Legacy Content Filtering Examples

The following sections describe how to configure the settings on the Security Services > Content Filter page using legacy Content Filtering methods.

Topics:

Content Filter Status

If CFS is activated, the Content Filter Status section displays the status of the Content Filter Server, as well as the date and time that your subscription expires.

You can also access the SonicWALL CFS URL Rating Review Request form by clicking on the here link in If you believe that a Web site is rated incorrectly or you wish to submit a new URL, click here.

If SonicWALL CFS is not activated, you must purchase a license subscription for full content filtering functionality, including CFS custom Policies. If you do not have an Activation Key, you must purchase SonicWALL CFS from a SonicWALL reseller or from your mysonicwall.com account (limited to customers in the USA and Canada).

Content Filter Type

There are two types of content filtering available on the firewall. These options are available from the Content Filter Type drop-down menu:

SonicWALL Content Filter Service - Selecting Content Filter Service allows you to access SonicWALL CFS functionality that is included with SonicOS, and also to configure CFS Custom Policies that are available only with a valid subscription. You can obtain more information about SonicWALL Content Filtering Service at http://www.sonicwall.com/products/cfs.html

When Content Filter Service is selected, you need to select how content Filtering is to be enforced from the CFS Policy Assignment drop-down menu:

Via App Rules – Enforced through App Rules polices configured through the Firewall > App Rules page. This is the default selection.
Via User and Zone Screens – Enforced per zone from settings on the Network > Zones page. When this is selected, a link is provided to the Network > Zones page: Note: Enforce the Content Filtering Service per zone from the Network > Zones page.
Websense Enterprise - Websense Enterprise is a third party content filter list supported by Dell SonicWALL network security appliances. When this is selected, the CFS Policy Assignment section is no longer displayed and a link is provided to the Network > Zones page: Note: Enforce the Content Filtering Service per zone from the Network > Zones page.

Restrict Web Features

Restrict Web Features enhances your network security by blocking potentially harmful Web applications from entering your network. Restrict Web Features are included with SonicOS. Select any of the following applications to block:

ActiveX - A programming language that embeds scripts in Web pages. Malicious programmers can use ActiveX to delete files or compromise security. Select the ActiveX checkbox to block ActiveX controls.
Java - Used to download and run small programs, called applets, on Web sites. It is safer than ActiveX as it has built-in security mechanisms. Select the Java checkbox to block Java applets from the network.
Cookies - Used by Web servers to track Web usage and remember user identity. Cookies can also compromise users' privacy by tracking Web activities. Select the Cookies checkbox to disable Cookies.
Access to HTTP Proxy Servers - When a proxy server is located on the WAN, LAN users can circumvent content filtering by pointing their computer to the proxy server. Select this checkbox to prevent LAN users from accessing proxy servers on the WAN.

Trusted Domains

Trusted Domains can be added to enable content from specific domains to be exempt from Restrict Web Features.

If you trust content on specific domains and want them to be exempt from Restrict Web Features, follow these steps to add them:
1
Select the Do not block Java/ActiveX/Cookies to Trusted Domains checkbox.
2
Click Add. The Add Trusted Domain Entry dialog displays.

3
4
Click OK. The trusted domain entry is added to the Trusted Domains table.

To keep the trusted domain entries but enable Restrict Web Features, clear the Do not block Java/ActiveX/Cookies to Trusted Domains checkbox.

To delete an individual trusted domain, click on the Delete icon for the entry. To delete all Trusted Domains, click the Delete All button.

To edit a trusted domain entry, click its Edit icon. the Edit Trusted Domain Entry dialog displays, which is the same as the Add Trusted Domain Entry dialog.

CFS Blocking for Administrators

The Do not bypass CFS blocking for the administrator checkbox in the CFS Exclusion for the Administrator section controls content filtering for administrators. By default, when you (admin user) are logged into the SonicOS management interface from a system, CFS blocking is suspended for that system’s IP address for the duration of the authenticated session. If you prefer to provide content filtering and apply CFS policies to the IP address of your system, select the Do not bypass CFS blocking for the administrator checkbox.

CFS Exclusion List

IP address ranges can be manually added to or deleted from the CFS Exclusion List. Content filtering is disabled for IP addresses in the CFS Exclusion List. These address ranges are treated as Trusted Domains.

To manually add IP addresses to the CFS exclusion list, select the Enable CFS Exclusion List checkbox. To keep the CFS exclusion list entries, but temporarily allow access to blocked sites, leave the feature disabled (unchecked).

Topics:
Adding Trusted Domains to the CFS Exclusion List
To add a range of IP addresses to the CFS Exclusion List, perform these tasks:
1
Select the Enable CFS Exclusion List checkbox. The radio buttons and drop-down menu become active.

2
Select one of the Exclude from options:
CFS only – Traffic from the IP addresses in the excluded list bypass content filtering, but do not bypass access rules that require authentication.
CFS and user authentication in access rules (default) — In addition to bypassing CFS, traffic from the IP addresses in the excluded list are allowed through by access rules that require user authentication even if the user is not authenticated (if Single Sign-On is used, it is not triggered).
3
4
Click Accept on the Security Services > Content Filter page. The IP address range is added to the CFS Exclusion List.
Temporarily Disabling the CFS Exclusion List
To temporarily disable the CFS Exclusion List, perform these tasks:
1
To keep the CFS Exclusion List entries but temporarily allow content filtering to be applied to these IP addresses, clear the Enable CFS Exclusion List checkbox.
2
Click Accept on the Security Services > Content Filter page.

CFS Policy per IP Address Range

To configure a CFS custom policy for a range of IP addresses, perform these tasks:
1
Scroll down to the CFS Policy per IP Address Range section.

2
Select the Enable Policy per IP Address Range checkbox.
3
Click the Add button. The Add CFS Policy per IP Address Range dialog displays.

4
Select an address object from the CFS Address Object drop-down menu or create a new one (for information about configuring address objects, see Configuring Address Objects ).
5
6
7
Click OK. The CFS Policy per IP Address Range table is updated.

To delete address objects:

To delete an individual address object, click on the Delete icon for the entry. To delete all address objects in the table, click the Delete All button.

To edit an address object:

To edit an address object, click its Edit icon. the Edit CFS Policy per IP Range dialog displays, which is the same as the Add CFS Policy per IP Range dialog.

Web Page to Display when Blocking

You can fully customize the web page that is displayed to the user when access to a blocked site is attempted. To see a preview of the display, click the Preview button.

To revert to the default blocked page message, click the Default Blocked Page button.

Default Blocked Page

If you have not modified the provided code, clicking the Preview button displays the default web page. The Block policy, Client IP address, and the reason for the block are shown:

For information on setting up Content Filter Properties, see Configuring Legacy SonicWALL Filter Properties.