Configuring Additional ICAP Response Headers for Enforcement

Description

To adjust the enforcement according to ICAP response headers from an ICAP ServerClosed The ICAP Server functionality in your Security Gateway or Cluster (in versions R80.40 and higher) enables it to interact with an ICAP Client requests, send the files for inspection, and return the verdict., you can configure specific HTTP headers. When ICAP ClientClosed The ICAP Client functionality in your Security Gateway or Cluster (in versions R80.40 and higher) enables it to interact with an ICAP Server responses (see RFC 3507), modify their content, and block the matched HTTP connections. on Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. receives these HTTP headers, the Security Gateway blocks the matched HTTP connections. See the Draft RFC - ICAP Extensions.

Default HTTP Response X-Headers

By default, ICAP Client recognizes these three user-defined ICAP response header extensions.

Additional HTTP Response X-Headers

You can add additional HTTP response X-Headers for the ICAP Client to recognize.

Configuring the Additional HTTP Response X-Headers

You add the additional HTTP response X-Headers as values of the specific kernel parameter:

Item

Description

Name

icap_unwrap_append_header_str

Type

String

Notes

  • Length of each added HTTP header is up to 80 characters

  • You can add up to 21 such HTTP headers

  • The ICAP Client also uses this HTTP response status:

    HTTP/1.0 403 Forbidden (according to RFC 3507).

For general instructions, see the R81 Quantum Security Gateway Guide > Chapter Working with Kernel Parameters on Security Gateway.