Cisco WS-CE500-24TT Administration Guide - Page 124

Using Other Tools to Control Access to the Internet

Page 124 highlights

Firewall Configuration Using Other Tools to Control Access to the Internet 4 • TCP Session Cleanup Latency (seconds): Maximum time for a session to remain in the session table after detecting both FIN flags. This value can range between 0 and 4,294,967 seconds. The default is 10 seconds. STEP 3 Click Apply to save your settings. Using Other Tools to Control Access to the Internet The gateway offers some standard web filtering options to allow the admin to easily create internet access policies between the secure LAN and insecure WAN. Instead of creating policies based on the type of traffic (as is the case when using firewall rules), web based content itself can be used to determine if traffic is allowed or dropped. Refer to the following topics: • Configuring Content Filtering to Allow or Block Web Components • Configuring Approved URLs to Allow Access to Websites • Configuring Blocked URLs to Prevent Access to Websites • Configuring IP/MAC Binding to Prevent Spoofing Configuring Content Filtering to Allow or Block Web Components The security appliance supports a content filtering option that you can use to block access to certain Internet sites. Up to 32 key words can be specified for filtering. The type of keywords you can specify include website URL, newsgroup name, etc. STEP 1 Click Firewall > Content Filtering > Content Filtering. The Content Filtering window opens. STEP 2 In the Content Filtering Enable area, enable or disable the following: • Enable Content Filtering: Check the box to enable content filtering. Enable this feature when you want to configure and use features such as a list of Trusted Domains, keyword filtering, and so on. Cisco SA500 Series Security Appliances Administration Guide 124

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Using Other Tools to Control Access to the Internet
Cisco SA500 Series Security Appliances Administration Guide
124
4
TCP Session Cleanup Latency (seconds):
Maximum time for a session to
remain in the session table after detecting both FIN flags. This value can
range between 0 and 4,294,967 seconds. The default is 10 seconds.
STEP
3
Click
Apply
to save your settings.
Using Other Tools to Control Access to the Internet
The gateway offers some standard web filtering options to allow the admin to
easily create internet access policies between the secure LAN and insecure WAN.
Instead of creating policies based on the type of traffic (as is the case when using
firewall rules), web based content itself can be used to determine if traffic is
allowed or dropped.
Refer to the following topics:
Configuring Content Filtering to Allow or Block Web Components
Configuring Approved URLs to Allow Access to Websites
Configuring Blocked URLs to Prevent Access to Websites
Configuring IP/MAC Binding to Prevent Spoofing
Configuring Content Filtering to Allow or Block Web
Components
The security appliance supports a content filtering option that you can use to
block access to certain Internet sites. Up to 32 key words can be specified for
filtering. The type of keywords you can specify include website URL, newsgroup
name, etc.
STEP 1
Click
Firewall
> Content Filtering > Content Filtering
.
The Content Filtering window opens.
STEP
2
In the
Content Filtering Enable
area, enable or disable the following:
Enable Content Filtering:
Check the box to enable content filtering. Enable
this feature when you want to configure and use features such as a list of
Trusted Domains, keyword filtering, and so on.