Security Irules 101: Engage Cloak!
Published Nov 15, 2014
Version 1.0Was this article helpful?
https://devcentral.f5.com/wiki/irules.HTTP__header.ashx
These are all great examples of Positive Enforcement (whitelist models).
We could reverse this and create a general blanket Negative Security model, saying that no matter the application, we never want to see the server header leave our environment.