Fortinet FortiGate-800 User Manual Page 12

  • Download
  • Add to my manuals
  • Print
  • Page
    / 336
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 11
Contents
12 Fortinet Inc.
URL blocking................................................................................................................... 293
Configuring FortiGate Web URL blocking................................................................... 293
Configuring FortiGate Web pattern blocking............................................................... 296
Configuring Cerberian URL filtering ................................................................................ 296
Installing a Cerberian license key ............................................................................... 297
Adding a Cerberian user ............................................................................................. 297
Configuring Cerberian web filter ................................................................................. 297
Enabling Cerberian URL filtering ................................................................................ 298
Script filtering .................................................................................................................. 299
Enabling script filtering................................................................................................ 299
Selecting script filter options ....................................................................................... 299
Exempt URL list .............................................................................................................. 300
Adding URLs to the URL Exempt list .......................................................................... 300
Downloading the URL Exempt List ............................................................................. 301
Uploading a URL Exempt List..................................................................................... 301
Email filter........................................................................................................... 303
General configuration steps............................................................................................ 303
Email banned word list.................................................................................................... 304
Adding words and phrases to the email banned word list........................................... 304
Downloading the email banned word list .................................................................... 305
Uploading the email banned word list ......................................................................... 305
Email block list ................................................................................................................ 306
Adding address patterns to the email block list........................................................... 306
Downloading the email block list................................................................................. 306
Uploading an email block list ...................................................................................... 307
Email exempt list............................................................................................................. 307
Adding address patterns to the email exempt list ....................................................... 308
Adding a subject tag ....................................................................................................... 308
Logging and reporting....................................................................................... 309
Recording logs................................................................................................................ 309
Recording logs on a remote computer........................................................................ 310
Recording logs on a NetIQ WebTrends server ........................................................... 310
Recording logs on the FortiGate hard disk ................................................................. 311
Recording logs in system memory.............................................................................. 312
Log message levels .................................................................................................... 312
Filtering log messages .................................................................................................... 313
Configuring traffic logging ............................................................................................... 314
Enabling traffic logging................................................................................................ 315
Configuring traffic filter settings................................................................................... 316
Adding traffic filter entries ........................................................................................... 316
Page view 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 335 336

Comments to this Manuals

No comments