Configuring Behavior Control
Figure 3-7 Verify Configuration Result
7) In the General section on the same page, enable Web Filtering globally and click Save.
Figure 3-8 Enable Web Filtering
3.2 Example for Web Security
3.2.1 Network Requirements
In the diagram below, the company's hosts are connected to a layer 2 switch and access the
internet via the router. For security reasons, it is required that the users in the LAN cannot log
in, submit comments or download rar files on the internet.
Figure 3-1 Network Topology
WAN
Router
R
R
LAN
Layer 2 Switch
......
Configuration Examples
......
Configuration Guide
118