EasyManua.ls Logo

Check Point UTM-1 Edge - Page 385

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using Web Rules
Chapter 12: Setting Your Security Policy 371
Table 66: Web Rules Fields
In this field… Do this…
Block/Allow
access to the
following URL
Type the URL or IP address to which the rule should apply.
Wildcards (*) are supported. For example, to block all URLs that start with
"http://www.casino-", set this field's value to:
http://www.casino-
*
Note: If you block a Web site based on its domain name
(http://<domain_name>), the Web site is not automatically blocked when
surfing to the Web server's IP address (http://<IP_address>). Likewise, if
you block a Web site based on its IP address, the Web site is not
automatically blocked when surfing to the domain name. To prevent access
to both the domain name and the IP address, you must block both.
Log allowed
connections /
Log blocked
connections
Select this option to log the specified blocked or allowed connections.
By default, allowed Web pages are not logged, and blocked Web pages are
logged.
If the connection
source is
Select the source of the connections you want to allow/block.
To specify an IP address, select Specified IP and type the desired IP address
in the field provided.
To specify an IP address range, select Specified Range and type the desired IP
address range in the fields provided.

Table of Contents

Related product manuals