This document describes the Content FIltering Service (CFS) 3.0 feature and includes the
following sections:
•Overview of New CFS Features — page 1
•Prerequisites for Deployment — page 2
•Application Firewall for CFS — page 2
•CFS 3.0 Policy Management Overview — page 4
•CFS 3.0 Configuration Examples — page 8
Overview of New CFS Features
The latest iteration of the CFS feature allows the administrator to use the power of SonicWALL’s
Application Firewall feature in order to increase create a more powerful and flexible solution.
NoteWhile the new Application Firewall method of CFS management offers more control and
flexibility, the administrator can still choose the previous user/zone management method to
perform content filtering. Information on implementing the CFS feature using the previous
method can be found in the SonicOS Enhanced Administrator’s Guide.
The CFS 3.0 includes the following updates:
•Application Firewall - is now included as part of the CFS rule creation process.to
implement more granular, flexible and powerful content filter policy control, creating CFS
policy allow lists utilizing Application Firewall framework.
•Application Objects - Users/groups, address objects and zones can be assigned for
individual CFS policies.
•Bandwidth Management - CFS specifications can be included in bandwidth management
policies based on CFS website categories. This also allows use of ‘Bandwidth Aggregation’
by adding a per-action bandwidth aggregation method.
•SSL Certificate Common Name - HTTPS Content Filtering is significantly improved by
adding the ability to use an SSL certificate common name, in addition to server IP
addresses.
•New CFS Categories - Three new categories (Multimedia, Social Networking, and
Malware) are now included in the CFS list.
Content Filtering Service 3.0
1
Prerequisites for Deployment
Prerequisites for Deployment
In order to implement CFS 3.0 as described in this document, your network deployment must
meet the following hardware/software requirements:
•SonicWALL UTM Appliance running SonicOS 5.6.4 firmware or higher
•Application Firewall License registered to your SonicWALL UTM appliance
•CFS Premium License for CFS version 3.0 registered to your SonicWALL UTM appliance
Application Firewall for CFS
In order to support the new CFS features, the application firewall feature now includes:
•Two newApplication Objects (CFS Category List, CFS Allow List) and
•One new Application Firewall Policy (CFS)
Application Objects
CFS Category List – This application object provides a checklist containing all of the
predefined CFS categories which can be used in the application firewall CFS policy.
CFS Allow List – This application object provides the ability to match text strings – such as
Website URLs – for use as objects in a policy. The match type can be Exact, Partial, Prefix, or
Suffix.
1
1. Application Firewall/CFS 3.0 are not supported on all hardware/software platforms, please refer to your license management page in MySonicWALL to confirm license availability.
2
Content Filtering Service 3.0
Application Firewall Policy
CFS Policy Type – When defining an Application Firewall policy, the Application Object drop
down list displays all application objects which have been defined in the previous section as
‘CFS Category List’.
Allowed actions on this policy type include:
–
HTTP Block Page
–
Manage Bandwidth
–
No Action
–
CFS Block Page
–
Packet Monitor
Allowed Zones include:
–
LAN
–
DMZ
–
SSLVPN
–
VPN
–
WLAN
Application Firewall for CFS
NoteCFS Message Format Checkbox – By default, messages are logged in Application Firewall
format. This checkbox allows you to log using message format standard for CFS.
Content Filtering Service 3.0
3
CFS 3.0 Policy Management Overview
CFS 3.0 Policy Management Overview
When a CFS policy assignment is implemented using the Application Firewall method, it is
controlled by Application Firewall CFS policies in the Application Firewall > Policies page
instead of by Users and Zones.
While the new Application Firewall method of CFS management offers more control and
flexibility, the administrator can still choose the previous user/zone management method to
perform content filtering.
This section includes the following sub-sections:
•Bandwidth Management Methods — page 7
•Choosing CFS Policy Management Type — page 6
•Enabling Application Firewall and CFS — page 6
•Bandwidth Management Methods — page 7
The CFS Application Firewall Policy Settings Screen
There are multiple changes/additions to the CFS policy creation window when used in
conjunction with Application Firewall. The table and image in this section provide information
on Application Firewall interface for CFS.
4
Content Filtering Service 3.0
CFS 3.0 Policy Management Overview
FeatureFunction
Policy NameA friendly name for the policy. If applying a single policy to
multiple groups, it is often a good idea to include the group
name in this field.
Policy TypeSelect “CFS” to show the content filtering options.
AddressAddress or address group to which this policy is applied. The
default value is “Any”, which is also the most common
selection for CFS policies.
Exclusion AddressAddress or address group to exclude from this policy. The
default value is “None”, which is also the most common
selection for CFS policies.
Application ObjectSelect the relevant application object, this object dictates the
type of content which will trigger the policy to be enforced.
These objects are user-created in the
Firewall > Match Objects screen.
ActionSelect the action to perform. These can be pre-defined
actions such as “CFS block page”, or custom actions which
you may define in the Firewall > Action Objects screen.
Users/GroupsChoose individual users or groups to Include (default: All) or
Exclude (default: None) from this policy.
ScheduleSelect a specific schedule to dictate when this policy is to be
enforced. The default value is “Always on”.
Enable LoggingSelect to enable logging of any actions taken on behalf of this
policy. This option is selected by default.
Log Using CFS Message
Format
Log Redundancy Filter
(seconds)
Select to use the legacy CFS logging format. This option is
not selected by default.
Dictates the sensitivity of the log-redundancy filter. Select
“Use Global Settings” (default) or enter your own per-policy
setting in seconds.
ZoneSelect a specific zone on which this policy is to be enforced.
The default value is “Any”.
CFS Allow ListSelect a custom allow list to allow selected resources. The
default value is “None”.
CFS Forbidden ListSelect a custom forbidden list to deny selected resources.
The default value is “None”.
Enable Safe Search
Environment
Select this option to require the strictest filtering on all
searches on search engines like Google and Yahoo that offer
some form of safe-search filtering. This option is not selected
by default.
Content Filtering Service 3.0
5
CFS 3.0 Policy Management Overview
Choosing CFS Policy Management Type
The choice of which policy management method to use – Via User and Zone Screens or Via
Application Firewall – is made in the Security Services > Content Filter page.
NoteWhile the new Application Firewall method of CFS management offers more control and
flexibility, the administrator can still choose the previous user/zone management method to
perform content filtering.
Enabling Application Firewall and CFS
Before the services begin to filter content, you must enable them:
Step 1Navigate to the Security Services > Content Filter page in the SonicOS management
interface.
Step 2Select ‘Via Application Firewall’ from the CFS Policy Assignment dropdown list.
Step 3Click the Accept button to apply the change.
Step 4Navigate to the Firewall > App Rules page.
Step 5Check the box to Enable Application Firewall.
6
Content Filtering Service 3.0
Bandwidth Management Methods
Bandwidth Management feature can be implemented in two separate ways:
•Per Policy Method
–
The bandwidth limit specified in a policy is shared across all actions where it is applied
–
Application Firewall actions share the bandwidth specified in a single policy
–
Example: two policies share a BWM limit of 500kb/s, limiting the total bandwidth
between the two policies to 500kb/s
•Per Action Aggregate Method
–
Apply the bandwidth management limit specified in a policy individually to each action
–
Application Firewall actions each use the entire bandwidth specified in a policy
–
Example: two policies each have an independent limit of 500kb/s, the total possible
bandwidth between those two rules is 1000kb/s
CFS 3.0 Policy Management Overview
500kb/s
Action 1
cfs
BWM Limit
Per Policy
500kb/s
BWM Limit
Per Action
Bandwidth Aggregation Method is selected in the Application Firewall Action Settings screen
when the Action type is set as Bandwidth Management.
Action 2
Action 1
Action 2
exe
cfs
exe
Content Filtering Service 3.0
7
CFS 3.0 Configuration Examples
CFS 3.0 Configuration Examples
This section provides configuration examples using Application Firewall feature to create and
manage CFS policies:
•Blocking Forbidden Content — page 8
•Bandwidth Managing Content — page 10
•Applying Policies to Multiple Groups — page 13
•Creating a Custom CFS Category — page 14
Blocking Forbidden Content
To create a CFS Policy for blocking forbidden content:
•Create an Application Object — page 8
•Create an Application Firewall Policy to Block Forbidden Content — page 9
Create an Application Object
Create an application object containing forbidden content:
Step 1Navigate to the Firewall > Match Objects page in the SonicOS management interface.
Step 2Click the Add New Match Object button, the Add/Edit Match Object window displays.
Step 3Enter a descriptive Object Name, such as ‘Forbidden Content’.
Step 4Select ‘CFS Category List’ from the Match Object Type dropdown list.
Step 5Use the checkboxes to select the categories you wish to add to the forbidden content list.
Step 6Click the OK button to add the object to the Application Objects list.
8
Content Filtering Service 3.0
CFS 3.0 Configuration Examples
Create an Application Firewall Policy to Block Forbidden Content
Create an Application Firewall policy to block content defined in the Application Object:
Step 1Navigate to the Firewall > App Rules page in the SonicOS management interface.
Step 2Click the Add Policy button, the Add/Edit Application Firewall Policy window displays.
Step 3Enter a descriptive name for this action in the Policy Name field, such as ‘Block Forbidden
Content’.
Step 4Select ‘CFS’ from the Policy Type dropdown list.
Step 5From the Application Object dropdown list, select the object you created in the previous
section. In the case of our example, this object is named ‘Forbidden Content’.
Step 6From the Action dropdown list, select ‘CFS block page’ to display a pre-formatted ‘blocked
content’ page when users attempt to access forbidden content.
Step 7Optionally, select the Users/Groups who this policy is to be Included or Excluded on from the
dropdown list. Our example uses the defaults of including ‘all’ and excluding ‘none’.
Step 8Optionally, select a Schedule of days and times when this rule is to be enforced from the
dropdown list. Our example uses ‘Always On’ to always enforce this policy.
Step 9Optionally, select the checkbox for Log using CFS message format if you wish for the logs to
use this format instead of the standard Application Firewall format.
Step 10 Optionally, select the appropriate Zone where the policy is to be enforced. Our example uses
‘LAN’ to enforce the policy on all traffic traversing the local network.
Step 11 Optionally, select a CFS Allow List to enforce on this particular policy.
Step 12 Optionally, select the appropriate CFS Forbidden List to enforce on the particular policy.
Step 13 Click the OK button to create this policy.
Content Filtering Service 3.0
9
CFS 3.0 Configuration Examples
Bandwidth Managing Content
To create a CFS Policy for applying BWM to non-productive content:
•Create an Application Object — page 8
•Create a Bandwidth Management Action Object — page 11
•Create an Application Firewall Policy to Block Forbidden Content — page 9
Create an Application Object for Non-Productive Content
Create an application object containing non-productive content:
Step 1Navigate to the Firewall > Match Objects page in the SonicOS management interface.
Step 2Click the Add New Match Object button, the Add/Edit Match Object window displays.
Step 3Enter a descriptive Object Name, such as ‘Non-Productive Content’.
Step 4Select ‘CFS Category List’ from the Match Object Type dropdown list.
Step 5Use the checkboxes to select the categories you wish to add to the content list.
Step 6Click the OK button to add the object to the Application Objects list.
10
Content Filtering Service 3.0
Create a Bandwidth Management Action Object
This section details creating a custom Action Object for bandwidth management.
NoteAlthough application firewall contains pre-configured action objects for bandwidth
management, a custom action object provides more control, including the ability to manage
bandwidth per policy or per action.
To create a new BWM action:
Step 1Navigate to the Firewall > Action Objects page in the SonicOS management interface.
Step 2Click the Add New Action Object button, the Add/Edit Action Object window displays.
Step 3Enter a descriptive Action Name for this action.
Step 4Select ‘Bandwidth Management’ from the Action dropdown list.
Step 5Select from the Bandwidth Aggregation Method dropdown list:
a. Per Policy - to share/aggregate this bandwidth limit across all actions where it is applied.
b. Per Action - to individually apply this limit on each action to which it is enforced.
CFS 3.0 Configuration Examples
Step 6Create the desired settings for Inbound Bandwidth Management and Outbound Bandwidth
Management.
Step 7Click the OK button to create this object.
Content Filtering Service 3.0
11
CFS 3.0 Configuration Examples
Create an Application Firewall Policy to Manage Non-Productive Content
Create an Application Firewall policy to block content defined in the Application Object:
Step 1Navigate to the Firewall > App Rules page in the SonicOS management interface.
Step 2Click the Add Policy button, the Add/Edit Application Firewall Policy window displays.
Step 3Enter a descriptive name for this action in the Policy Name field.
Step 4Select ‘CFS’ from the Policy Type dropdown list.
Step 5From the Application Object dropdown list, select the object you created in the previous
section. In the case of our example, this object is named ‘Nonproductive Content’.
Step 6From the Action dropdown list, select ‘Bandwidth Management - 100k’ to apply this custom
BWM rule when users attempt to access non-productive content.
NoteIf you chose not to create a custom BWM object, you may use one of the pre-defined BWM
objects (BWM high, BWM medium, or BWM low).
Step 7Optionally, select the Users/Groups who this policy is to be Included or Excluded on from the
dropdown list. Our example uses the defaults of including ‘all’ and excluding ‘none’.
Step 8Optionally, select a Schedule of days and times when this rule is to be enforced from the
dropdown list. Our example uses the pre-defined ‘Work Hours’ selection to enforce this policy
only during weekday work hours.
Step 9Optionally, select the checkbox for Log using CFS message format if you wish for the logs to
use this format instead of the standard Application Firewall format.
Step 10 Optionally, select the appropriate Zone where the policy is to be enforced. Our example uses
‘LAN’ to enforce the policy on all traffic traversing the local network.
Step 11 Click the OK button to create this policy.
12
Content Filtering Service 3.0
Applying Policies to Multiple Groups
This section details applying a single policy to multiple user groups. CFS allows the
administrator to apply one policy to different groups, allowing for variation (in time restrictions,
exclusions, etc...) in the way it is applied to users.
To apply a policy to multiple groups:
•Enable CFS Custom Categories — page 14
•Add a New CFS Custom Category Entry — page 14
Create a Group-Specific Application Firewall Policy
Create an Application Firewall policy to block content defined in the Application Object:
Step 1Navigate to the Firewall > App Rules page in the SonicOS management interface.
Step 2Click the Add Policy button, the Add/Edit Application Firewall Policy window displays.
Step 3Enter a descriptive name for this action in the Policy Name field. For easy identification, this
name can include the user group to which you are applying the policy.
Step 4Select ‘CFS’ from the Policy Type dropdown list.
Step 5Select an Application Object from the dropdown list. Our example uses ‘Nonproductive
Content’.
Step 6Select an Action form the dropdown list.Our example uses the pre-defined ‘BWM Medium’
action to manage bandwidth of the applicable content.
Step 7Select the Users/Groups who this policy is to be Included or Excluded on from the dropdown
list. Our example uses the ‘Trusted Users’ group, although you may choose a different, or
custom group depending on your needs.
Step 8Select a Schedule appropriate for this group. Our example uses the pre-defined ‘Work Hours’
schedule.
CFS 3.0 Configuration Examples
Content Filtering Service 3.0
13
CFS 3.0 Configuration Examples
With this the selections in this example, Nonproductive Content will be Bandwidth Managed
for Trusted Users only during Work Hours.
Step 9Click the OK button to create this policy. The new policy displays in the Application Firewall
Policies list.
Step 10 Repeat steps 2-9 with variations required by your implementation in order to create a policy for
each required group.
Creating a Custom CFS Category
This section details creating a custom CFS category entry. CFS allows the administrator not
only to create custom Policies, but also allows for custom domain name entries to the existing
CFS rating categories. This allows for insertion of custom CFS-managed content into the
existing and very flexible category structure.
To create a new CFS custom category:
•Enable CFS Custom Categories — page 14
•Add a New CFS Custom Category Entry — page 14
Enable CFS Custom Categories
Step 1Navigate to the Security Services > Content Filter page in the SonicOS management
interface.
Step 2Scroll down and click the CFS Custom Category section and select the Enable CFS Custom
Category checkbox.
Step 3Click the Accept button to save your changes and enable the Custom Category feature.
Add a New CFS Custom Category Entry
Step 1Again in the Security Services > Content Filter page, scroll down to the CFS Custom
Category section and click the Add... button.
Step 2Enter a descriptive Name for the custom entry.
Step 3Choose the pre-defined Category to which this entry will be added.
Step 4Enter a domain name into the Content field.
14
Content Filtering Service 3.0
CFS 3.0 Configuration Examples
NoteAll subdomains of the domain entered are affected. For example, entering “yahoo.com”
applies to “mail.yahoo.com” and “my.yahoo.com”, hence it is not necessary to enter all
FQDN entries for subdomains of a parent domain.
Step 5Click the OK button to add this custom entry.
Content Filtering Service 3.0
15
CFS 3.0 Configuration Examples
16
Document Revision History
7/30/10First Draft (PL)
8/18/10Final Draft - feedback incorporated, new content added (PL)
12/21/10Revised for SonicOS 5.8 (PL)
PN: 232-001986-00 Rev A
Content Filtering Service 3.0
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.