Contents

Logging attacks

222

Logging attack messages to the attack log

222

Reducing the number of NIDS attack log and email messages

222

Antivirus protection

225

General configuration steps

225

Antivirus scanning

226

File blocking

227

Blocking files in firewall traffic

227

Adding file patterns to block

227

Blocking oversized files and emails

228

Configuring limits for oversized files and email

228

Exempting fragmented email from blocking

228

Viewing the virus list

229

Web filtering

231

General configuration steps

231

Content blocking

232

Adding words and phrases to the Banned Word list

232

Clearing the Banned Word list

233

Backing up the Banned Word list

233

Restoring the Banned Word list

233

URL blocking

235

Configuring FortiGate Web URL blocking

235

Configuring FortiGate Web pattern blocking

237

Configuring Cerberian URL filtering

238

Installing a Cerberian license key

238

Adding a Cerberian user

238

Configuring Cerberian web filter

239

Enabling Cerberian URL filtering

239

Script filtering

240

Enabling script filtering

240

Selecting script filter options

240

Exempt URL list

241

Adding URLs to the URL Exempt list

241

Downloading the URL Exempt List

242

Uploading a URL Exempt List

242

Email filter

245

General configuration steps

245

Email banned word list

246

Adding words and phrases to the email banned word list

246

Downloading the email banned word list

247

Uploading the email banned word list

247

10

Fortinet Inc.

Page 10
Image 10
Fortinet 50A user manual Antivirus protection 225