SonicWALL SonicWALL UTM Appliance manual

Page 37

Step 3: Create a friendly name for the new policy.

Step 4: Navigate to the URL List tab and select the categories you want to block or allow for this policy.

Step 5: Navigate to the Settings Tab and select if you want to enforce allowed domains, forbidden domains, or keywords in domains. You can also choose to enforce Safe Search (Safe Search enforcement is included with SonicOS 5.2 or higher.

NOTE: Previous versions of SonicOS will require a custom Application Firewall policy. Please refer to the Application Firewall guide for steps on creating the policy). Safe Search Enforcement prevents users from changing default search engine results from safe filtered results to unrestricted content. For example, images that are found on images.google.com are actually cached on Google’s servers and not hosted on 3rd party servers. CFS has no way of determining if those images are forbidden since they reside at google.com. Since it is impractical for most environments to block access to Google or other search engines, enforcing safe search prevents the user from changing the default filtered search engine results. For example, if one tried to change the Google search preferences to “Do not filter my search results” as shown below, they would be presented with the Sonicwall block page and the setting would not be saved. You can however move the

37

Image 37
Contents Contents Page Integrating LDAP/Active Directory with Sonicwall UTM Configuring the CA on the Active Directory ServerImporting the CA Certificate onto the SonicWALL Configuring the SonicWALL Appliance for LdapPage Page Page Page Page Page Page Enable Radius to Ldap Relay Enables this feature Authentication Page Page Page Creating Firewall Rules with Ldap Groups/Users SonicOS Options That Leverage Groups/UsersPage Page Firewall Rules with Bandwidth Management & Logging Page Blocking Domains with Firewall Rules Blocking Websites Domain Names for Groups/UsersPage Page Navigate to Firewall Access Rules Create a rule to allow Http traffic for your allowed lists Do the same for Https Create the deny rules for Http and Https Firewall rules should now look like the below picture Blocking Https SSL Domains with SSL Control Configuring a SSL Blacklist and Whitelist Page Applying Different CFS Policies to Groups Page Creating Custom CFS Policies Navigate to the Policy tab and add a new CFS policy Page Page Page Http//$$fwinterface$$/$#SWLSTYLESCSS#$ Variables for Custom Block Page in SonicOSAdvanced Sample Code for SonicOS Basic Sample Code for SonicOSPage Page Sample Code for SonicOS 5.1 or Earlier Sample JavaScript Code for SonicOSApplying Application Firewall Polices to Groups/Users Page Page Page Page Tightening Control over the Browsing Behavior of Users Blocking IM Traffic Categorically Applying Granular IM Policies Global VPN Client GVC Applying VPN Access Policies to Groups/UsersPage SSL-VPN NetExtender Guest Services Wireless Guest Services