server-policy allow-list
Use this command to configure objects that will be exempt from scans, and it can be applied at the server policy level. For the traffic that arrives at this server policy, it will be screened only according to the server policy based allow list instead of the global one.
This command applies only at server-policy level. If you want to define a allow list that applies globally to all server policies, use config server-policy pattern custom-global-white-list-group
instead of this one.
To use this command, your administrator account’s access control profile must have either w
or rw
permission to the traroutegrp
area. For details, see Permissions.
Syntax
config server-policy allow-list
edit <entry_index>
config allow-list-items
edit <entry_index>
set type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt}
set path "<url_str>"
set request-type {plain | regular}
set domain-type {plain | regular}
set name-type {plain | regular}
set request-file-status {enable | disable}
set domain-status {enable | disable}
set header-type {plain | regular}
set value-status {enable | disable}
set value-type {plain | regular}
set value <header_value_string>
next
end
Variable | Description | Default |
Enter the index number of the individual rule in the table. The valid range is 1–9,223,372,036,854,775,807. | No default. | |
Enable to exempt this object from all scans. | enable
|
|
type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt} |
Indicate the type of the object. Depending on your selection, the remaining settings vary. Note: If |
URL
|
Enter the path as it appears in the cookie, such as This setting is available if type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt} is set to |
No default. | |
Indicate whether the request-file "<url_str>" field contains a literal URL ( This setting is available if type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt} is set to |
plain
|
|
Indicate whether the |
|
|
Enter the partial or complete domain name or IP address as it appears in the cookie, such as:
If clients sometimes access the host via IP address instead of DNS, create allow list objects for both. This setting is available if type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt} is set to Caution: Do not allowlist untrusted subdomains that use vulnerable cookies. It could compromise the security of that domain and its network. |
No default. | |
Indicate whether the |
plain |
|
Depending on your selection in type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt}, either:
This setting is available if type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt} is set to |
No default. | |
Enable to apply this rule only to HTTP requests for specific URLs. Configure |
disable
|
|
Enable to apply this rule only to HTTP requests for specific domains. If enabled, also configure |
|
|
Depending on your selection in the request-type {plain | regular} field, enter either:
Do not include the domain name, such as This setting is available if type {Cookie | Parameter | URL | Header_Field | Lets_Encrypt} is set to |
||
Indicate whether the type field will contain a literal name (plain), or a regular expression designed to match multiple names (regular). |
plain
|
|
Enable to also check the value of the HTTP header. Only the HTTP headers which match both the name and the value will be allowlisted. |
|
|
Indicate whether the header name will contain a literal name ( |
|
|
The value of the HTTP header. Depending on your selection in the |
No default. |
Example
This example exempts requests for robots.txt from most scans.
config server-policy pattern custom-global-allow-list-group
edit 1
set request-file "/robots.txt"
next
end