Contents
12 Fortinet Inc.
URL blocking................................................................................................................ ... 269
Using the FortiGate web filter ..................................................................................... 269
Using the Cerberian web filter............................................................................... ...... 272
Script filtering........ .......................................................................................................... 274
Enabling the script filter...................................................................................... ......... 274
Selecting script filter options ....................................................................................... 274
Exempt URL list.......... .................................................................................................... 275
Adding URLs to the exempt URL list .......................................................................... 275
Email filter........................................................................................................... 277
General configuration steps............................................... ............................................. 277
Email banned word list................................................................................. ................... 278
Adding words and phrases to the banned word list .................................................... 278
Email block list............... ................................................................................................. 279
Adding address patterns to the email block list........................................................... 279
Email exempt list............................................................................. ................................ 279
Adding address patterns to the email exempt list ....................................................... 280
Adding a subject tag ....................................................................................................... 280
Logging and reporting....................................................................................... 281
Recording logs............................................ .................................................................... 281
Recording logs on a remote computer........................................ ................................ 282
Recording logs on a NetIQ WebTrends server........ ................................................... 282
Recording logs on the FortiGate hard disk ................................................................. 283
Recording logs in system memory................................................. ............................. 284
Filtering log messages.......................................... .......................................................... 284
Configuring traffic logging........... .................................................................................... 286
Enabling traffic logging....................................................................................... ......... 286
Configuring traffic filter settings............................................................................. ...... 287
Adding traffic filter entries ........................................................................................... 288
Viewing logs saved to memory................ ....................................................................... 289
Viewing logs................................................................ ................................................ 289
Searching logs ............................................................................................................ 289
Viewing and managing logs saved to the hard disk........................................................ 290
Viewing logs................................................................ ................................................ 290
Searching logs ............................................................................................................ 290
Downloading a log file to the management computer.............................................. ... 291
Deleting all messages in an active log..................................................... ................... 291
Deleting a saved log file........................................................ ...................................... 292
Configuring alert email............................................. ....................................................... 292
Adding alert email addresses................................................................................... ... 292
Testing alert email....................................................................................... ................ 293
Enabling alert email .................................................................................................... 293