URLForbidden
RestrictedSiteNotice
ReclassifyURL
To perform customization it is necessary to first create a new, named ALG Banner Files object.
This new object automatically contains a copy of all the files in the Default ALG Banner Files
object. These new files can then be edited and uploaded back to NetDefendOS. The original Default
object cannot be edited. The following example goes through the necessary steps.
Example 6.18. Editing Content Filtering HTTP Banner Files
This example shows how to modify the contents of the URL forbidden HTML page.
Web Interface
1.
Go to Objects > Banner files > Add > ALG Banner Files
2.
Enter a name such as new_forbidden and press OK
3.
The dialog for the new set of ALG banner files will appear
4.
Click the Edit & Preview tab
5.
Select URLForbidden from the Page list
6.
Now edit the HTML source that appears in the text box for the Forbidden URL page
7.
Use Preview to check the layout if required
8.
Press Save to save the changes
9.
Click OK to exit editing
10. Go to User Authentication > User Authentication Rules
11. Select the relevant HTML ALG and click the Agent Options tab
12. Set the HTTP Banners option to be new_forbidden
13. Click OK
14. Go to Configuration > Save & Activate to activate the new file
15. Press Save and then click OK
The new file will be uploaded to NetDefendOS
Note
In the above example, more than one HTML file can be edited in a session but the
Save button should be pressed to save any edits before beginning editing on another
file.
Uploading with SCP
It is possible to upload new HTTP Banner files using SCP. The steps to do this are:
1.
Since SCP cannot be used to download the original default HTML, the source code must be
first copied from the WebUI and pasted into a local text file which is then edited using an
appropriate editor.
2.
A new ALG Banner Files object must exist which the edited file(s) is uploaded to. If the
object is called mytxt, the CLI command to create this object is:
gw-world:/> add HTTPALGBanners mytxt
6.3.4. Dynamic Web Content Filtering
Chapter 6. Security Mechanisms
257
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...