NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 192

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Table 6-8. Content Filtering Settings
Setting
Content Filtering
Log HTTP Traffic
Block Files with
the Following
Extensions
Full-Text Search
Note: This is keyword blocking.
Block web pages
with the Following
keywords
Block Web Objects
Select any or all of the following checkboxes:
Remove
Embedded Objects
Disable Javascript Javascript is disabled on downloaded Web pages.
Proxy
Cookies
6-28
Description (or Subfield and Description)
Select this checkbox to log HTTP traffic. For information about how to view the
logged traffic, see
"Querying Logs and Generating Reports" on page
default, HTTP traffic is not logged.
Note: Logging HTTP traffic might affect the UTM's performance (see
"Performance Management" on page
By default, the File Extension field lists the most common file extensions. You can
manually add or delete extensions. Use commas to separate different extensions.
You can enter a maximum of 40 file extensions; the maximum total length of this
field, excluding the delimiter commas, is 160 characters.
You can also use the pull-down menu to add predefined file extensions from a
specific category to the File Extension field:
• None. No file extensions are added to the File Extension field. This is the default
setting.
• Executables. Executable file extensions (exe, com, dll, so, lib, scr, bat, and
cmd) are added to the File Extension field.
• Audio/Video. Audio and video file extensions (wav, mp3, avi, rm, rmvb, wma,
wmv, mpg, mp4, and aac) are added to the File Extension field.
• Compressed Files. Compressed file extensions (zip, rar, gz, tar, and bz2)
added to the File Extension field.
Select the checkbox to enable keyword blocking. Then, enter keywords that you
want to be blocked. Separate the keywords by a comma.
Note: Keywords searching and blocking might affect the UTM's performance (see
"Performance Management" on page
All embedded objects such as ActiveX, Java, and Flash objects are removed from
downloaded Web pages.
Note: Because embedded objects are commonly used on legitimate Web sites,
blocking embedded objects globally might have a negative impact on a user's Web
browsing experience.
All Web proxy servers are blocked.
All cookies are blocked.
v1.0, September 2009
10-1).
10-1).
Content Filtering and Optimizing Scans
11-32.
By

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents