beautypg.com

Fortinet FortiGate 50A User Manual

Page 10

background image

Contents

10

Fortinet Inc.

Logging attacks............................................................................................................... 222

Logging attack messages to the attack log................................................................. 222
Reducing the number of NIDS attack log and email messages.................................. 222

Antivirus protection........................................................................................... 225

General configuration steps ............................................................................................ 225
Antivirus scanning........................................................................................................... 226
File blocking .................................................................................................................... 227

Blocking files in firewall traffic ..................................................................................... 227
Adding file patterns to block........................................................................................ 227

Blocking oversized files and emails ................................................................................ 228

Configuring limits for oversized files and email........................................................... 228

Exempting fragmented email from blocking.................................................................... 228
Viewing the virus list ....................................................................................................... 229

Web filtering ....................................................................................................... 231

General configuration steps ............................................................................................ 231
Content blocking ............................................................................................................. 232

Adding words and phrases to the Banned Word list ................................................... 232
Clearing the Banned Word list .................................................................................... 233
Backing up the Banned Word list................................................................................ 233
Restoring the Banned Word list .................................................................................. 233

URL blocking................................................................................................................... 235

Configuring FortiGate Web URL blocking................................................................... 235
Configuring FortiGate Web pattern blocking............................................................... 237

Configuring Cerberian URL filtering ................................................................................ 238

Installing a Cerberian license key ............................................................................... 238
Adding a Cerberian user ............................................................................................. 238
Configuring Cerberian web filter ................................................................................. 239
Enabling Cerberian URL filtering ................................................................................ 239

Script filtering .................................................................................................................. 240

Enabling script filtering................................................................................................ 240
Selecting script filter options ....................................................................................... 240

Exempt URL list .............................................................................................................. 241

Adding URLs to the URL Exempt list .......................................................................... 241
Downloading the URL Exempt List ............................................................................. 242
Uploading a URL Exempt List..................................................................................... 242

Email filter........................................................................................................... 245

General configuration steps ............................................................................................ 245
Email banned word list.................................................................................................... 246

Adding words and phrases to the email banned word list........................................... 246
Downloading the email banned word list .................................................................... 247
Uploading the email banned word list ......................................................................... 247