Note: Only domains can be targeted with HTTPS
Due to the encrypted nature of HTTPS, it is only possible to whitelist or blacklist at the
domain level. For example, only the form
*.example.com/*
can be used for blacklisting
or whitelisting with HTTPS. Using the form
*.example.com
is insufficient.
If
*.example.com/server
is specified for HTTPS traffic, this will not work and the
matching URLs will not be caught.
URL Filtering using an IP Policy
When enabling URL filtering using an
IP Policy
object, a different set of steps is used:
•
Create a
Web Profile
object.
•
Add one or more
URL Filter
objects as children of the
Web Profile
to define URLs that are
whitelisted or blacklisted. Wildcarding can be used when specifying the URLs.
•
Create a new
Service
object for HTTP and/or HTTPS. A predefined object could be used for
this purpose. This
Service
object must have its Protocol property set to be
HTTP
. For HTTPS,
the
Service
must include the port number 443 for HTTPS.
•
Use the
Service
object with an IP policy that filters the relevant traffic.
•
Set the
Web Profile
property of the
IP Policy
to the profile created earlier.
Example 6.20. URL Filtering Using IP Rules
This example shows the use of static content filtering where certain URLs are to be blacklisted or
white listed.
In this small scenario, a general surfing policy prevents users from downloading
.exe
files from
any website. However,
.exe
files downloaded from the
www.example.com
website are to be an
exception to this rule.
Command-Line Interface
Start by adding an HTTP ALG in order to filter HTTP traffic:
gw-world:/> add ALG ALG_HTTP my_content_filter
Change the CLI context to be the ALG:
gw-world:/> cc ALG ALG_HTTP my_content_filter
Then add an HTTP ALG URL as a child to blacklist a URL:
gw-world:/my_content_filter> add ALG_HTTP_URL
URL=*/*.exe
Action=Blacklist
Make an exception from the blacklist by adding a whitelisted URL:
gw-world:/my_content_filter> add ALG_HTTP_URL
Chapter 6: Security Mechanisms
506
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...