-
-
Advanced Policy Expressions: Working with Dates, Times, and Numbers
-
Advanced Policy Expressions: Parsing HTTP, TCP, and UDP Data
-
Advanced Policy Expressions: IP and MAC Addresses, Throughput, VLAN IDs
-
-
-
Responder Action and Policy Examples
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Responder Action and Policy Examples
Responder actions and policies are powerful and complex, but you can get started with relatively simple applications.
Example: Blocking Access from Specified IPs
The following procedures block access to your protected Web site(s) by clients originating from the CIDR 222.222.0.0/16. The responder sends an error message stating that the client is not authorized to access the URL requested.
To block access by using the NetScaler command line:
At the command prompt, type the following commands to block access:
- add responder action act_unauthorized respond with “HTTP/1.1 403 Forbidden\r\n\r\n” + “Client: “ + CLIENT.IP.SRC + “ is not authorized to access URL:” + “HTTP.REQ.URL.HTTP_URL_SAFE”’
- add responder policy pol_un “CLIENT.IP.SRC.IN_SUBNET (222.222.0.0/16)” act_unauthorized
- bind responder global pol_un 10
To block access by using the GUI:
- In the navigation pane, expand Responder, and then click Actions.
- In the details pane, click Add.
- In the Create Responder Action dialog box, do the following:
- In the Name text box, type act_unauthorized.
- Under Type, select Respond with.
- In the Target text area, type the following string: “HTTP/1.1 403 Forbidden\r\n\r\n” + “Client: “ + CLIENT.IP.SRC + “ is not authorized to access URL:” + HTTP.REQ.URL.HTTP_URL_SAFE
- Click Create, and then click Close. The responder action you configured, named act_unauthorized, now appears in the Responder Actions page.
- In the navigation pane, click Policies.
- In the details pane, click Add.
- In the Create Responder Policy dialog box, do the following:
- In the Name text box, type pol_unauthorized.
- Under Action, select act_unauthorized.
- In the Expression window, type the following rule: CLIENT.IP.SRC.IN_SUBNET(222.222.0.0/16)
- Click Create, then click Close. The responder policy you configured, named pol_unauthorized, now appears in the Responder Policies page.
- Globally bind your new policy, pol_unauthorized, as described in Binding a Responder Policy.
Example: Redirecting a client to a new URL
The following procedures redirect clients who access your protected Web site(s) from within the CIDR 222.222.0.0/16 to a specified URL.
To redirect clients by using the NetScaler command line:
At the command prompt, type the following commands to redirect clients and verify the configuration:
- add responder action act_redirect redirect
"<http://www.example.com/404.html>"
- show responder action act_redirect
- add responder policy pol_redirect “CLIENT.IP.SRC.IN_SUBNET(222.222.0.0/16)” act_redirect
- show responder policy pol_redirect
- bind responder global pol_redirect 10
Example:
> add responder action act_redirect redirect `" http ://www.example.com/404.html "`
Done
> add responder policy pol_redirect "CLIENT.IP.SRC.IN_SUBNET(222.222.0.0/16)" act_redirect
Done
<!--NeedCopy-->
To redirect clients by using the GUI:
- Navigate to AppExpert > Responder > Actions.
- In the details pane, click Add.
- In the Create Responder Action dialog box, do the following:
- In the Name text box, type act_redirect.
- Under Type, select Redirect.
- In the Target text area, type the following string:
"<http://www.example.com/404.html>"
- Click Create, then click Close. The responder action you configured, named act_redirect, now appears in the Responder Actions page.
- In the navigation pane, click Policies.
- In the details pane, click Add.
- In the Create Responder Policy dialog box, do the following:
- In the Name text box, type pol_redirect.
- Under Action, select act_redirect.
- In the Expression window, type the following rule: CLIENT.IP.SRC.IN_SUBNET(222.222.0.0/16)
- Click Create, then click Close. The responder policy you configured, named pol_redirect, now appears in the Responder Policies page.
- Globally bind your new policy, pol_redirect, as described in Binding a Responder Policy.
Share
Share
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.