You can configure third-party filtering solutions with the URL-based access rules.
Log in to iManager.
Select
Browse to and select the BorderManager server or container that you want to configure, then click
.Click
, then select any of the options.Click
, then select HTTP.Specify a name for the rule in the
field.Specify a description of the rule in the
field.Click
in the Condition Group, then select URL.Select a type for the
fieldSpecify a value for the
field.Specify whether to set the action to
or .(Optional) If you want the server to record all access attempts that match the rule, click
.Logging access attempts can affect server performance; however, we recommend that you enable this option to detect unauthorized activity.
Click
.Click
to save the changes.