To configure traffic filtering criteria:
The traffic processing rules table opens.
This opens a window containing information about the rule.
You can use this criterion to control user access to Internet resources based on their categories. For example, you can prohibit access to social networks by selecting the Social networks category.
In addition to the URL, you can add the protocol or port of network connections to filtering criteria.
For example, you can prohibit access ot all Internet resources over the HTTP protocol.
You can add a specific file name to filtering criteria or use regular expressions. For example, you can prohibit downloading executable files with the exe extension by entering *.exe
.
Viruses or other malware can be spread in executable files renamed to have a different extension, for example, txt. If you selected the File name criterion and entered *.exe
, such a file is not processed by the application. However, if you selected file filtering by format, the application checks the true format of the file regardless of the extension. If the check reveals that the file has the EXE format, the application processes it in accordance with the rule.
You can use this criterion to control the network traffic volume of your organization. For example, you can prohibit downloading files over 700 MB in size.
You can use this criterion to control access to objects depending on their content. For example, you can prohibit playing video streams by entering video/*
. For examples of MIME types of objects, see Appendix.
If you specify multipart/*
, the Content-Type header of the object is ignored. The multipart MIME types of objects are processed by parts according to the Content-Type header of each part of the object. If any part of the object is prohibited at the conclusion of the scan, the Deny action is applied to the whole object.
You can prohibit access to an object by entering its MD5 hash. This can be necessary if you receive information about a virus or other malware from a third-party system and you know only its MD5 hash.
You can prohibit access to an object by entering its SHA2 hash. This can be necessary if you receive information about a virus or other malware from a third-party system and you know only its SHA2 hash.
You can use this criterion to configure processing of all inbound or outbound connections.
Traffic filtering criteria are configured.
Page top