Contents
10 Fortinet Inc.
Logging attacks............................................................................ ................................... 222
Logging attack messages to the attack log........................................... ...................... 222
Reducing the number of NIDS attack log and email messages.................................. 222
Antivirus protection........................................................................................... 225
General configuration steps............................................... ............................................. 225
Antivirus scanning........................................................................... ................................ 226
File blocking................................................ .................................................................... 227
Blocking files in firewall traffic ..................................................................................... 227
Adding file patterns to block.................................................. ...................................... 227
Blocking oversized files and emails................ ................................................................ 228
Configuring limits for oversized files and email.................................................. ......... 228
Exempting fragmented email from blocking.................................................................... 228
Viewing the virus list ....................................................................................................... 229
Web filtering ....................................................................................................... 231
General configuration steps............................................... ............................................. 231
Content blocking............ ................................................................................................. 232
Adding words and phrases to the Banned Word list................... ................................ 232
Clearing the Banned Word list .................................................................................... 233
Backing up the Banned Word list...................................................... .......................... 233
Restoring the Banned Word list .................................................................................. 233
URL blocking................................................................................................................ ... 235
Configuring FortiGate Web URL blocking................................ ................................... 235
Configuring FortiGate Web pattern blocking............................................... ................ 237
Configuring Cerberian URL filtering................................ ................................................ 238
Installing a Cerberian license key ............................................................................... 238
Adding a Cerberian user................................... .......................................................... 238
Configuring Cerberian web filter ................................................................................. 239
Enabling Cerberian URL filtering ................................................................................ 239
Script filtering........ .......................................................................................................... 240
Enabling script filtering...................................................... .......................................... 240
Selecting script filter options ....................................................................................... 240
Exempt URL list.......... .................................................................................................... 241
Adding URLs to the URL Exempt list............................. ............................................. 241
Downloading the URL Exempt List ............................................................................. 242
Uploading a URL Exempt List.................................................. ................................... 242
Email filter........................................................................................................... 245
General configuration steps............................................... ............................................. 245
Email banned word list................................................................................. ................... 246
Adding words and phrases to the email banned word list........................................... 246
Downloading the email banned word list .................................................................... 247
Uploading the email banned word list......................... ................................................ 247