72
C
HAPTER
5: S
ETTING UP
W
EB
F
ILTERING
Enable Filtering on Custom List
Use this to enable or disable the custom filtering without re-entering all
site names. You do not have to re-enter names when the Web Site Filter
is updated each week, as the custom list does not expire.
Disable all Web traffic except for Trusted Domains
Click the
Disable Web traffic except for Trusted Domains
check box to
allow Firewall Web access only to sites on the
Trusted Domains
list. With
careful screening, this can block almost all objectionable material.
Don’t block Java/ActiveX/Cookies to Trusted Domains
Click this check box to make the Firewall allow Java, ActiveX and cookies
from sites on the
Trusted Domains
list to the LAN. In certain cases, it may
be desirable to allow Java, ActiveX or cookies from sites that are known
and trusted.
Changing the
Message to display
when a site is blocked
When a user attempts to access a site that is blocked by the Web Site
Filter, a message is displayed on their screen. The default message is:
Web Site Blocked by 3Com SuperStack 3 Firewall
.
You can type any message, including embedded HTML, up to 255
characters long in this box.
For example, if you type the following:
Access to this site was denied because it appears to
violate this organization’s
<A HREF=http://www.your-domain.com/acceptable_use_policy.h
tm>Acceptable Use Policy</A>. Please contact the
<A HREF=”mailto:[email protected]”>Network
Administrator</A> if you feel this was in error.
The user will see the following displayed when they attempt to visit a
blocked site:
Access to this site was denied because it appears to
violate this organization’s Acceptable Use Policy. Please
contact the Network Administrator if you feel this was in
error.
Where the underlined sections are links to your company’s acceptable use
policy and to the network administrator’s email address.
DUA1611-0AAA02.book Page 72 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...