step 13
Web Application Firewall Configuration | 261

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents