22
SonicWall ® Management Services Content Filter Administration

Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

SonicWall® Management Services Content FilterAdministration

Page 2: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Management Services Content Filter Administration

Contents

1

2

Configuring Content Filtering Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

About CFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

CFS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Google Safe Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Three Approaches to Content Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Configuring CFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Defining Trusted Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Defining Block Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

CFS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Creating a Custom List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Adding Domains or Keywords to Custom List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Removing Domains or Keywords to Custom List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

CFS Exclusion List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

CFS IP Address Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

CFS Custom Category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Web Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Configuring N2H2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Configuring Websense Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

SonicWall Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

About This Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Contents

Page 3: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

1

Configuring Content Filtering Service

This document covers configuration of legacy SonicWall Content Filtering Service (SonicWall CFS) and two third-party content filtering database services, Websense Enterprise and N2H2.

About CFSThe SonicWall Content Filtering Service (CFS) delivers content filtering enforcement for educational institutions, businesses, libraries, and government agencies. With Content Filter policies and objects, you can control the websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested websites against massive cloud databases that contain millions of rated URIs, IP addresses, and websites.

CFS SettingsTo configure the CFS settings:

1 Navigate to MANAGE | SECURITY > Content Filter > Settings.

NOTE: The CFS configuration pages described in this document apply only to appliances running SonicOS 6.2.5 Enhanced and below.

NOTE: Proper licensing must be in place to support the legacy CFS described here.

Management Services Content Filter Administration

Configuring Content Filtering Service3

Page 4: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

2 Under CONTENT FILTER TYPE, choose the following filters:

• Content Filter System

• N2H2

• Websense Enterprise

• Enforce Google Safe Search

Google Safe SearchThe three main approaches are mutually exclusive, but Google Safe Search works with all of them. Enabling Google Safe Search enables a search feature which filters out offensive content from Google searches.

Three Approaches to Content FilteringThe following subsections detail configuration of content filtering with SonicOS tools available before release of SonicOS Enhanced 6.2.5.

Additional sections detail configuration of third-party database approaches:

• Configuring N2H2

• CFS IP Address Range

Configuring CFSNavigate to MANAGE | PRIVACY > Content Filter > Settings. To configure CFS with utilities available in SonicOS Enhanced 6.2.5 and earlier, first enable Content Filter System in the Content Filter Type section.

The next choice is whether to define application of CFS across your network based on Zones, or on App Rules.

For reference, App Rules are defined in SETUP | Firewall > App Rules, while enforcement by users is defined in SETUP | Users > Local Groups | CONFIGURE for SonicOS 6.2 and earlier. Enforcement by zone is applied with a check box in SETUP | Network > Zones | CONFIGURE.

NOTE: Configuration settings on this Settings page apply to N2HS and Websense Enterprise configurations as well as Content Filter Service.

Management Services Content Filter Administration

Configuring Content Filtering Service4

Page 5: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

You can then apply CFS and restrictions on Web features (Java/Active X/cookies) for different network interfaces areas: LAN/Workport and DMZ/HomePort/WAN/OPT.

Defining Trusted DomainsThe next section of SECURITY | Content Filter > Settings allows definition of specific domains to not be subjected to content filtering. Note that the check box over the list allows web features (Java, Active X, and cookies) to be enabled and disabled for these domains.

To enter the domain name, click on Add, then enter the names inter-spaced with semi-colons, and no spaces.

Note that lists of domains to be trusted may be imported. Click on Import... .

Complete all of the changes by clicking on Update. Click on Reset to return to the state of settings prior to your session.

Management Services Content Filter Administration

Configuring Content Filtering Service5

Page 6: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Defining Block PagesAs the display at Content Filter > Settings shows, there are two different methods of defining block pages.

• WEB PAGE TO DISPLAY WHEN BLOCKING applies to units running SonicOS Enhanced 5.2 and above.

• MESSAGE TO DISPLAY WHEN BLOCKING applies to units running SonicOS Enhanced 5.1 and below.

CFS SettingsThis section supports settings for SonicWall CFS, N2H2, and Websense Enterprise.

These consist of:

• Enable HTTPS — Select this checkbox to enable HTTPS content filtering. HTTPS content filtering is IP- and host name-based, and does not inspect the URL. While HTTP content filtering can perform redirects to enforce authentication or provide a block page, HTTPS filtered pages are blocked silently. You must provide the IP address for any HTTPS websites to be filtered.

Management Services Content Filter Administration

Configuring Content Filtering Service6

Page 7: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

• Enable CFS Server Failover — Select this checkbox to provide CFS server redundancy and high availability.

• Enable CFS Wire Mode — Select this checkbox to enable CFS for Wire Mode deployments.

• If Sever is Unavailable for (seconds) — Sets the amount of time after the content filter server is unavailable before the firewall takes action to either block access to all Web sites or allow traffic to continue to all Web sites. The default is 5 seconds.

• Block traffic to all websites — Select this feature if you want the firewall to block access to all websites until the content filter server is available.

• Allow traffic to all websites — Select this feature if you want to allow access to all websites when the content filter server is unavailable. If Forbidden URI (Universal Resource Identifier) and Forbidden Keywords are enabled, however, they are still blocked. This option is selected by default.

• If URL marked forbidden — If you have enabled blocking by Categories and the URL is blocked by the server, there are two options available that can be selected by default:

• Block access to URL — Selecting this option prevents the browser from displaying the requested URL to the user.

• Log access to URL — Selecting this option records the requested URL in the log file.

• Custom list searching order — you can specify which list is searched first:

• “Allowed URL” first (default)

• “Forbidden URL” first

URL CacheThe URL Cache section allows you to configure the URL cache size on the firewall. The default size is 768 KBs.

Click on Update, or to restore settings to before this session, click on Reset.

Web Usage ConsentThe Consent section allows you to enforce content filtering on designated computers and provide optional filtering on other computers. Consent can be configured to require the user to agree to the terms outlined in an Acceptable Use Policy window before Web browsing is allowed.

NOTE: If the server is unavailable, the firewall can allow access to websites in the cache memory. This means that by selecting the Block traffic to all Web sites checkbox, the firewall only blocks websites that are not in the cache memory.

NOTE: A larger URL cache size can noticeably improve internet browsing response times.

Management Services Content Filter Administration

Configuring Content Filtering Service7

Page 8: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

To enable the Consent properties, check the box next to Require Consent.

• Maximum Web Usage (minutes) — In an environment where there are more users than computers, such as a classroom or library, time limits are often imposed. The firewall can be used to remind users when their time has expired by displaying the page defined in the Consent page URL field. Enter the time limit, in minutes, in the Maximum Web usage field. The minimum time is 1 minute, the maximum is 9999, and the default is 15. Entering a value of 0 (zero) disables this feature.

• Consent Page URL (optional filtering) — When users open a Web browser on a computer requiring consent, they are shown a consent page and given the option to access the internet with or without content filtering. This page must reside on a Web server and be accessible as a URL by users on the network. It can contain the text from or links to an Acceptable Use Policy (AUP). This page must contain links to two pages contained in the firewall, which, when selected, tell the firewall if the user wishes to have filtered or unfiltered access:

• Unfiltered access link must be 192.168.168.168/iAccept.html

• Filtered access link must be 192.168.168.168/iAcceptFilter.html

• Consent Accepted URL (filtering off)— When a user accepts the terms outlined in the Consent page and chooses to access the internet without the protection of Content Filtering, they are shown a Web page confirming their selection. Enter the URL of this page in the Consent Accepted (filtering off) field.

• Consent Accepted URL (filtering on) — When a user accepts the terms outlined in the Consent page and chooses to access the internet with the protection of Content Filtering, they are shown a Web page confirming their selection. Enter the URL of this page in the Consent Accepted (filtering on) field.

• Consent Accepted Redirect Page URL (filtering off) — optional: If a URL is entered in this field, when a user accepts the terms in the Consent page and chooses to have unfiltered access, they are redirected to this URL.

IMPORTANT: Use your SonicWall LAN IP address instead of 192.168.168.168.

IMPORTANT: All of the following pages must reside on a Web server and be accessible as a URL by users on the network.

Management Services Content Filter Administration

Configuring Content Filtering Service8

Page 9: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Mandatory IP FilteringAt the bottom of the Content Filter > Settings page is a Mandatory IP Filtering section.

When a user opens a Web browser on a computer using mandatory content filtering, a consent page is displayed. You must create the Web page that appears when the Web browser is opened. The page can contain text from an Acceptable Use Policy and notification that violations are logged or blocked.

This Web page must reside on a Web server and be accessible as a URL by users on the LAN. This page must also contain a link to a page contained in the firewall that tells the device that the user agrees to have filtering enabled. The link must be 192.168.168.168/iAcceptFilter.html, where the SonicWall LAN IP address is used instead of 192.168.168.168.

Enter the URL of this page in the Consent Page URL (mandatory filtering) field and click OK. When the firewall is updated, a message confirming the update is displayed at the bottom of the Web browser window.

Complete Settings Click on Update, or to restore settings to before this session, click on Reset.

Creating a Custom List

Navigate to Content Filter > Custom List. You can customize your URL list to include allowed domains, forbidden domains, and blocked keywords. By customizing your URL list, you can include specific domains to be accessed, blocked, and include specific keywords to block sites.

Custom List of the SonicWall CFS allows an administrator to enter specific domain names to be allowed or blocked. Custom List also allows you to enter keywords which are useful to block access to any website whose URL contains any listed keyword. Keyword blocking also prevents the uploading of any form requests that contain a listed keyword, such as a website search.

NOTE: The settings on this page do not apply if N2H2 or Websense data bases are selected on the Settings page.

Management Services Content Filter Administration

Configuring Content Filtering Service9

Page 10: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

In the Settings section of this page, there are three check boxes:

• Enable Allowed/Forbidden Domains — Enables domain discrimination as defined below.

• Enable Keyword Blocking — Prevents access to websites with keywords in URL or search.

• Disable all web traffic except for Allowed Domains — Restricts access to allowed domains only.

Selecting the Disable all web traffic except for Allowed Domains check box causes the SonicWall security appliance to allow Web access only to sites on the Allowed Domains list. With careful screening, this can be nearly 100% effective at blocking pornography and other objectionable material.

Adding Domains or Keywords to Custom ListTo allow access to a website that is blocked by the Content Filter List:

1 Click Add in the Allowed URI section of the Custom List page. The Add Allowed URI dialog box displays.

2 Enter the host name, such as www.ok-site.com, into the URI field. Use semicolon (;) as delimiter without spaces to list more than one URI.

Management Services Content Filter Administration

Configuring Content Filtering Service10

Page 11: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

3 Click Update. You can add up to 1,024 entries to the Allowed URI list by repeating the above steps for each entry.

4 Click on Import to upload a .txt file with one Allowed URI per line.

5 To block a website that is not blocked by the Content Filter Service, click Add in the Forbidden URI section. The Add Forbidden URI dialog box displays.

6 Enter the host name, such as www.bad-site.com, into the Forbidden URI field.

7 Click Update. You can add up to 1,024 entries to the Forbidden URI list by the above steps.

8 Click on Import to upload a .txt file with one Forbidden URI per line.

9 To enable blocking using Keywords, click Add under Keywords. The Add Keyword entry dialog displays.

10 Enter the keyword to block in the Keyword field.

11 Click Update. You can add up to 100 entries to the Keyword blocking list by repeating the above steps.

Removing Domains or Keywords to Custom ListTo remove a trusted or forbidden domain, select it from the appropriate list, and click Delete.

CAUTION: Do not include the prefix http:// in either the Allowed URI or Forbidden URI fields. All subdomains are affected. For example, entering yahoo.com applies to mail.yahoo.com and my.yahoo.com.

Management Services Content Filter Administration

Configuring Content Filtering Service11

Page 12: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Policies

1 Navigate to the SECURITY | Content Filter > Policies page.

2 Click on Add to get the add content filter dialog box.

3 Enter the information below in the text fields provided in the dialog box.

• Name — Provide a policy name.

• Allowed URI List — Select a URI list object, accessing all the URIs in this object will be allowed.

• Forbidden URI List — Select a URI list object, accessing all the URIs in this object will be forbidden.

NOTE: The settings on this page do not apply if N2H2 or Websense data bases are selected on the Settings page.

Management Services Content Filter Administration

Configuring Content Filtering Service12

Page 13: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

• Operation for Forbidden URI — Select a value in drop list to control searching URI in. Allow URI list firstly, or Forbidden URI list firstly.

• Under CATEGORY CONFIGURATION, choose the content CATEGORY you want to Block or Allow under OPERATION.

• Under Operation, choose Allow from the drop-down list. You can also click the Set to All or Default buttons.

CFS Exclusion List

The CFS exclusion list allows you to specify an IP address or IP address range that is excluded from website blocking. The settings for this page apply to units running SonicOS Enhanced 6.2.5 and below.

To configure the CFS Exclusion List:

1 Navigate to SECURITY | Content Filter > CFS Exclusion List.

2 Under CFS EXCLUSION RANGE SETTINGS, click Do not bypass CFS blocking for the Administrator If you do not want CFS blocking to bypass the Administrator.

3 Click Enable CFS Exclusion list to enable CFS block list exclusions.

4 To exclude an address object from CFS only, click CFS only.

5 To exclude an address object from CFS and user authentication in an access rule, click CFS and user authentication in access rule.

NOTE: The Policies page applies only to units running SonicOS 6.2.5 Enhanced and below.

NOTE: The settings on this page do not apply if N2H2 or Websense data bases are selected on the Settings page.

Management Services Content Filter Administration

Configuring Content Filtering Service13

Page 14: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

6 Click Update.

7 Select an address object from the drop-down list.

8 Under CFS EXCLUSION IP ADDRESS RANGE SEARCH, choose the following:

• In the text fields next to the search icon, do the following:

• Select From Address or To Address to indicate the beginning or ending IP addresses.

• Select Equals, Starts with, Ends with, or Contains from the drop-down list.

• Enter Search text in the text field provided.

• Click Search or Clear.

9 Under the CFS EXCLUSION IP ADDRESS RANGE table, check the IP addresses under the FROM ADDRESS and TO ADDRESS columns.

• To configure the IP addresses, use the CONFIGURE column.

• Click Add and the CFS RANGE dialog window displays. Enter the IP address From and the IP Address To in the text fields provided and click Update.

• Click Delete and then click OK in the dialog window that displays to delete the selected CFS Exclude Range.

CFS IP Address RangeAppliances with SonicWall CFS can assign specific CFS policies to ranges of IP addresses. This provides the ability to segment CFS policies within a single zone. The settings in the CFS IP Address Range page only apply to units running between SonicOS 5.8 and SonicOS 6.2.5 Enhanced.

To configure the CFS IP Address Range:

1 Navigate to SECURITY | Content Filter > CFS Address Range.

NOTE: Steps 4 and 5 apply only to unites running SonicOS 5.8.2 Enhanced and above.

NOTE: Step 7 applies only to units running SonicOS 5.9 Enhanced.

NOTE: Multiple IP address ranges can be deleted at the same time by selecting multiple check boxes.Step 9 applies only to units running SonicOS Enhanced 6.1 and SonicOS Enhanced 5.8 or older.

NOTE: The settings on this page do not apply if N2H2 or Websense data bases are selected on the Settings page.

Management Services Content Filter Administration

Configuring Content Filtering Service14

Page 15: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

2 Under CFS POLICY PER IP ADDRESS RANGE SETTINGS, select the Enable Policy per IP Address Range checkbox.

3 Click Add.

• The CFS IP ADDRESS RANGE window displays.

• Enter the first IP address range in the CFS Address Object field.

• Select the CFS policy to apply to this IP address range in the CFS Policy drop-down list.

• Optionally add a comment about this IP address range in the Comment field.

• Click Update.

4 Under CFS POLICY PER IP ADDRESS RANGE SEARCH, choose the following:

• In the text fields next to the search icon, do the following:

• Select CFS Policy or Address Object from the drop-down list.

• Select Equals, Starts with, Ends with, or Contains from the drop-down list.

• Enter Search text in the text field provided.

• Click Search or Clear.

• Under the CFS POLICY PER IP ADDRESS RANGE table, Click Add and the CFS IP ADDRESS RANGE dialog window displays.

• Enter the first IP address range in the CFS Address Object field.

• Select the CFS policy to apply to this IP address range in the CFS Policy drop-down list.

• Optionally add a comment about this IP address range in the Comment field.

• Click Update.

NOTE: Login to any computer within the IP range specified and try to access the website allowed by the new custom policy. You can also try to go to restricted websites.

Management Services Content Filter Administration

Configuring Content Filtering Service15

Page 16: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

CFS Custom CategoryYou can create a CFS custom category to create custom domain name entries for the existing CFS rating categories. This allows for the insertion of custom CFS-managed content into the existing category structure.

To configure the CFS Custom Category settings:

1 Navigate to SECURITY | Content Filter > CFS Custom Category.

2 Under the CFS CUSTOM CATEGORY SETTINGS, select the Enable CFS Custom Category checkbox.

• Click Update or Reset.

3 Under CFS CUSTOM CATEGORY SEARCH, choose the following:

• In the text fields next to the search icon, do the following:

• Select Name or Category from the drop-down list.

• Select Equals, Starts with, Ends with, or Contains from the drop-down list.

• Enter Search text in the text field provided.

• Click Search or Clear.

4 Under CFS CUSTOM CATEGORY, click Add or Delete.

NOTE: The settings on this page do not apply if N2H2 or Websense data bases are selected on the Settings page.

NOTE: The CFS Custom Category settings apply only to units running between SonicOS 5.6 and SonicOS 6.2.5 Enhanced.

Management Services Content Filter Administration

Configuring Content Filtering Service16

Page 17: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Web FeaturesYou can restrict Web features and block several applications to improve your network security and prevent harm from happening to your system.

To configure your Web Features settings:

1 Navigate to SECURITY | Content Filter > Web Features.

Under RESTRICT WEB FEATURES, you can block the applications below:

• ActiveX — A programming language that embeds scripts in Web pages. Malicious programmers can use ActiveX to delete files or compromise security. Select the ActiveX check box to block ActiveX controls.

• Java — Used to download and run small programs, called applets, on Web sites. It is safer than ActiveX as it has built-in security mechanisms. Select the Java check box to block Java applets from the network.

• Cookies — Used by Web servers to track Web usage and remember user identity. Cookies can also compromise users' privacy by tracking Web activities. Select the Cookies check box to disable Cookies.

• Access to HTTP Proxy Servers — When a proxy server is located on the WAN, LAN users can circumvent content filtering by pointing their computer to the proxy server. Check this box to prevent LAN users from accessing proxy servers on the WAN.

• Known Fraudulent Certificates — Blocks access to Web content that originated from a known fraudulent certificate. Digital certificates help verify that Web content originated from an authorized party.

NOTE: The Web Features settings apply only to units running SonicOS 6.2.5 Enhanced and below.

Management Services Content Filter Administration

Configuring Content Filtering Service17

Page 18: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Configuring N2H2To configure your N2H2 content filtering settings:

1 Navigate to SECURITY | Content Filter > N2H2.

2 Under SETTINGS, enter the information and make your choices next to the text fields, check boxes or radio buttons provided.

• Server Host Name or IP — Designate the N2H2 server.

• Listen Port and Reply Port — Ports for server access.

• User Name — To support server access authentication.

• URL Cache Size — Defines number of URLs to be filtered that are cached on the appliance.

• If user is unavailable for __ seconds — Defines when N2H2 server is defined as unavailable.

• Block traffic to all web sites — If filtering sever is unavailable, access to all web sites other than those marked as OK in cache is blocked.

• Allow traffic to all web sites — If filtering server is unavailable, all traffic is allowed, and now web sites are blocked.

• Block Access to URL — Selecting this option prevents the browser from displaying the requested URL to the user.

• Log Access to URL — Selecting this option records the requested URL in the log file.

NOTE: The N2H2 settings apply only to units running SonicOS 6.2.5 Enhanced and below.

Management Services Content Filter Administration

Configuring Content Filtering Service18

Page 19: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

Configuring Websense EnterpriseWebsense Enterprise is a third-party internet filtering package that allows you to use internet content filtering through SonicWall.

To configure the Websense Enterprise settings:

1 Navigate to SECURITY | Content Filter > Websense Enterprise.

2 Under SETTINGS, enter the information and make your choices next to the text fields, check boxes, or radio buttons provided.

• Server Host Name or IP — Designate the Websense server.

• Server Port — Port for server access.

• User Name — To support server access authentication.

• Enable Websense probe monitoring — Enables the firewall to probe for the presence of a Websense server. Use the following options to configure the Websense probe settings:

• Check Server every — Enter the amount of time (in seconds) that the firewall sends a probe to the Websense server.

• Deactivate Websense after — Enter the number of missed probes before the firewall deactivates the Websense feature.

• Reactivate Websense after — Enter the number of successful probes needed before the firewall will reactivate the Websense feature.

• Check Sever every__ seconds — Defines when Websense server is defined as unavailable.

• Deactivate after __ missed probes — Defines server timeout.

• Reactivate Websense after __successful probes — Defines server active definition.

• If user is unavailable for __ secs. — Defines user timeout.

• Block traffic to all web sites — If filtering sever is unavailable, access to all web sites other than those marked as OK in cache is blocked.

Management Services Content Filter Administration

Configuring Content Filtering Service19

Page 20: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

• Allow traffic to all web sites — If filtering server is unavailable, all traffic is allowed, and now web sites are blocked.

• URL Cache Size — Defines the size of the on-appliance URL cache.

Management Services Content Filter Administration

Configuring Content Filtering Service20

Page 21: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

2

SonicWall Support

Technical support is available to customers who have purchased SonicWall products with a valid maintenance contract and to customers who have trial versions.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. To access the Support Portal, go to https://www.sonicwall.com/support.

The Support Portal enables you to:

• View knowledge base articles and technical documentation

• View video tutorials

• Access MySonicWall

• Learn about SonicWall professional services

• Review SonicWall Support services and warranty information

• Register for training and certification

• Request technical support or customer service

To contact SonicWall Support, visit https://www.sonicwall.com/support/contact-support.

Management Services Content Filter Administration

SonicWall Support21

Page 22: Management Services Content Filter - SonicWall · websites students and employees access using their IT-issued computers while behind the organization’s firewall. CFS compares requested

About This Document

Management Services Content Filter AdministrationUpdated - April 2019232-004730-00

Copyright © 2019 SonicWall Inc. All rights reserved.

SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners

The information in this document is provided in connection with SonicWall Inc. and/or its affiliates’ products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of SonicWall products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. SonicWall Inc. and/or its affiliates do not make any commitment to update the information contained in this document.

For more information, visit https://www.sonicwall.com/legal.

End User Product Agreement

To view the SonicWall End User Product Agreement, go to: https://www.sonicwall.com/en-us/legal/license-agreements.

Open Source Code

SonicWall is able to provide a machine-readable copy of open source code with restrictive licenses such as GPL, LGPL, AGPL when applicable per license requirements. To obtain a complete machine-readable copy, send your written requests, along with certified check or money order in the amount of USD 25.00 payable to “SonicWall Inc.”, to:

General Public License Source Code Request SonicWall Inc. Attn: Jennifer Anderson1033 McCarthy BlvdMilpitas, CA 95035

Legend

WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.

CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.

IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.

Management Services Content Filter Administration

SonicWall Support22