Security_Services_securityServicesCFView
Security Services > Content Filter
The Security Services > Content Filter page allows you to configure the Restrict Web Features and Trusted Domains settings, which are included with SonicOS. You can activate and configure SonicWALL Content Filtering Service (SonicWALL CFS) as well as a third-party Content Filtering product from the Security Services > Content Filter page.
SonicWALL Content Filtering Service is a subscription service upgrade. You can try a FREE TRIAL of SonicWALL directly from your SonicWALL management interface. See Activating a SonicWALL CFS FREE TRIAL.
For complete SonicWALL Content Filtering Service documentation, see the SonicWALL Content Filtering Service Administrator’s Guide available athttp://www.sonicwall.com/us/Support.html.
This chapter contains the following sections:
Restrictions
Note: Content Filtering Service (CFS) consent is not supported in Wire Mode.
SonicWALL CFS Implementation with App Rules
The latest iteration of the CFS feature allows the administrator to use the power of SonicWALL’s App Rules feature in order to increase create a more powerful and flexible solution.
Note: While the new App Rules method of CFS management offers more control and flexibility, the administrator can still choose the previous user/zone management method to perform content filtering. Information on implementing the CFS feature using the previous method can be found in the SonicOS Administrator’s Guide.
New Features for CFS 3.0 Management Using App Rules
New Features Applicable to All CFS 3.0 Management Methods
Legacy Content Filtering Service
Content Filtering Service (CFS) enforces protection and productivity policies for businesses, schools and libraries to reduce legal and privacy risks while minimizing administration overhead. CFS utilizes a dynamic database of millions of URLs, IP addresses and domains to block objectionable, inappropriate or unproductive Web content. At the core of CFS is an innovative rating architecture that cross references all Web sites against the database at worldwide co-location facilities. A rating is returned to the firewall and then compared to the content filtering policy established by the administrator. Almost instantaneously, the Web site request is either allowed through or a Web page is generated by the firewall informing the user that the site has been blocked according to policy.
With CFS, network administrators have a flexible tool to provide comprehensive filtering based on keywords, time of day, trusted and forbidden domain designations, and file types such as Cookies, Java™ and ActiveX® for privacy. CFS automatically updates the filters, making maintenance substantially simpler and less time consuming.
CFS can also be customized to add or remove specific URLs from the blocked list and to block specific keywords. When a user attempts to access a site that is blocked by the firewall, a customized message is displayed on the user’s screen. Firewalls can also be configured to log attempts to access sites on the Content Filtering Service database, on a custom URL list, and on a keyword list to monitor Internet usage before putting new usage restrictions in place.
CFS Premium blocks 56 categories of objectionable, inappropriate or unproductive Web content. CFS Premium provides network administrators with greater control by automatically and transparently enforces acceptable use policies. It gives administrators the flexibility to enforce custom content filtering policies for groups of users on the network. For example, a school can create one policy for teachers and another for students.
Note: For complete Content Filtering Service documentation, see the Content Filtering Service Administrator’s Guide available at http://www.sonicwall.com/us/Support.html
CFS 3.0 Policy Management Overview
When a CFS policy assignment is implemented using the App Rules method, it is controlled by App Rules CFS policies in the App Rules > Policies page instead of by Users and Zones.
While the new App Rules method of CFS management offers more control and flexibility, the administrator can still choose the previous user/zone management method to perform content filtering.
This section includes the following sub-sections:
Choosing CFS Policy Management Type
The choice of which policy management method to use – Via User and Zone Screens or Via App Rules – is made in the Security Services > Content Filter page.
Note: While the new App Rules method of CFS management offers more control and flexibility, the administrator can still choose the previous user/zone management method to perform content filtering.
Enabling App Rules and CFS
Before the services begin to filter content, you must enable them:
Bandwidth Management Methods
Bandwidth Management feature can be implemented in two separate ways:
Bandwidth Aggregation Method is selected in the App Rules Action Settings screen when the Action type is set as Bandwidth Management.
Policies and Precedence: How Policies are Enforced
This section provides an overview of policy enforcement mechanism in CFS 3.0 to help the policy administrator create a streamlined set of rules without unnecessary redundancy or conflicting rule logic enforcement.
Policy Enforcement Across Different Groups
The basic default behavior for CFS policies assigned to different groups is to follow standard most specific / least restrictive logic, meaning:
The most specific rule is always given the highest priority
Policy Enforcement Within The Same Group
The basic default behavior for CFS policies within the same group is to follow an additive logic, meaning:
Rules are enforced additively
CFS 3.0 Configuration Examples
This section provides configuration examples using App Rules feature to create and manage CFS policies:
Blocking Forbidden Content
To create a CFS Policy for blocking forbidden content:
Create an Application Object
Create an application object containing forbidden content:
Create an App Rules Policy to Block Forbidden Content
Create an App Rules policy to block content defined in the Application Object:
Bandwidth Managing Content
To create a CFS Policy for applying BWM to non-productive content:
Create an Application Object for Non-Productive Content
Create an application object containing non-productive content:
Create a Bandwidth Management Action Object
This section details creating a custom Action Object for bandwidth management.
Note: Although app rules contains pre-configured action objects for bandwidth management, a custom action object provides more control, including the ability to manage bandwidth per policy or per action.
To create a new BWM action:
Create an App Rules Policy to Manage Non-Productive Content
Create an App Rules policy to block content defined in the Application Object:
Note: If you chose not to create a custom BWM object, you may use one of the pre-defined BWM objects (BWM high, BWM medium, or BWM low).
Applying Policies to Multiple Groups
This section details applying a single policy to multiple user groups. CFS allows the administrator to apply one policy to different groups, allowing for variation (in time restrictions, exclusions, etc...) in the way it is applied to users.
To apply a policy to multiple groups:
Create a Group-Specific App Rules Policy
Create an App Rules policy to block content defined in the Application Object:
With this the selections in this example, Nonproductive Content will be Bandwidth Managed for Trusted Users only during Work Hours.