URL-based access rules apply to users accessing Web content through the HTTP or FTP proxy. If you enabled the HTTP proxy for all private interfaces during the installation, the simplest way to allow users to access the HTTP proxy is to create a rule that allows any source on the private network to access any destination.
This section has the following information:
Log in to iManager.
Select
Browse to and select the BorderManager server or container that you want to configure, then click
.Click
, then select if you want to configure access rules for HTTP or select if you want to configure access rules for FTP.Specify a name for the rule in the
field.Specify a brief description of the rule in the
field.Click
in the section, then select from the list.Select a value for the
fieldSpecify a value for the
field.Specify whether to set the action to
or .(Optional) If you want the server to record all access attempts that match the rule, click
Logging access attempts can affect server performance; however, we recommend that you enable this option so to detect unauthorized activity.
Click
.Click
to save the changes.You can modify the existing HTTP and FTP access rules into URL-based access rules as follows:
Log in to iManager.
Select
Browse to and select the BorderManager server or container that you want to configure, then click
.Select the HTTP or the FTP access-rule that you want to change into a URL-based rule.
Delete
, and from the section.Select Step 7 to Step 13 in Section 6.2.1, Configuring a URL-Based Access Rule for FTP or HTTP Proxy.
To change the existing URL-based access rules into FTP or HTTP access rules, follow the steps given below:
Log in to iManager.
Select
Browse to and select the BorderManager server or container that you want to configure, then click
.Select the URL-based access rule that you want to modify.
Delete
from the section.Select Step 5 to Step 13 in Section 6.1, Configuring a Rule to Allow Access through an Application Proxy.