FilteringCategories=SEARCH_SITES
Web Interface
First, create an HTTP Application Layer Gateway (ALG) Object:
1.
Go to Objects > ALG > Add > HTTP ALG
2.
Specify a suitable name for the ALG, for example content_filtering
3.
Click the Web Content Filtering tab
4.
Select Audit in the Mode list
5.
In the Blocked Categories list, select Search Sites and click the >> button
6.
Click OK
The steps to then create a Service object using the new HTTP ALG and modifying the NAT rule to use the new
service, are described in the previous example.
Allowing Override
On some occasions, Active Content Filtering may prevent users carrying out legitimate tasks.
Consider a stock broker dealing with on-line gaming companies. In his daily work, he might need to
browse gambling web sites to conduct company assessments. If the corporate policy blocks
gambling web-sites, he will not be able to do his job.
For this reason, NetDefendOS supports a feature called Allow Override. With this feature enabled,
the content filtering component will present a warning to the user that he is about to enter a web site
that is restricted according to the corporate policy, and that his visit to the web site will be logged.
This page is known as the restricted site notice. The user is then free to continue to the URL, or
abort the request to prevent being logged.
By enabling this functionality, only users that have a valid reason to visit inappropriate sites will
normally do so. Other will avoid those sites due to the obvious risk of exposing their surfing habits.
Caution
If a user overrides the restricted site notice page, they are allowed to surf to all pages
without any new restricted site message appearing again. The user is however still
being logged. When the user has become inactive for 5 minutes, the restricted site
page will reappear if they then try to access a restricted site.
Reclassification of Blocked Sites
As the process of classifying unknown web sites is automated, there is always a small risk that some
sites are given an incorrect classification. NetDefendOS provides a mechanism for allowing users to
manually propose a new classification of sites.
This mechanism can be enabled on a per-HTTP ALG level, which means that you can choose to
enable this functionality for regular users or for a selected user group only.
If reclassification is enabled and a user requests a web site which is disallowed, the block web page
will include a dropdown list containing all available categories. If the user believes the requested
web site is wrongly classified, he can select a more appropriate category from the dropdown list and
submit that as a proposal.
The URL to the requested web site as well as the proposed category will then be sent to D-Link's
central data warehouse for manual inspection. That inspection may result in the web site being
reclassified, either according to the category proposed or to a category which is felt to be correct.
6.3.4. Dynamic Web Content Filtering
Chapter 6. Security Mechanisms
249
Содержание 800 - DFL 800 - Security Appliance
Страница 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Страница 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Страница 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Страница 166: ...interfaces without an overriding IGMP Setting Default 1 000 4 6 4 Advanced IGMP Settings Chapter 4 Routing 166 ...
Страница 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Страница 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Страница 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Страница 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Страница 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Страница 303: ... Changed on a regular basis such as every three months 8 1 Overview Chapter 8 User Authentication 303 ...
Страница 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Страница 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Страница 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Страница 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Страница 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Страница 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Страница 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...