beautypg.com

Fortinet FortiGate-800 User Manual

Page 12

background image

Contents

12

Fortinet Inc.

URL blocking................................................................................................................... 293

Configuring FortiGate Web URL blocking................................................................... 293
Configuring FortiGate Web pattern blocking............................................................... 296

Configuring Cerberian URL filtering ................................................................................ 296

Installing a Cerberian license key ............................................................................... 297
Adding a Cerberian user ............................................................................................. 297
Configuring Cerberian web filter ................................................................................. 297
Enabling Cerberian URL filtering ................................................................................ 298

Script filtering .................................................................................................................. 299

Enabling script filtering................................................................................................ 299
Selecting script filter options ....................................................................................... 299

Exempt URL list .............................................................................................................. 300

Adding URLs to the URL Exempt list .......................................................................... 300
Downloading the URL Exempt List ............................................................................. 301
Uploading a URL Exempt List..................................................................................... 301

Email filter........................................................................................................... 303

General configuration steps ............................................................................................ 303
Email banned word list.................................................................................................... 304

Adding words and phrases to the email banned word list........................................... 304
Downloading the email banned word list .................................................................... 305
Uploading the email banned word list ......................................................................... 305

Email block list ................................................................................................................ 306

Adding address patterns to the email block list........................................................... 306
Downloading the email block list................................................................................. 306
Uploading an email block list ...................................................................................... 307

Email exempt list............................................................................................................. 307

Adding address patterns to the email exempt list ....................................................... 308

Adding a subject tag ....................................................................................................... 308

Logging and reporting....................................................................................... 309

Recording logs ................................................................................................................ 309

Recording logs on a remote computer........................................................................ 310
Recording logs on a NetIQ WebTrends server ........................................................... 310
Recording logs on the FortiGate hard disk ................................................................. 311
Recording logs in system memory.............................................................................. 312
Log message levels .................................................................................................... 312

Filtering log messages .................................................................................................... 313
Configuring traffic logging ............................................................................................... 314

Enabling traffic logging................................................................................................ 315
Configuring traffic filter settings................................................................................... 316
Adding traffic filter entries ........................................................................................... 316