Firewall Protection Profile SSL content scanning and inspection
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903 485
http://docs.fortinet.com/ • Feedback
FortiGuard Web
Filtering
FortiGuard Web Filtering options for HTTPS:
• Enable FortiGuard Web Filtering
• Enable FortiGuard Web Filtering Overrides
• Provide details for blocked HTTP 4xx and 5xx errors
• Rate images by URL (blocked images will be replaced with blanks)
• Allow websites when a rating error occurs
• Strict Blocking
• Rate URLs by domain and IP address
Go to Firewall > Profile. Add or edit a protection profile and configure Web
Filtering > FortiGuard Web Filtering for HTTPS. For more information, see
“FortiGuard Web Filtering options” on page 495.
Email Filtering Email filtering options for IMAPS, POP3S, and SMTPS:
• FortiGuard Email Filtering (or Antispam) IP address check, URL check,
E-mail checksum check, and Spam submission
• IP address BWL check
• HELO DNS lookup
• E-mail address BWL check
• Return e-mail DNS check
• Banned word check
•Spam Action
• Tag Location
• Tag Format
Go to Firewall > Protection Profile. Add or edit a protection profile and
configure Spam Filtering for IMAPS, POP3S, and SMTPS. For more
information, see “Email Filtering options” on page 498.
Data Leak Prevention DLP for HTTPS, IMAPS, POP3S, and SMTPS. To apply DLP, follow the
steps below:
•Go to UTM > Data Leak Prevention > Rule to add DLP rules. For
HTTPS, add an HTTP rule and select HTTPS POST and HTTPS GET.
For IMAPS, POP3S, and SMTPS, add an Email rule and select
IMAPS, POP3S, and SMTPS. See “Adding or configuring DLP rules”
on page 596.
•Go to UTM > Data Leak Prevention > Sensor and add the DLP rules to
a DLP sensor. See “Adding or editing a rule or compound rule in a DLP
sensor” on page 585.
•Go to Firewall > Protection Profile. Add or edit a protection profile and
use Data Leak Prevention Sensor to add the DLP sensor to a
protection profile. Note: In a protection profile, if you set Protocol
Recognition > HTTPS Content Filtering Mode to URL Filtering, DLP
rules cannot inspect HTTPS. Set this option to Deep Scan.
•Go to Firewall > Policy and add the protection profile to a firewall
policy. See “Data Leak Prevention Sensor options” on page 501.
DLP archiving DLP archiving for HTTPS, IMAPS, POP3S, and SMTPS. Add DLP Rules
for the protocol to be archived. See “DLP archiving” on page 588.