LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started
  2. 4. Security Rules

4.4 HTTP Header Filtering

📘 Overview

The HTTP Header Filtering module allows you to filter incoming HTTP requests based on the name and value of specific HTTP headers. This is useful for blocking or allowing requests based on exact or expected header content.


🛠️ How It Works

You can define a simple rule by providing:

  • A Header Title (e.g., Origin, Authorization, X-Custom-Header)

  • A Header Content (exact match string)

Once the rule is created, incoming requests will be matched against this rule and filtered accordingly.


⚙️ How to Add a Header Filter

  1. Go to Security Rules > HTTP Header Filtering

  2. Click Create Header Filtering

  3. Fill out:

    • Enter Header Title

    • Enter Header Content

  4. Click Filter

  5. The rule will take effect immediately


🔐 Why It Matters

Many attacks exploit improperly validated or missing headers, including:

  • CSRF attacks (missing Origin / Referer headers)

  • Host Header Injection

  • API key misuse

Header filtering adds a layer of control at the gateway level to prevent such attacks early.


🎯 HTTP Header Filtering is a quick way to enforce header presence and exact values, adding lightweight security to your application endpoints.

Previous4.3 Query String FilteringNext4.5 Block POST Values

Last updated 9 days ago