Fortinet FortiGate-800 User Manual
Page 12
Contents
12
Fortinet Inc.
Configuring FortiGate Web URL blocking................................................................... 293
Configuring FortiGate Web pattern blocking............................................................... 296
Installing a Cerberian license key ............................................................................... 297
Adding a Cerberian user ............................................................................................. 297
Configuring Cerberian web filter ................................................................................. 297
Enabling Cerberian URL filtering ................................................................................ 298
Adding URLs to the URL Exempt list .......................................................................... 300
Downloading the URL Exempt List ............................................................................. 301
Uploading a URL Exempt List..................................................................................... 301
General configuration steps ............................................................................................ 303
Email banned word list.................................................................................................... 304
Adding words and phrases to the email banned word list........................................... 304
Downloading the email banned word list .................................................................... 305
Uploading the email banned word list ......................................................................... 305
Adding address patterns to the email block list........................................................... 306
Downloading the email block list................................................................................. 306
Uploading an email block list ...................................................................................... 307
Recording logs on a remote computer........................................................................ 310
Recording logs on a NetIQ WebTrends server ........................................................... 310
Recording logs on the FortiGate hard disk ................................................................. 311
Recording logs in system memory.............................................................................. 312
Log message levels .................................................................................................... 312
Filtering log messages .................................................................................................... 313
Configuring traffic logging ............................................................................................... 314
Enabling traffic logging................................................................................................ 315
Configuring traffic filter settings................................................................................... 316
Adding traffic filter entries ........................................................................................... 316