Function Testing of Malicious URL Detection in IAG

Newbie003793 Posted May-15-2025 14:33

How to test the functionality of Malicious URL Detection in IAG (e.g. with example harmless malicious site)?

Newbie517762 has solved this question and earned 20 coins.

Posting a reply earns you 2 coins. An accepted reply earns you 20 coins and another 10 coins for replying within 10 minutes. (Expired) What is Coin?

Enter your mobile phone number and company name for better service. Go

Last edited by Newbie517762 2025-May-19 12:43.

HiHi,

Since I couldn't find the info you need, I asked DeepSeek for help. Check out the testing concepts below for reference. Be cautious and prepared before starting your testing.

To Testing the Malicious URL Detection:
(Please Ensure the Sangfor IAG is properly configured with malicious URL detection enabled & Verify that the URL filtering database is up-to-date.)

1. Obtain a known malicious URL
(e.g., from threat intelligence feeds like:
  - [PhishTank](https://www.phishtank.com/)
  - [URLhaus](https://urlhaus.abuse.ch/)
  - [Open Threat Exchange (OTX)](https://otx.alienvault.com/)

2. Try accessing the URL from a client behind Sangfor IAG.
3. Check if Sangfor IAG blocks the request and logs the event.

- Expected Result:
- The malicious URL should be blocked (e.g., with a warning page).
- The IAG logs should show the blocked attempt under security logs.
- Log the event in security logs.
Is this answer helpful?
Newbie003793 Posted May-19-2025 09:35
  
Last edited by Newbie003793 2025-May-21 08:58.

Thanks but we want to have the concret steps, not the plan.
Newbie517762 Lv5Posted May-19-2025 11:08
  
Last edited by Newbie517762 2025-May-19 12:43.

HiHi,

Since I couldn't find the info you need, I asked DeepSeek for help. Check out the testing concepts below for reference. Be cautious and prepared before starting your testing.

To Testing the Malicious URL Detection:
(Please Ensure the Sangfor IAG is properly configured with malicious URL detection enabled & Verify that the URL filtering database is up-to-date.)

1. Obtain a known malicious URL
(e.g., from threat intelligence feeds like:
  - [PhishTank](https://www.phishtank.com/)
  - [URLhaus](https://urlhaus.abuse.ch/)
  - [Open Threat Exchange (OTX)](https://otx.alienvault.com/)

2. Try accessing the URL from a client behind Sangfor IAG.
3. Check if Sangfor IAG blocks the request and logs the event.

- Expected Result:
- The malicious URL should be blocked (e.g., with a warning page).
- The IAG logs should show the blocked attempt under security logs.
- Log the event in security logs.

I Can Help:

Change

Moderator on This Board

910
182
94

Started Topics

Followers

Follow

Board Leaders