Create HTTP Header Insertion Entries using Predefined Types
You can create HTTP Header Insertion rules based on types that are predefined by Palo Alto Networks® for popular SaaS applications.
- If there are no upstream devices already
decrypting HTTPS traffic, configure Decryption using Configure
SSL Forward Proxy.If you are configuring SSL decryption for Dropbox, then you must also configure your Dropbox clients to allow SSL traffic. These procedures are specific and private to Dropbox — to obtain these procedures, contact your Dropbox account representative.
- Add a Custom URL Category for the SaaS application you are managing (ObjectsCustom ObjectsURL Category).
- Specify a Name for the category.
- Add the domains specific to the SaaS application you are managing. See Domains used by the Predefined SaaS Application Types for a list of the domains that you use for each of the predefined SaaS applications.
a Decryption Policy Rule and, as you follow this procedure, configure
- In the Service/URL Category tab, Add the URL Category that you created in the previous step.
- In the Options tab, make sure the Action is set to Decrypt and that the Type is set to SSL Forward Proxy.
- Edit or add a URL filtering profile.
- Select HTTP Header Insertion in the URL Filtering Profile dialog.
- Add an entry.
- Specify a Name for this entry.
- Select a predefined application Type.This populates the Domains and Headers lists.
- For each Header, enter a Value.
- (Optional) Select Log to enable logging of insertion activity for the headers.
- Click OK to save your changes.
- Add or edit a Security
Policy rule (PoliciesSecurity) that allows users to
access the SaaS application for which you are configuring this header insertion
- Choose the URL filtering profile (ActionsURL Filtering) that you edited or created in Step 2.
- Click OK to save and then Commit your changes.
- Verify that access to the SaaS application is working
in the way you expect. From an endpoint:
- Try to access an account or content that you expect to be able to access. If you cannot access the SaaS account or content, then the configuration is not working.
- Try to access an account or content that you expect will be blocked. If you can access the SaaS account or content, then the configuration is not working.
- If both of the previous steps work as expected, then you can View Logs (if you configured logging in step 4.4) and you should see the recorded HTTP header insertion activity.
Use HTTP Headers to Manage SaaS Application Access
Use Palo Alto Networks® firewall URL profiles to insert custom headers into HTTP requests so that you can control access to differing versions of web ...
Domains used by the Predefined SaaS Application Types
List of domains you use for header insertion rules when using predefined HTTP header insertion rules. ...
Create Custom HTTP Header Insertion Entries
Create custom HTTP Header Insertion rules for your Palo Alto Networks® firewall. ...
HTTP Header Insertion
HTTP Header Insertion To enable the firewall to manage web application access by inserting HTTP headers and their values into HTTP requests, select Objects Security ...
HTTP Header Insertion and Modification
Use Palo Alto Networks® firewall URL profiles to insert HTTP headers and values into HTTP requests so that you can control access to differing versions ...
Understand SaaS Custom Headers
Understand the custom HTTP headers you will use before you create HTTP Header Insertion Rules for your Palo Alto Networks® firewall. ...
App-ID enables you to see the applications on your network and learn how they work, their behavioral characteristics, and their relative risk. ...
Application Whitelist Example
Application Whitelist Example Keep in mind that you do not need to capture every application that might be in use on your network in your ...