EasyManua.ls Logo

Check Point UTM-1 Edge - Using Web Rules

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using Web Rules
Chapter 12: Setting Your Security Policy 365
b. Click OK.
The rule is deleted.
Using Web Rules
You can block or allow access to specific Web pages, by defining Web rules. If a user
attempts to access a blocked page, the Access Denied page appears. For information on
customizing this page, see Customizing the Access Denied Page on page
373.
If desired, you can permit specific users to override Web rules. Such users will be able to
view Web pages without restriction, after they have provided their username password via
the Access Denied page. For information on granting Web Filtering override permissions,
see Adding and Editing Users on page
546.
In addition, you can choose to exclude specific network objects from Web rule
enforcement. Users connecting from these network objects will be able to view Web pages
without restriction, regardless of whether they have Web Filtering override permissions.
For information on configuring network objects, see Using Network Objects on page
188.
Note: Web rules affect outgoing traffic only and cannot be used to allow or limit
access from the Internet to internal Web servers.

Table of Contents

Related product manuals