TitelTable of contents1. Airlock Secure Access Hub1.1. Semantic versioning scheme for Airlock Secure Access Hub components2. About this document2.1. How information is structured in this manual2.2. Leveled prerequisites2.3. Warning tiers in this document2.4. Additional panel types2.5. Advanced Lucene searches within this online help2.6. Standardized example mappings in this manual3. About Airlock Gateway 3.1. Airlock Gateway license and sales3.2. 3rd party software license conditions3.3. System and hardware requirements3.3.1. Resource requirements for on-premises installations3.3.2. Resource requirements for cloud installations3.3.3. Performance considerations on load and configuration3.3.4. Hardware configuration recommendations3.3.5. Supported SSL/TLS versions3.4. About the Airlock Gateway user interfaces3.4.1. About the Airlock Gateway admin menu3.4.2. About the Airlock Gateway Configuration Center4. Release notes4.1. Airlock Gateway 8.0 release notes4.1.1. Actions required when upgrading4.1.2. Changelog5. Getting started5.1. Quick installation guide for Airlock Gateway on-premises installation5.2. Prepare a bootable USB flash drive for installation5.3. Updating Airlock Gateway using the admin menu5.3.1. Apply an update interactively5.3.2. Apply an update non-interactively5.4. NIC setups for cloud and on-premises installations5.4.1. Public cloud installations5.4.2. On-premises installations6. General warnings and recommendations7. Basic concepts and functional overviews7.1. Airlock Anomaly Shield7.1.1. Terms and definitions related to Airlock Anomaly Shield7.1.2. Architecture overview7.1.3. Anomaly detection7.2. Airlock Gateway rewrite engine with URL encryption7.3. Airlock Gateway Smart Form Protection7.4. API access control with Airlock Secure Access Hub7.4.1. Solution overview7.4.2. Tech-Client management7.5. Attribute locking in the Configuration Center7.6. Back-end load balancing and failover7.6.1. Runtime behavior7.6.2. Load balancing example cases7.7. Clustering, load-balancing, and failover scenarios for Airlock Gateway setups7.8. Cookie handling and cookie types7.8.1. Environment cookies7.8.2. Cookie security attributes7.9. Cross-Site Request Forgery (CSRF) protection7.10. Customizing events7.11. Dynamic back-end group selection7.12. Entry path to back-end path settings7.12.1. Entry path as Directory or Regular expression7.12.2. Option Enforce trailing slashes7.13. HTTP/HTML rewriting7.14. JSON filtering7.15. JWKS and JWK selection by filtering7.15.1. Reference lists of supported JWKS algorithms7.16. Multitenancy feature7.16.1. Terms and definitions7.16.2. Role and rights management for tenant-users7.16.3. Security considerations7.16.4. Manage tenant-users7.16.5. Practical applications and examples7.17. Rewrite variables7.18. Rule-based filtering7.19. Simultaneous administration and configuration merge7.19.1. How does configuration merge work in general?7.19.2. When does the merge process fail?7.19.3. Cancel vs. overwrite a configuration8. REST API based Airlock Gateway configuration and management interface9. Airlock Gateway Configuration Center – the web-based configuration GUI9.1. Button – Activate9.2. Menu – Dashboard9.2.1. Section – Users logged in9.2.2. Section – System health9.2.3. Section – Proxy statistics9.3. Menu – System Setup9.3.1. Submenu – License9.3.2. Submenu – Updates9.3.3. Submenu – Nodes & Interfaces9.3.4. Submenu – Routes9.3.5. Submenu – Hosts9.3.6. Submenu – Network Services9.3.7. Submenu – Threat Intelligence9.3.8. Submenu – IP Address Lists9.3.9. Submenu – System Admin9.4. Menu – Application Firewall9.4.1. Submenu – Reverse Proxy9.4.2. Submenu – Policy Learning9.4.3. Submenu - Anomaly Shield9.4.4. Submenu – Geolocation Filter9.4.5. Submenu – Certificates9.4.6. Submenu - JWKS Providers9.4.7. Submenu – Session9.4.8. Submenu – Default Actions9.4.9. Submenu – Deny Rules9.4.10. Submenu – API Security9.4.11. Submenu – Dynamic IP Deny List9.4.12. Submenu – Error Pages9.5. Menu – Log & Report9.5.1. Submenu – Log Viewer9.5.2. Submenu - Reporting9.5.3. Submenu – Session Viewer9.5.4. Submenu – System Monitor9.5.5. Submenu – Settings9.6. Menu – Configuration9.6.1. Submenu – Configuration Files9.6.2. Submenu – Configuration Summary9.7. Menu – Expert Settings9.7.1. Submenu – Security Gate / Apache9.7.2. Submenu – Add-on Modules10. Configuration examples and guides for general configuration tasks10.1. Airlock Anomaly Shield configuration10.1.1. Part 1 – Preconfigure an Airlock Anomaly Shield application10.1.2. Part 2 – Training and model enforcement10.1.3. Part 3 – Trigger, pattern and rule configuration10.1.4. Part 4 – Activate detection and response action (log-only mode)10.1.5. Part 5 – Analyze and adjust threat handling settings10.1.6. Optional configuration of Traffic Matchers10.1.7. Airlock Anomaly Shield logs, tuning and advanced configuration10.2. Airlock Gateway failover setup for on-premises installations10.2.1. Setup a failover cluster10.2.2. Remote activation within an Airlock Gateway failover cluster10.2.3. Maintaining actions on cluster nodes10.2.4. Hardware replacement in failover cluster10.3. Allow rule configuration10.4. API access control configuration for Airlock IAM and Airlock Gateway10.4.1. Configure the Airlock IAM API policy service10.4.2. Configure Tech-Client management in Airlock IAM10.4.3. Configure API gateway for API key-based access control10.5. Configure and manage custom HTTP error pages10.6. Configuration example cases for URL encryption 10.7. Configure filter rules using regular expression patterns10.7.1. Regular Expressions - Basics page10.7.2. Regular Expressions - Experts Page10.8. Cookie parsing according to RFC 626510.9. Deny rule configuration10.9.1. Security levels10.9.2. Dealing with false positives10.9.3. Blocking and logging10.9.4. Deny rule exceptions10.10. Remote Elasticsearch access with HTTPS10.11. Syslog forwarding with SSL10.12. TLS/SSL Certificate creation11. Integration tasks for web applications and 3rd-party software11.1. Control API11.1.1. Control API cookie11.1.2. ICAP control API header11.1.3. General command syntax11.1.4. Session authorization11.1.5. Basic-Auth propagation11.1.6. NTLM propagation11.1.7. Session control11.1.8. Session tracking mode11.1.9. Audit token11.1.10. Setting HTTP headers11.1.11. Kerberos user and domain11.1.12. Session timeout11.1.13. Authentication workflow11.1.14. Session variables11.1.15. Pseudo code11.1.16. Unconditional control API commands11.1.17. Summary of syntax rules11.1.18. Expert Settings11.2. Configure Cross-Site Request Forgery (CSRF) protection for SPAs11.3. Configure ICAP11.4. Configure local and remote JWKS Providers11.5. Integrated 3rd-party solutions11.5.1. Let's Encrypt as certificate provider11.5.2. Threat Intelligence by Webroot11.6. Microsoft integration guides11.6.1. Publishing Microsoft Exchange 201611.6.2. Publishing Microsoft Exchange 201911.6.3. Publishing Microsoft SharePoint 201611.6.4. Publishing Microsoft SharePoint 201911.6.5. Publishing Microsoft WebDAV11.6.6. Kerberos integration12. Tasks to maintain and improve the operation12.1. Airlock Gateway failover cluster upgrade with full system installation12.2. Airlock Gateway Configuration Center access via IAM12.2.1. Configure Airlock IAM access management using URL parameters (recommended)12.2.2. Configure IAM access management using cookies (alternative)12.2.3. Emergency access and troubleshooting12.3. Automatic configuration backup with SCP12.4. System backup/restore via the Airlock Gateway admin menu or scripts12.5. Client connection handling keepalive using the Apache MPM module instead of the Apache HTTP Server12.6. Configure automatic updates for the geolocation database12.7. Increasing the Java heap space for Configuration Center Tomcat and the Airlock management agent12.8. Logs and diagnostics12.9. SSH login with public/private key authentication12.10. User administration via shell script13. Airlock Gateway default deny rule groups and request/response actions13.1. Default deny rule groups13.1.1. Deny Rule Group – (default) SQL Injection (SQLi) in Parameter Value13.1.2. Deny Rule Group – (default) SQL Injection (SQLi) in Header Value13.1.3. Deny Rule Group – (default) Cross-Site Scripting (XSS) in Parameter Value13.1.4. Deny Rule Group – (default) Cross-Site Scripting (XSS) in Header Value13.1.5. Deny Rule Group – (default) Cross-Site Scripting (XSS) in Path13.1.6. Deny Rule Group – (default) Template Injection13.1.7. Deny Rule Group – (default) HTML Injection in Parameter Value13.1.8. Deny Rule Group – (default) HTML Injection in Header Value13.1.9. Deny Rule Group – (default) HTML Injection in Path13.1.10. Deny Rule Group – (default) UNIX Command Injection in Parameter Value13.1.11. Deny Rule Group – (default) UNIX Command Injection in Header Value13.1.12. Deny Rule Group – (default) Windows Command Injection in Parameter Value13.1.13. Deny Rule Group – (default) Windows Command Injection in Header Value13.1.14. Deny Rule Group – (default) LDAP Injection in Parameter Value13.1.15. Deny Rule Group – (default) LDAP Injection in Header Value13.1.16. Deny Rule Group – (default) PHP Injection in Parameter Value13.1.17. Deny Rule Group – (default) PHP Injection in Header Value13.1.18. Deny Rule Group – (default) Object Graph Navigation Library injection 13.1.19. Deny Rule Group – (default) Insecure Direct Object Reference in Parameter Value13.1.20. Deny Rule Group – (default) Insecure Direct Object Reference in Path13.1.21. Deny Rule Group - (default) NoSQL Injection in Parameter Name13.1.22. Deny Rule Group - (default) NoSQL Injection in Parameter Value13.1.23. Deny Rule Group - (default) NoSQL Injection in Header Value13.1.24. Deny Rule Group – (default) Parameter Name Sanity13.1.25. Deny Rule Group – (default) Parameter Value Sanity13.1.26. Deny Rule Group – (default) Header Name Sanity13.1.27. Deny Rule Group – (default) Header Value Sanity13.1.28. Deny Rule Group – (default) Path Sanity13.1.29. Deny Rule Group – (default) Encoding and Conversion Exploits in Parameter Value13.1.30. Deny Rule Group – (default) Encoding and Conversion Exploits in Header Value13.1.31. Deny Rule Group – (default) HTTP Response Splitting13.1.32. Deny Rule Group – (default) HTTP Parameter Pollution13.1.33. Deny Rule Group – (default) Automated Scanning13.2. Default request actions reference list13.3. Default response actions reference list14. Reference lists of log messages and events14.1. Log Fields14.2. Request Summary14.2.1. Log fields14.3. Block Summary14.3.1. Log fields14.3.2. Log messages14.4. Reject Summary14.4.1. Log fields14.4.2. Log messages14.5. Back messages14.5.1. Log fields14.5.2. Log messages14.6. Session Start and End Messages14.6.1. Session Start Message14.6.2. Session End Message14.6.3. TLS Session Start Message14.7. Events14.7.1. List of frequent events15. Expert settings collection15.1. Regular Expressions - Experts Page15.2. Session tracking with bearer tokens15.3. Modification of default Apache SSL/TLS settings15.4. Deploy Apache mod_status for analysis purposes16. Tips for troubleshooting16.1. Network traffic tracing using tcpdump and TShark/Wireshark