Nokia IP60 User Manual page 301

Security appliance
Hide thumbs Also See for IP60:
Table of Contents

Advertisement

Header Rejection
Some exploits are carried in standard HTTP headers with custom values (for example, in the Host header),
or in custom HTTP headers. You can protect against such exploits by rejecting HTTP requests that contain
specific headers and header values.
Table 78: Header Rejection Fields
In this field...
Do this...
Action
Specify what action to take when an HTTP header-based exploit is
detected, by selecting one of the following:
Track
Specify whether to log HTTP header-based exploits, by selecting one of
the following:
HTTP header values
list
Worm Catcher
A worm is a self-replicating malware (malicious software) that propagates by actively sending itself to new
machines. Some worms propagate by using security vulnerabilities in the HTTP protocol.
Chapter 13: Using SmartDefense
Block. Block the attack.
None. No action. This is the default.
Log. Log the attack.
None. Do not log the attack. This is the default.
Select the HTTP header values to detect.
SmartDefense Categories
301

Advertisement

Table of Contents
loading

Table of Contents