最近公司网站受到了几次***,结合了nginx服务器的iptables和f5来抵御***
以下是在f5上使用了的的两种安全策略
:在network=>packet filters下创建规则
action (none | accept | discard | reject | continue):这里是discard
filter expression:
( src host 125.27.28.119 or 186.104.47.160 or 187.59.121.65 ) and ( dst host 124.1.1.1)
###从这几个ip:125.27.28.119 or 186.104.47.160 or 187.59.121.65到host 124.1.1.1的包
在local traffic=>irules里面创建规则
这是definition里面的内容
when HTTP_REQUEST {
if { [HTTP::uri] starts_with "/bbbbbbbbbbb.html" } {
HTTP::respond 200
}
if { [HTTP::uri] starts_with "/aaaaaaaaa.html" } {
HTTP::respond 200
}
HTTP::respond 200
}
if { [HTTP::uri] starts_with "/aaaaaaaaa.html" } {
HTTP::respond 200
}
}
转载于:https://blog.51cto.com/chcearth/497828