13. Click OK
14. Go to: Configuration > Save & Activate to activate the new file
15. Press Save and then click OK
The new file will be uploaded to NetDefendOS
Tip: Saving changes
In the above example, more than one HTML file can be edited in a session but the Save
button should be pressed to save all edits before beginning to edit another file.
Uploading with SCP
It is possible to upload new HTTP Banner files using SCP. The steps to do this are:
1. Since SCP cannot be used to download the original default HTML, the source code must be
first copied from the Web Interface and pasted into a local text file which is then edited
using an appropriate editor.
2. A new ALG Banner Files object must exist which the edited file(s) is uploaded to. If the
object is called mytxt, the CLI command to create this object is:
gw-world:/> add HTTPALGBanners mytxt
This creates an object which contains a copy of all the Default content filtering banner files.
3. The modified file is then uploaded using SCP. It is uploaded to the object type
HTTPALGBanner and the object mytxt with the property name URLForbidden. If the edited
URLForbidden local file is called my.html then using the Open SSH SCP client, the upload
command would be:
scp myhtml admin@10.5.62.11:HTTPAuthBanners/mytxt/URLForbidden
The usage of SCP clients is explained further in Section 2.1.7, “Secure Copy”.
4. Using the CLI, the relevant HTTP ALG should now be set to use the mytxt banner files. If the
ALG us called my_http_alg, the command would be:
set ALG_HTTP my_http_alg HTTPBanners=mytxt
5. As usual, the activate followed by the commit CLI commands must be used to activate the
changes on the NetDefend Firewall.
6.3.4.6. The WCF Performance Log
NetDefendOS provides an option for looking more closely at what the web content filtering
subsystem is doing and this is called the WCF Performance Log. It is intended to be used by
qualified support technicians but it is useful to know that it exists and how to enable it.
When enabled, this feature takes a snapshot of the status of the WCF subsystem and outputs a
Chapter 6: Security Mechanisms
523