网页内容过滤阻塞对 URL 的访问

 

下载 URL 阻塞列表

 

您可以将 URL 阻塞列表备份,方法是将它下载到管理员电脑上保存为文本文件。

1

进入 Web 过滤器 > URL 阻塞

2

选择 下载 URL 阻塞列表

 

FortiGate 将把 URL 阻塞列表下载到控制电脑上保存为一个文本文件。您可以指定保存

 

文本文件的位置和文件名。

上载 URL 阻塞列表

您可以用一个文本编辑器创建一个 URL 阻塞列表然后把这个文本文件上载到 FortiGate。在文本文件中每个 URL 占独立的一行。您可以在 URL 后面加上一个空格然 后加上一个 1 来启用它或者一个零 (0)来禁用这个 URL。如果您不添加不在文本文件 中添加这些信息,FortiGate 将自动启用您所上载的文本文件中的所有的 URL。

图 36: URL 阻塞列表的文本文件举例

www.badsite.com/index 1 www.badsite.com/products 1 182.63.44.67/index 1

您可以创建您自己的 URL 阻塞列表,也可以使用由第三方 URL 阻塞或者名单服务 创建的 URL 阻塞列表。例如,您可以从 http://www.squidguard.org/blacklist/ 下载 squidGuard 的名单,以此作为起点创建您自己的 URL 阻塞列表。 squidGuard 的机 器人每周三次搜索维网并在名单中添加新的 URL。您可以把 squidGuard 的名单 作为文本文件上载到 FortiGate,仅仅需要做一点小改动:删除每个名单顶部的注释 并把您需要的名单组合成一个单独的文本文件。

注意:当您上载一个新的 URL 阻塞列表时,用基于 Web 的管理程序对 URL 阻塞列表所做的任何改 动将丢失。是您可以先下载当前的 URL 阻塞列表,使用文本编辑器修改它,添加一些新的 URL 然后再把它上载到 FortiGate。

1

在文本编辑器中,创建要阻塞的 URL 和样板列表。

2

使用基于 Web 的管理程序,进入 Web 过滤器 > URL 阻塞

3

选择 上载 URL 阻塞列表

 

4

输入您的 URL 阻塞列表文件的路径和文件名,或者单击浏览然后在浏览器中定位文件。

5

单击 以上载文件到 FortiGate。

 

6

单击 返回 以显示更新过的 URL 阻塞列表。

 

 

URL 阻塞列表的每一页可以显示 100 个 URL。

 

7

您可以使用 向下翻页

向上翻页

按钮在 URL 阻塞列表中浏览。

8

您可以继续维护 URL 列表,修改文本文件然后再次上载它。

使用 Cerberian 网页过滤器

FortiGate 设备支持 Cerberian 网页过滤器。关于 Cerberian 网页过滤器的更进一 步信息请见 www.cerberian.com。

注意:如果您的 FortiGate 设备运行于主动 - 被动 HA 模式,在这个簇中的每个 FortiGate 设备 须有它自的 Cerberian 许可证。在主动 - 主动 HA 模式下不支持 Cerberian 网页过滤器。有 关 HA 的信息请见 第 59 页 高可用性

FortiGate-500 安装和配置指南

231

Page 243
Image 243
Fortinet 500 manual 下载 Url 阻塞列表, 上载 Url 阻塞列表, 使用 Cerberian 网页过滤器, 231

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.