You can configure third-party filtering solutions with the URL-based access rules.
Log in to iManager.
Select
Browse to and select the BorderManager server or container that you want to configure, then click .
Click , then select any of the options.
Click , then select HTTP.
Specify a name for the rule in the field.
Specify a description of the rule in the field.
Click in the Condition Group, then select URL.
Select a type for the field
Specify a value for the field.
Specify whether to set the action to or .
(Optional) If you want the server to record all access attempts that match the rule, click .
Logging access attempts can affect server performance; however, we recommend that you enable this option to detect unauthorized activity.
Click .
Click to save the changes.