server-policy pattern custom-global-white-list-group
Use this command to configure objects that will be exempt from scans.
This command applies to all the server-policies. If you want to define an allow list that applies specifically to a certain server policiy, use config server-policy allow-list
instead of this one.
To use this command, your administrator account’s access control profile must have either w
or rw
permission to the traroutegrp
area. For details, see Permissions.
Syntax
config server-policy pattern custom-global-white-list-group
edit <entry_index>
set type {Cookie | Parameter | URL | Header_Field }
set path "<url_str>"
set request-type {plain | regular}
set domain-type {plain | regular}
set name-type {plain | regular}
set request-file-status {enable | disable}
set domain-status {enable | disable}
set header-type {plain | regular}
set value-status {enable | disable}
set value-type {plain | regular}
set value <header_value_string>
next
end
Variable | Description | Default |
Enter the index number of the individual rule in the table. The valid range is 1–9,223,372,036,854,775,807. | No default. | |
Enable to exempt this object from all scans. | enable
|
|
Indicate the type of the object. Depending on your selection, the remaining settings vary. | URL
|
|
Enter the path as it appears in the cookie, such as This setting is available if type {Cookie | Parameter | URL | Header_Field } is set to |
No default. | |
Indicate whether the request-file "<url_str>" field contains a literal URL ( This setting is available if type {Cookie | Parameter | URL | Header_Field } is set to |
plain
|
|
Indicate whether the |
|
|
Enter the partial or complete domain name or IP address as it appears in the cookie, such as:
If clients sometimes access the host via IP address instead of DNS, create allow list objects for both. This setting is available if type {Cookie | Parameter | URL | Header_Field } is set to Caution: Do not allowlist untrusted subdomains that use vulnerable cookies. It could compromise the security of that domain and its network. |
No default. | |
Indicate whether the |
plain |
|
Depending on your selection in type {Cookie | Parameter | URL | Header_Field }, either:
This setting is available if type {Cookie | Parameter | URL | Header_Field } is set to |
No default. | |
Enable to apply this rule only to HTTP requests for specific URLs. Configure |
disable
|
|
Enable to apply this rule only to HTTP requests for specific domains. If enabled, also configure |
|
|
Depending on your selection in the request-type {plain | regular} field, enter either:
Do not include the domain name, such as This setting is available if type {Cookie | Parameter | URL | Header_Field } is set to |
||
Indicate whether the type field will contain a literal name (plain), or a regular expression designed to match multiple names (regular). |
plain
|
|
Enable to also check the value of the HTTP header. Only the HTTP headers which match both the name and the value will be allowlisted. |
|
|
Indicate whether the header name will contain a literal name ( |
|
|
The value of the HTTP header. Depending on your selection in the |
No default. |
Example
This example exempts requests for robots.txt from most scans.
config server-policy pattern custom-global-allow-list-group
edit 1
set request-file "/robots.txt"
next
end