Chapter 43 Content Filtering
ZyWALL Series CLI Reference Guide
396
2 You then enter sub-command mode for the facebook_block profile to configure the web content filter
profile’s list of forbidden keywords.
3 Enter *.facebook*.com to block access to websites with URLs that contain facebook. Use asterisks (*) as
a wildcard to match any string in trusted and forbidden websites. Exit sub-command mode.
4 To block traffic that goes through the Zyxel Device from the LAN to the Internet, you need to apply the
web content filter profile facebook_block to the security policies LAN1_Outgoing and LAN2_Outgoing.
Enter sub-command mode for configuring the security policy LAN1_Outgoing.
5 Apply the web content filter profile facebook_block to the security policies’ web content filter profile.
Set the log to log by-profile to generate a log for all traffic that matches criteria in the profile. Exit sub-
command mode.
6 Repeat step 7 and step 8 to apply the web content filter profile facebook_block to the security policy
LAN2_Outgoing.
43.9 DNS Content Filter Example
This is an example of using the Zyxel Device to block access to a specific network service. A company
wants to prevent its employees from using social networks during their time in the office, such as
Facebook, Instagram, Twitter... The company wants to make sure any traffic going from the LAN to the
Internet cannot access social networks whether the traffic goes through the Zyxel Device or not.
Router# configure terminal
Router(config)# content-filter profile facebook_block
Router(config)# content-filter profile facebook_block custom-list keyword
Router(Host)#
; <cr> exit no url |
Router(Host)# url *.facebook*.com
Router(Host)# exit
Router(config)# secure-policy 1
Router(secure-policy)# cf-profile
<profile name>
Router(secure-policy)# cf-profile facebook_block
log no
Router(secure-policy)# cf-profile facebook_block log by-profile
activate deactivate
Router(secure-policy)# cf-profile facebook_block log by-profile activate
Router(secure-policy)# exit