|
| Chapter 30 Content Filtering |
|
|
|
| Table 142 Configuration > | |
| LABEL | DESCRIPTION |
| Action When Category | Select Pass to allow users to access any requested web page if |
| Server Is Unavailable | the external content filtering database is unavailable. |
|
| Select Block to block access to any requested web page if the |
|
| external content filtering database is unavailable. |
|
| Select Warn to display a warning message before allowing |
|
| users to access any requested web page if the external content |
|
| filtering database is unavailable. |
|
| The following are possible causes for the external content |
|
| filtering server not being available: |
|
| • There is no response from the external content filtering |
|
| server within the time period specified in the Content Filter |
|
| Server Unavailable Timeout field. |
|
| • The ZyWALL is not able to resolve the domain name of the |
|
| external content filtering database. |
|
| • There is an error response from the external content filtering |
|
| database. This can be caused by an expired content filtering |
|
| registration (External content filtering’s license key is |
|
| invalid”). |
|
| Select Log to record attempts to access web pages that occur |
|
| when the external content filtering database is unavailable. |
|
|
|
| Select Categories |
|
|
|
|
| Select All Categories | Select this check box to restrict access to all site categories |
|
| listed below. |
|
|
|
| Clear All Categories | Select this check box to clear the selected categories below. |
|
|
|
| Security Threat | These are categories of web pages that are known to pose a |
| (unsafe) | threat to users or their computers. |
|
|
|
| Phishing | This category includes pages that are designed to appear as a |
|
| legitimate bank or retailer with the intent to fraudulently |
|
| capture sensitive data (i.e. credit card numbers, pin numbers). |
|
|
|
| Spyware/Malware | This category includes pages which distribute spyware and other |
| Sources | malware. Spyware and malware are defined as software which |
|
| takes control of your computer, modifies computer settings, |
|
| collects or reports personal information, or misrepresents itself |
|
| by tricking users to install, download, or enter personal |
|
| information. This includes |
|
| hijackers; dialers; intrusive advertising; any program which |
|
| modifies your homepage, bookmarks, or security settings; and |
|
| keyloggers. It also includes any software which bundles |
|
| spyware (as defined above) as part of its offering. Information |
|
| collected or reported is "personal" if it contains uniquely |
|
| identifying data, such as |
|
| number, IP address, etc. A siteis not classified as spyware if the |
|
| user is reasonably notified that the software will perform these |
|
| actions (that is, it alerts that it will send personal information, |
|
| be installed, or that it will log keystrokes). Note: Sites rated as |
|
| spyware should have a second category assigned with them. |
|
|
|
| 499 |
ZyWALL USG 20/20W User’s Guide | |
|
|