
Contents
Logging attacks | 222 |
Logging attack messages to the attack log | 222 |
Reducing the number of NIDS attack log and email messages | 222 |
Antivirus protection | 225 |
General configuration steps | 225 |
Antivirus scanning | 226 |
File blocking | 227 |
Blocking files in firewall traffic | 227 |
Adding file patterns to block | 227 |
Blocking oversized files and emails | 228 |
Configuring limits for oversized files and email | 228 |
Exempting fragmented email from blocking | 228 |
Viewing the virus list | 229 |
Web filtering | 231 |
General configuration steps | 231 |
Content blocking | 232 |
Adding words and phrases to the Banned Word list | 232 |
Clearing the Banned Word list | 233 |
Backing up the Banned Word list | 233 |
Restoring the Banned Word list | 233 |
URL blocking | 235 |
Configuring FortiGate Web URL blocking | 235 |
Configuring FortiGate Web pattern blocking | 237 |
Configuring Cerberian URL filtering | 238 |
Installing a Cerberian license key | 238 |
Adding a Cerberian user | 238 |
Configuring Cerberian web filter | 239 |
Enabling Cerberian URL filtering | 239 |
Script filtering | 240 |
Enabling script filtering | 240 |
Selecting script filter options | 240 |
Exempt URL list | 241 |
Adding URLs to the URL Exempt list | 241 |
Downloading the URL Exempt List | 242 |
Uploading a URL Exempt List | 242 |
Email filter | 245 |
General configuration steps | 245 |
Email banned word list | 246 |
Adding words and phrases to the email banned word list | 246 |
Downloading the email banned word list | 247 |
Uploading the email banned word list | 247 |
10 | Fortinet Inc. |