This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Adding or removing a signature object
You can add a new signature object to the Web App Firewall by:
- Copying a built-in template.
- Copying an existing signatures object.
- Importing a signatures object from an external file.
The signature file includes CPU usage, latest applicable year, and severity level details. You can see the CPU usage, latest year, and CVE severity level every time a signature file is modified and uploaded periodically. After observing these values, you can decide to enable or disable the signature on the appliance.
You must use the GUI to copy a template or existing signatures object. You can use either the GUI or the command line to import a signatures object. You can also use either the GUI or the command line to remove a signatures object.
To create a signatures object from a template
-
Navigate to Security > NetScaler Web App Firewall > Signatures.
-
In the details pane, select the signatures object that you want to use as a template.
Your choices are:
- Default Signatures. Contains the signatures rules, the SQL injection rules, and the cross-site scripting rules.
- XPath Injection. Contains the XPath injection patterns.
- Any existing signatures object.
Attention:
If you do not choose a signatures type to use as a template, the Web App Firewall prompts you to create signatures from scratch.
-
Click Add.
-
In the Add Signatures Object dialog box, type a name for your new signatures object, and then click OK. The name can begin with a letter, number, or the underscore symbol, and can consist of from one to 31 letters, numbers, and the hyphen (-), period (.) pound (#), space ( ), at (@), equals (=), and underscore (_) symbols.
-
Click Close.
To create a signatures object by importing a file
- Navigate to Security > NetScaler Web App Firewall > Signatures.
- In the details pane, click Add.
- In the Add Signatures Object dialog box, select the format of the signatures you want to import.
- To import a NetScaler format signatures file, select the Native Format tab.
- To import an external signatures format file, select the External Format tab.
- Choose the file that you want to use to create your signatures object.
- To import a native NetScaler format signatures file, in the Import section select either Import from Local File or Import from URL, then type or browse to the path or URL to the file.
- To import a Cenzic, IBM AppScan, Qualys, or Whitehat format file, in the XSLT section select Use Built-in XSLT File, Use Local File, or Reference from URL. Next, if you chose Use Built-in XSLT File, select the appropriate file format from the list. If you chose Use Local File or Reference from URL, then type or browse to the path or URL to the file.
- Click Add, and then click Close.
To create a signatures object by importing a file by using the command line
At the command prompt, type the following commands:
import appfw signatures <src> <name> [-xslt <string>] [-comment <string>] [-overwrite] [-merge] [-sha1 <string>]
save ns config
Example #1
The following example creates a signatures object from a file named signatures.xml and assigns it the name MySignatures.
import appfw signatures local:signatures.xml MySignatures
save ns config
<!--NeedCopy-->
To add individual signatures by using CLI
You can select signatures by their IDs or category and then set actions. At the command prompt, run the following command:
import appfw signature <source> <name> [-sigRuleId| -sigCategory] [Rule-IDs | Category name] -Enabled [ON | OFF] [-Action LOG BLOCK]
<!--NeedCopy-->
-
Examples to use signature IDs
The following example enables the signatures by their rule IDs and sets the log and block actions:
import appfw signature DEFAULT object_name -sigRuleId 1001 9882 2000 1250 810 -Enabled ON -Action LOG BLOCK <!--NeedCopy-->
The following example adds the signature by its ID without enabling it:
import appfw signature DEFAULT object_name -sigRuleId 810 -Enabled OFF <!--NeedCopy-->
-
Examples to use signature category
The following example enables the signatures by the
web-misc
category and sets the log and block actions:import appfw signature DEFAULT object_name -sigCategory web-misc -Enabled ON -Action LOG BLOCK <!--NeedCopy-->
The following example adds the signatures by the
web-misc
category without enabling it:import appfw signature DEFAULT object_name -sigCategory web-misc -Enabled OFF <!--NeedCopy-->
To remove a signatures object by using the GUI
- Navigate to Security > NetScaler Web App Firewall > Signatures.
- In the details pane, select the signatures object that you want to remove.
- Click Remove.
To remove a signatures object by using the command line
At the command prompt, type the following commands:
rm appfw signatures <name>
save ns config
Share
Share
In this article
- To create a signatures object from a template
- To create a signatures object by importing a file
- To create a signatures object by importing a file by using the command line
- To add individual signatures by using CLI
- To remove a signatures object by using the GUI
- To remove a signatures object by using the command line
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.