| 
 | 
 | Chapter 30 Content Filtering | 
| 
 | 
 | 
 | 
| 
 | Table 142 Configuration >  | |
| 
 | LABEL | DESCRIPTION | 
| 
 | Action When Category | Select Pass to allow users to access any requested web page if | 
| 
 | Server Is Unavailable | the external content filtering database is unavailable. | 
| 
 | 
 | Select Block to block access to any requested web page if the | 
| 
 | 
 | external content filtering database is unavailable. | 
| 
 | 
 | Select Warn to display a warning message before allowing | 
| 
 | 
 | users to access any requested web page if the external content | 
| 
 | 
 | filtering database is unavailable. | 
| 
 | 
 | The following are possible causes for the external content | 
| 
 | 
 | filtering server not being available: | 
| 
 | 
 | • There is no response from the external content filtering | 
| 
 | 
 | server within the time period specified in the Content Filter | 
| 
 | 
 | Server Unavailable Timeout field. | 
| 
 | 
 | • The ZyWALL is not able to resolve the domain name of the | 
| 
 | 
 | external content filtering database. | 
| 
 | 
 | • There is an error response from the external content filtering | 
| 
 | 
 | database. This can be caused by an expired content filtering | 
| 
 | 
 | registration (External content filtering’s license key is | 
| 
 | 
 | invalid”). | 
| 
 | 
 | Select Log to record attempts to access web pages that occur | 
| 
 | 
 | when the external content filtering database is unavailable. | 
| 
 | 
 | 
 | 
| 
 | Select Categories | 
 | 
| 
 | 
 | 
 | 
| 
 | Select All Categories | Select this check box to restrict access to all site categories | 
| 
 | 
 | listed below. | 
| 
 | 
 | 
 | 
| 
 | Clear All Categories | Select this check box to clear the selected categories below. | 
| 
 | 
 | 
 | 
| 
 | Security Threat | These are categories of web pages that are known to pose a | 
| 
 | (unsafe) | threat to users or their computers. | 
| 
 | 
 | 
 | 
| 
 | Phishing | This category includes pages that are designed to appear as a | 
| 
 | 
 | legitimate bank or retailer with the intent to fraudulently | 
| 
 | 
 | capture sensitive data (i.e. credit card numbers, pin numbers). | 
| 
 | 
 | 
 | 
| 
 | Spyware/Malware | This category includes pages which distribute spyware and other | 
| 
 | Sources | malware. Spyware and malware are defined as software which | 
| 
 | 
 | takes control of your computer, modifies computer settings, | 
| 
 | 
 | collects or reports personal information, or misrepresents itself | 
| 
 | 
 | by tricking users to install, download, or enter personal | 
| 
 | 
 | information. This includes  | 
| 
 | 
 | hijackers; dialers; intrusive advertising; any program which | 
| 
 | 
 | modifies your homepage, bookmarks, or security settings; and | 
| 
 | 
 | keyloggers. It also includes any software which bundles | 
| 
 | 
 | spyware (as defined above) as part of its offering. Information | 
| 
 | 
 | collected or reported is "personal" if it contains uniquely | 
| 
 | 
 | identifying data, such as  | 
| 
 | 
 | number, IP address, etc. A siteis not classified as spyware if the | 
| 
 | 
 | user is reasonably notified that the software will perform these | 
| 
 | 
 | actions (that is, it alerts that it will send personal information, | 
| 
 | 
 | be installed, or that it will log keystrokes). Note: Sites rated as | 
| 
 | 
 | spyware should have a second category assigned with them. | 
| 
 | 
 | 
 | 
| 
 | 499 | 
| ZyWALL USG 20/20W User’s Guide | |
| 
 | 
 |