Whitelisting & Blacklisting Equalizers Configured in Failover
Whitelists and blacklists are synched across all the peers in a failover configuration.
Blacklisting Categories
The following are the categories of potential malicious attackers:
l
Botnet
- "botnet"is a merged word, derived from "robot" and "network". Sometimes called a
"zombie army", it represents a number of computers on the web that, although their owners
are unaware of it, have been set up to forward transmissions such as spam or viruses to
other computers.
l
Phishing
- this is the act of trying to obtain confidential information from web users, typically
by sending an e-mail that looks as if it is from a legitimate organization, but contains a link
to a fake website that replicates the real one.
l
Anonymous Proxy
- anonymous proxies provide anonymity - users accessing websites through
an anonymous proxy can't easily be traced back to their original IP.They are typically used
to circumvent security policies, allowing users to access prohibited recreational, adult or
other non-business sites by tunneling this traffic over a regular or encrypted HTTP session.
l
Spam
- spam is normally defined as unsolicited, electronic "junk mail".
l
Other
- this is a category of IP addresses that has been identified as potentially malicious,
however, has not been categorized within the IRDB as one of the above categories.
By default, categories are not blocked and are allowed to pass. It is possible that you may want to
block an entire category or IPs in the IRDB.
Enter the category using the following format. Options are
botnet
,
anonymous_proxy
,
phishing
,
spam
, or
others
:
eqcli >
reputation block
category
Copyright © 2014 Coyote Point Systems, A Subsidiary of Fortinet, Inc.
All Rights Reserved.
255
Equalizer Administration Guide
Summary of Contents for Equalizer GX Series
Page 18: ......
Page 32: ...Overview 32 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 42: ......
Page 52: ......
Page 64: ......
Page 72: ......
Page 76: ......
Page 228: ......
Page 238: ......
Page 476: ......
Page 492: ......
Page 530: ......
Page 614: ......
Page 626: ......
Page 638: ......
Page 678: ......
Page 732: ...Using SNMP Traps 732 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 754: ......
Page 790: ......
Page 804: ......
Page 842: ......
Page 866: ......