I am just posting the answer from other folks who just contributed earlier:

Hi to all.... 

Why don't u use CP FW' s security server? (Checking with resource...) 

For example, if Code Red is the case, 

Why don't u put a rule above all the http-related rules such as; 

Source      Dest.           Service                             Action 
Any           Any             http->with resource           Drop 

And the http->with resource service will be defined as a New Resource ----
URI; 

URI: 

Connection Methods:Transparent, Proxy (perhaps not so nec. but doesn't give
any headache at least...) 
Schemes: http (only this will be enough..) 
Methods: all (so as to guarantee...) 
Host:* 
Path:{*/default.ida?*} 
Query:* 

Save everythg, and install.... 

It should be noted that since mostly *.ida is useless, this rule presumably
shouldn't harm any Web-Server-based applications...


**********************************
Roman Zeltser,
@National Computer Center,
RSIS & DNE
 


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]
Sent: Monday, August 06, 2001 12:36 PM
To: [EMAIL PROTECTED]
Subject: [FW1] Filtering HTTP



We would like to block HTTP traffic using FW-1 destined for pages called
"default.ida" on our web servers. Is there a way to do this using FW-1?




============================================================================
====
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
============================================================================
====


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to