Security Services : Security Services > Content Filter

CFS Configuration Examples
This section provides configuration examples using App Rules feature to create and manage CFS policies:
Additional videos are available at: https://support.software.dell.com/videos-product-select.
Blocking Forbidden Content
To create a CFS Policy for blocking forbidden content:
Create an Application Object
Create an application object containing forbidden content:
1
Navigate to the Firewall > Match Objects page in the SonicOS management interface.
2
Click the Add New Match Object button. The Add/Edit Match Object dialog displays.
3
Enter a descriptive Object Name, such as Forbidden Content. The minimum length is 1 character, the maximum is 96 characters.
4
Select CFS Category List from the Match Object Type drop-down menu. The Add/Edit Match Object dialog changes to list categories to select for blocking or bandwidth management.
5
6
Click the OK button to add the object to the Application Objects list.
Create an App Rules Policy to Block Forbidden Content
Create an App Rules policy to block content defined in the Application Object:
1
Navigate to the Firewall > App Rules page.
2
Click the Add New Policy button. The Add/Edit App Rules Policy dialog displays.
3
Enter a descriptive name for this action in the Policy Name field, such as Block Forbidden Content.
4
Select CFS from the Policy Type drop-down menu. The options change.
5
From the Match Object drop-down menu, select the object you created in the previous section. In the case of our example, this object is named Forbidden Content.
6
From the Action Object drop-down menu, select CFS block page to display a pre-formatted blocked-content page when users attempt to access forbidden content.
7
Optionally, select the users/groups this policy will include or exclude from the Users/Groups Included and/or Excluded drop-down menus. Our example uses the defaults of including All and excluding None.
8
Optionally, select the days and times when this rule is to be enforced from the Schedule drop-down menu. Our example uses the default, Always On, to always enforce this policy.
9
10
Optionally, select the appropriate zone where the policy is to be enforced from the Zone drop-down menu. Our example uses LAN to enforce the policy on all traffic traversing the local network. The default is Any.
11
12
13
Optionally, to enable safe-search enforcement for all search engines, select the Enable Safe Search Enforcement checkbox. This setting is disabled by default.
14
Click the OK button to create this policy.
Bandwidth Managing Content
To create a CFS Policy for applying BWM to non-productive content:
Create an Application Object for Non-Productive Content
To create an application object containing non-productive content:
1
Navigate to the Firewall > Match Objects page.
2
Click the Add New Match Object button. The Add/Edit Match Object dialog displays.
3
Enter a descriptive Object Name field, such as Non-Productive Content.
4
Select CFS Category List from the Match Object Type drop-down menu. The Add/Edit Match Object dialog changes to list categories to select for blocking or bandwidth management.
5
6
Click the OK button to add the object to the Application Objects list.
Create a Bandwidth Management Action Object
Although app rules contains pre-configured action objects for bandwidth management, a custom action object provides more control, including the ability to manage bandwidth per policy or per action.
For information on configuring bandwidth management, see Configuring BWM in an Action Object in Firewall Settings > BWM.
Create an App Rules Policy to Manage Non-Productive Content
To create an App Rules policy to block content defined in the Application Object:
1
Navigate to the Firewall > App Rules page.
2
Click the Add New Policy button. The Add/Edit App Rules Policy dialog displays.
3
Enter a descriptive name for this action in the Policy Name field, such as Manage Non-Productive Content. The minimum length is 0 and the maximum length is 96 characters.
4
Select CFS from the Policy Type drop-down menu. The options change.
5
From the Match Object drop-down menu, select the object created in Create an Application Object for Non-Productive Content . In the case of our example, this object is named Non-Productive Content.
6
From the Action Object drop-down menu, select one of these to apply this custom BWM rule when users attempt to access non-productive content. Out example uses BWM Global-Lowest.
No Action (default)
 
Table 88. BWM objects
7
Optionally, select the users/groups this policy will include or exclude from the Users/Groups Included and/or Excluded drop-down menus. Our example uses the defaults of including All and excluding None.
8
Optionally, select the days and times when this rule is to be enforced from the Schedule drop-down menu. Our example uses the pre-defined Work Hours selection to enforce this policy only during weekday work hours. The default is Always On.
9
10
Optionally, select the appropriate zone where the policy is to be enforced from the Zone drop-down menu. Our example uses LAN to enforce the policy on all traffic traversing the local network. The default is Any.
11
12
13
Optionally, to enable safe-search enforcement for all search engines, select the Enable Safe Search Enforcement checkbox. This setting is disabled by default.
14
Click the OK button to create this policy.
Applying Policies to Multiple Groups
This section details applying a single policy to multiple user groups. CFS allows you to apply one policy to different groups, allowing for variation (such as time restrictions, exclusions) in the way it is applied to users.
Create a Group-Specific App Rules Policy
To create an App Rules policy to block content defined in the Application Object:
1
Navigate to the Firewall > App Rules page.
2
Click the Add New Policy button. The Add/Edit App Rules Policy window displays.
3
Enter a descriptive name for this action in the Policy Name field. such as Manage Non-Productive Trusted. The minimum length is 0 and the maximum length is 96 characters.
4
Select CFS from the Policy Type drop-down menu. The options change.
5
From the Match Object drop-down menu, select the object created in Create an Application Object for Non-Productive Content . In the case of our example, this object is named Non-Productive Content.
6
From the Action Object drop-down menu, select one of these to apply this custom BWM rule when users attempt to access non-productive content. Out example uses BWM Global-Lowest.
No Action (default)
 
Table 89. BWM objects
7
Select the users/groups this policy includes or excludes from the Users/Groups Included and/or Excluded drop-down menus. Our example includes the Trusted Users group and excludes Guests, although you may choose different or custom groups depending on your needs. The defaults include All and exclude None.
8
Select the days and times when this rule is to be enforced from the Schedule drop-down menu. Our example uses the pre-defined Work Hours selection to enforce this policy only during weekday work hours. The default is Always On.
With this the selections in this example, Nonproductive Content will be Bandwidth Managed for Trusted Users only during Work Hours.
9
Click the OK button to create this policy. The new policy displays in the App Rules Policies list.
10
To create a policy for each required group, repeat Step 2 through Step 9 with variations required by your implementation.
Creating a CFS Custom Category
This section details creating a CFS custom category entry. CFS allows you not only to create custom Policies, but also allows for custom domain name entries to the existing CFS rating categories. This ability allows for insertion of CFS custom-managed content into the existing and very flexible category structure.
Custom Categories have the following limits:
To create a new CFS custom category:
Enable CFS Custom Categories
1
Navigate to the Security Services > Content Filter page.
2
Scroll down to the CFS Custom Category section.
3
Select the Enable CFS Custom Category checkbox.
4
Click the Accept button to save your changes and enable the Custom Category feature.
Add a New CFS Custom Category Entry
1
In the Security Services > Content Filter page, scroll down to the CFS Custom Category section.
2
Click the Add... button. The Edit CFS Local Rating dialog displays.
3
Enter a descriptive Name for the custom entry.
4
5
NOTE: All subdomains of the domain entered are affected. For example, entering yahoo.com applies to mail.yahoo.com and my.yahoo.com; hence, it is not necessary to enter all FQDN entries for subdomains of a parent domain.
6
7
Repeat Step 5 and Step 6 for each domain to be added to the custom list.
8
Click the OK button to add this custom category. The CFS Custom Category table on the Security Services > Content Filter page is updated.