-
-
Enforce HTTP RFC compliance
-
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Enforce HTTP RFC compliance
Citrix Web App Firewall inspects the incoming traffic for HTTP RFC compliance and drops any request that has RFC violations by default. However, there are certain scenarios, where the appliance might have to bypass or block a non-RFC compliance request. In such cases, you can configure the appliance to bypass or block such requests at global or profile level.
Block or bypass non-RFC compliant requests at global level
The HTTP module identifies a request as invalid if it is incomplete and such requests cannot be processed by WAF. For example, an incoming HTTP request having a host header missing. To block or bypass such invalid requests, you must configure the malformedReqAction
option in the application firewall global settings.
The ‘malformedReqAction’ parameter validates the incoming request for invalid content length, invalid chunked request, no HTTP version, and incomplete header.
Note:
If you disable the block option in the
malformedReqAction
parameter, the appliance bypasses the entire app firewall processing for all non-RFC compliance requests and forwards the requests to the next module.
To block or bypass invalid non-RFC complaint HTTP requests by using the command line interface
To block or bypass invalid requests, enter the following command:
set appfw settings -malformedreqaction <action>
Example:
set appfw settings –malformedReqAction block
To display malformed request action settings
To display malformed request action settings, enter the following command:
show appfw settings
Output:
DefaultProfile: APPFW_BYPASS UndefAction: APPFW_BLOCK SessionTimeout: 900 LearnRateLimit: 400 SessionLifetime: 0 SessionCookieName: citrix_ns_id ImportSizeLimit: 134217728 SignatureAutoUpdate: OFF SignatureUrl:"https://s3.amazonaws.com/NSAppFwSignatures/SignaturesMapping.xml" CookiePostEncryptPrefix: ENC GeoLocationLogging: OFF CEFLogging: OFF EntityDecoding: OFF UseConfigurableSecretKey: OFF SessionLimit: 100000 MalformedReqAction: block log stats
Done
<!--NeedCopy-->
To block or bypass invalid non-RFC complaint HTTP requests by using the Citrix ADC GUI
- Navigate to Security > Citrix Web App Firewall.
- In the Citrix Web App Firewall page, click Change Engine Settings under Settings.
- In the Configure Citrix Web App Firewall Settings page, select the Log Malformed Request option as Block, Log, or Stats.
- Click OK and Close.
Note:
If you unselect the block action or do not select any malformed request action, the appliance bypasses the request without intimating the user.
Block or bypass non-RFC compliant requests at profile level
Other non-RFC compliant requests can be configured to block or bypass at profile level. You must configure the RFC profile either in Block or Bypass mode. By doing this configuration, any invalid traffic that matches the Web App Firewall profile is either bypassed or blocked accordingly. The RFC profile validates the following security checks:
- Invalid GWT-RPC requests
- Invalid content type headers
- Invalid Multipart requests
- Invalid JSON requests
- Duplicate cookie name value pair checks
Note:
When you set the
RFC
profile in “Bypass” mode, you must make sure you disable the transformation option in the HTML Cross-Site Scripting Settings and in the HTML SQL Injection Settings sections. If you enable and set theRFC
profile in Bypass mode, the appliance displays a warning message, “Transform cross-site scripts” and “Transform SQL special characters” are both currently ON. Recommend turning it off when used withAPPFW_RFC_BYPASS
.Important:
Also, the appliance displays a warning note, “Appfw Security checks enabled might not be applicable to requests which violates RFC checks when this profile is set. Enabling any transformation setting is not recommended as requests might be partially transformed that contains RFC violations.”
To configure an RFC profile in the Web App Firewall profile by using the command line interface
At the command prompt, type the following commands:
set appfw profile <profile_name> -rfcprofile <rfcprofile_name
Example
set appfw profile P1 -rfcprofile APPFW_RFC_BLOCK
Note:
By default, the
RFC
profile is bound to the Web App Firewall profile in Block mode.
To configure an RFC profile in the Web App Firewall profile by using the GUI
- Navigate to Security > Citrix Web App Firewall > Profiles.
- In the Profiles page, select a profile and click Edit.
- In the Web App Firewall Profile page, click Profile settings from the Advanced Settings section.
- In the HTML Settings section, set the
RFC
profile inAPPFW_RFC_BYPASS
mode. The system displays a warning message, “Appfw Security checks enabled might not be applicable to requests which violates RFC checks when this profile is set. Enabling any transformation setting is not recommended as requests might be partially transformed that contains RFC violations”.
Share
Share
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.