SonicOS 7.1 Content Filtering Administration Guide

About SonicOS

This guide is part of the SonicOS collection of administrative guides that describes how to administer and monitor the SonicWall family of firewalls. SonicOS provides network administrators the management interface, API (Application Program Interface), and the Command Line Interface (CLI) for firewall configuration by setting objects to secure and protect the network services, to manage traffic, and to provide the desired level of network service. This guide focuses on SonicWall's Content Filtering Service's (CFS) ability to compare requested web sites against a massive database in the cloud that contains millions of rated URLs, IP addresses, and web sites. This service provides you with the tools to create and apply policies that allow or deny access to sites based on individual or group identity, or by time of day, for over 50 predefined categories.

Topics:

Working with SonicOS

SonicOS provides a web management interface for configuring, managing, and monitoring the features, policies, security services, connected devices, and threats to your network. SonicOS runs on top of SonicCore, SonicWall's secure underlying operating system.

The SonicOS management interface facilitates:

SonicOS Modes of Operation

SonicWall offers two different modes of operation in SonicOS; the modes differ mainly in the areas of policy, object configuration and diagnostics.

Table: Firewall Modes

Firewall TypeClassic ModePolicy ModeComments
TZ SeriesyesnoThe entry level TZ Series, also known as desktop firewalls, deliver revamped features such as 5G readiness, better connectivity options, improved threat, SSL and decryption performance that address HTPPS bandwidth issues; built-in SD-WAN, and lawful TLS 1.3 decryption support.
NSa SeriesyesnoNSa firewalls provide your mid sized network with enhanced security. They are designed specifically for businesses with 250 and up. It can provide cloud-based and on-box capabilities like TLS/SSL decryption and inspection, application intelligence and control, SD-WAN, real-time visualization, and WLAN management.
NSsp 10700, NSsp 11700, NSsp 13700yesnoThe NSsp platforms high-end firewalls that deliver the advanced threat protection and fast speeds that large enterprises, data centers, and service providers need.
NSsp 15700noyesThe NSsp 15700 is designed for large distributed enterprises, data centers, government agencies and services providers. It provides advanced threat protection like Real-Time Deep Memory Inspection, multi-instance firewall configuration, and unified policy creation and modification, with scalability and availability.
NSv SeriesyesyesThe NSv series firewalls offers all the security advantages of a physical firewall with the operational and economic benefits of virtualization. The NSv firewalls can operate in either Policy Mode or Classic Mode. You can switch between modes, but some configuration information from extra interfaces is removed.

SonicOS Workflow

In addition to the management interface, SonicOS also has a full-featured API and a command-line interface (CLI) to manage the firewalls. For more information, refer to:

When working with SonicWall products, you can use the following workflow as a guide for setting up your security solution.

The SonicOS workflow involves several stages: Planning, Setup, Configuration, Monitor & Report, and Adjust Performance/Diagnose Issues. This process guides users from initial purchasing decisions through implementation, configuration, and ongoing monitoring and maintenance.

There is some flexibility in the order in which you do things, but this is the general work-flow you would follow when configuring your firewall. Start by defining the settings on the firewall. Next you set up the system and other devices that your firewall is connected to, and you can choose to implement High Availability when done. After your device, network, and system is configured, you should define the objects that you want to monitor. Then you use those objects to define the policies that protect your network. The final step to preparing your setup is to validate the user authentication.

How to Use the SonicOS Administration Guides

The SonicOS Administration Guide is a collection of guides that detail the features represented by each of the main menu items in the management interface. Within each guide, you can find topics covering commands in that menu group, along with procedures and in-depth information. The exceptions are the SonicOS 7.1 Monitor Guide and the SonicOS 7.1 Objects Guide which combine the topics for each of those functions into a single book.

To help you understand how the books align with the features and commands, the following figure shows the books organized like the SonicWall management interface. The guides are categorized under HOME, MONITOR, DEVICE, NETWORK, OBJECT, and POLICY. Specific guides are listed under each category, with notes indicating combined guides or features requiring additional licensing.

The SonicOS Administration Guides, along with related documentation, such as the getting started guides, are available on the SonicWall technical documentation portal.

Guide Conventions

Text Conventions:

Formatting Conventions:

ConventionDescription
Bold textUsed in procedures to identify elements in the management interface like dialog boxes, windows, screen names, messages, and buttons. Also used for file names and text or values you are being instructed to select or type into the interface.
Function | Menu group > Menu itemIndicates a multiple step menu choice on the user interface. For example, NETWORK | System > Interfaces means to select the NETWORK functions at the top of the window, then click on System in the left navigation menu to open the menu group (if needed) and select Interfaces to display the page.
CodeIndicates sample computer programming code. If bold, it represents text to be typed in the command line interface.
<Variable>Represents a variable name. The variable name and angle brackets need to be replaced with an actual value. For example, in the segment serialnumber=<your serial number>, replace the variable and brackets with the serial number from your device, such as serialnumber=2CB8ED000004.
ItalicsIndicates the name of a technical manual. Also indicates emphasis on certain words in a sentence, such as the first instance of a significant term or concept.

Content Filtering Service 5.0

SonicWall offers comprehensive web content security that blocks selected web content and enforces protection and productivity policies. Content Filtering Service (CFS) protects the devices behind the firewall and provides administrators with the means to define and manage policies for groups or individual users.

Topics:

CFS Overview

URL filtering is becoming a commodity with basic requirements for blocking, based on business objectives and threat reputation. The SonicWall Content Filtering Service targets these issues and has been updated to provide more web categories to screen and a new filter so URLs can be filtered by reputation. The Reputation feature calculates a score that forecasts the security risk of a URL so you can determine how best to categorize and respond to it.

You configure Content Filtering Service settings in SonicOS. The SonicWall Content Filtering Service is available with both the Essential Protection Service Suite and the Advanced Protections Service Suite. With a valid subscription, you can create custom CFS policies and apply them to network zones or to groups of users within your organization. You can enforce policy rules for educational institutions, businesses, libraries, and government agencies. With content filter objects, you can control the websites users can access using their IT-issued computers while behind the organization's firewall.

General Process for Setting Up and Enabling Content Filtering Service:

  1. Enable Content Filtering Service. Some basic Content Filtering capability is provided, but it can be customized and expanded beyond the default tools provided. Navigate to POLICY | Security Services > Content Filter to enable the service.
  2. Define the profile objects for Content Filtering. A Profile Object defines what kind of operation can be triggered for each HTTP/HTTPS connection. Navigate to OBJECT | Profile Objects > Content Filter to edit the CFS Default Profile or add customized Content Filtering profile objects.
  3. Define the action objects for Content Filtering. An Action Object defines what happens after a packet is filtered by CFS. Navigate to OBJECT | Action Objects > Content Filter Actions to edit or define action objects.
  4. Define the reputation object for Content Filtering. A Reputation is an Action Object that defines the action to take based on the reputation of a URL. A CFS Default Reputation Object is provided, but you can create customized Reputation Objects.
  5. Define the policies for how to filter and respond to web content that users access. A default policy provides standard settings for content filters, but with additional licensing, you can create customized policies to manage different user scenarios. Navigate to POLICY | Rules and Policies > Content Filter Rules to define policies.

Configuring Content Filtering Service

The Content Filtering Service is a part of the Security Services options that SonicWall offers to help you secure your environment. The Content Filtering Service provides a default Profile Object and reputation-based Action Object for minimal coverage. You can create customized objects and policies to increase the coverage.

Topics:

Configuring the SonicWall CFS Tab

To enable and configure Content Filtering:

  1. Navigate to POLICY | Security Services > Content Filter.
  2. Define the settings on the two tabs of this window and click Accept.

The default tab, SonicWallCFS, is separated into three sections, providing status and options to set.

CFS Status:

Global Settings:

CFS Exclusion:

Configuring the CFS Custom Category Tab

The CFS Custom Category tab allows the configuration of new custom CFS category entries. You can create custom policies and categories and insert the domain name entries into the existing CFS rating category structure. Categories are added and deleted from this page.

To create a new category:

  1. Navigate to POLICY | Security Services > Content Filter and select the CFS Custom Category tab.
  2. Click +Add.
  3. Type a name in the Domain field.
  4. Select a category from the list on the left and move it to the custom categories on the right (up to five).
  5. Click Save.

To delete a custom category:

  1. Navigate to POLICY | Security Services > Content Filter and select the CFS Custom Category tab.
  2. Select the custom category by checking the box by DOMAIN.
  3. Click the Delete icon.
  4. Confirm your choice by clicking OK.

To export the CFS Category list:

  1. Click Export to export the category list to a text file in the downloads folder. The file can be used to update multiple entries.

NOTE: When editing an exported list, be sure to follow the format: <domain>: <category1>, <category2>, <category3>, <category4>, <category5>

To import multiple categories simultaneously:

IMPORTANT: All custom categories already in the list are deleted when a list of categories is uploaded.

  1. Click Import.
  2. Type the file name in the field provided, or Browse for the file and select it on your system.
  3. Click Import.

NOTE: Invalid domain names and category IDs in the importing file are skipped.

NOTE: The leading www. of any domain name is discarded during processing.

Defining Profile Objects

A Profile Object defines what kind of operation is triggered for each HTTP/HTTPS connection. You can define what is allowed, what is blocked, and what is forbidden. You can also define the operations for each category (Allowed, Blocked, Confirm, Passphrase, and BWM).

The CFS Default Profile is provided with your license. You can edit it to customize the settings but you can't delete it. You can also add other CFS profiles and customize them to meet specific filtering requirements. To define a Profile Object, navigate to OBJECT | Profile Objects > Content Filter of the firewall interface.

Topics:

Creating or Editing a Profile Object

To add a Project Object for Content Filtering:

  1. Navigate to OBJECT | Profile Objects > Content Filter.
  2. Click +Add.
  3. Enter the Profile Object Name in the Name field.
  4. In the URI List Configuration section, define the parameters for URI List:
    • Select the URI List Searching Order (Allowed URI List First or Forbidden URI List First).
    • Select the Allowed URI List from the drop-down menu. Accessing all the URIs in this list is allowed.
    • Click the Edit icon next to the Allowed URI List field to create a New URI List Object.
    • Select the Forbidden URI List from the drop-down menu. Accessing all the URIs in this object is forbidden.
    • Click the Edit icon next to the Forbidden URI List field to create a New URI List Object.
    • Select the Operation for Forbidden URI List (Block, Confirm, or Passphrase).
  5. Click the Category tab to define the Category Configuration section. You can customize the categories to fit your environment. The options are Allow, Block, Confirm, Passphrase, and BMW.
    • Expand the category name to see the details under it.
    • If you want the same definition for everything in the category, select the action from the drop-down menu for the category name.
    • If you want to customize the category, select the action from the drop-down menu for each item. Note how the category action is changed to Custom Select.
    • If you want all categories defined the same, select the action from the drop-down menu at the bottom of the page and click Set To All.
    • Click Default to reset all options to the default settings.
  6. Select Reputation to define the Reputation Configuration section. Filtering by reputation must be enabled and is used only on categories that are Allowed.
    • Switch Enable Reputation to green. [On/Off Toggle]
    • Select Reputation Action from the drop-down menu for each option.
    • NOTE: You can select the Edit icon by the drop-down menu to create a new Reputation Action Object to choose from the list.
  7. Click Save.

Creating a New URI List Object

URI List Objects can be created for both the Allowed URI List and the Forbidden URI List.

To create a URI List Object:

  1. Click the Edit icon next to the Allowed or Forbidden URI List field.
  2. Name the List Object.
  3. Select the Type of object from the drop-down menu. The options are Domain, Keyword, or URI.
  4. Click +Add to create a Domain, Keyword or URI.
  5. Enter the appropriate text in the field. Multiple entries can be separated with a semicolon.
  6. Click OK.
  7. Click Save.

Advanced Settings

You can define a series of advanced settings to further define your CFS Profile Object. These appear on a separate tab when you add or edit a CFS Profile Object. You can define the advanced settings when creating the object or you can set them later.

  1. Navigate to OBJECT | Profile Objects > Content Filter.
  2. Click +Add.
  3. Click the Advanced tab.
  4. Click the switch to green to Enable HTTPS Content Filtering. [On/Off Toggle] HTTPS content filtering is IP based, and does not inspect the URL. While HTTP content filtering can perform redirects to enforce authentication or provide a block page, HTTPS filtered pages are silently blocked.
  5. Click the switch to green to Enable Smart Filtering for Embedded URI. [On/Off Toggle] This feature currently only applies to Google Translate, and it requires that DPI-SSL be enabled along with Content Filtering. This option is disabled by default.
  6. Click the switch to green to Enable Safe Search Enforcement. [On/Off Toggle] This feature currently only applies to Yahoo and Dogpile, and for HTTPS sites, it requires that DPI-SSL be enabled along with Content Filtering, as noted above. This option is disabled by default.
  7. Click the switch to green to Enable Google Force Safe Search. [On/Off Toggle]
  8. Click the switch to green to Enable YouTube Restrict Mode. [On/Off Toggle]
  9. Click the switch to green to Enable Bing Force Safe Search. [On/Off Toggle]
  10. Click Save when done.

Consent

You can require consent to access certain web pages as a part of your CFS Profile Object. These appear on a separate tab when you add or edit a CFS Profile Object. You can enable Consent when creating the object or you can set those parameters later.

  1. Navigate to OBJECT | Profile Objects > Content Filter.
  2. Click +Add.
  3. Click the Consent tab.
  4. Click the switch to green to Enable Consent. [On/Off Toggle]
  5. Set the User Idle Timeout in minutes. This feature reminds users that their time has expired by displaying the page defined in the Consent page URL. Minimum idle time can be as low as one minute, but as high as 9999 minutes. The default is set to 15 minutes.
  6. In the Consent Page URL Optional Filter field, list the URL that the user is redirected to when he or she opens a web site that requirements consent. This page must reside on a Web server and be accessible as a URI by users on the network.
  7. In the Consent Page URL (Mandatory Filtering) field, list the URL that the user is redirected to when he or she opens a web site with mandatory filtering. This page must reside on a Web server and be accessible as a URI by users on the network.
  8. Select the Mandatory Filtering Address from the drop-down menu. All configured IP addresses associated with a selection or object require mandatory filtering.
  9. Click Save.

IMPORTANT: The consent page must contain links to two SonicWall pages, which, when selected, tell the appliance that the user wishes to have filtered or unfiltered access. The link for unfiltered access is: 192.168.168.168/iAccept.html. The link for filtered access is: 192.168.168.168/iAcceptFilter.html. Use the LAN IP of the appliance for the link root.

IMPORTANT: The mandatory filtering page must contain the following SonicWall link, which, when selected, tells the appliance that the user accepts filtered access. The link for filtered access is: 192.168.168.168/iAcceptFilter.html. Use the LAN IP of the appliance for the link root.

Custom Header

Content Filtering can be enabled so that a header configured by customers can be added to HTTP and HTTPS requests. For HTTPS requests, DPI-SSL functionality must also be enabled. By default the Custom Header is disabled.

To set up a Custom Header:

  1. Navigate to OBJECT | Profile Objects > Content Filter.
  2. Click +Add.
  3. Click the Custom Header tab.
  4. Click the switch to green to Enable Custom Header Insertion. [On/Off Toggle]
  5. Click the Add icon (+) to add a new Custom Header Entry.
  6. Select Domain from the drop-down menu. The Key and Value fields are automatically filled in based on your selection.
  7. Click Save to save the Custom Header Entry.
  8. Click Save to save the Custom Header settings.

Editing Profile Objects

Editing an object profile is very similar to creating one.

To edit a CFS profile object:

  1. Navigate to Object | Profile Objects > Content Filter.
  2. Select the object you want to edit.
  3. Click the Edit icon, which appears to the far right of the screen.
  4. Navigate the options (URI List, Category, Reputation) on the Settings window to make the changes needed.
  5. Navigate through the other tabs—Advanced, Consent, Custom Header—to make the changes needed there.
  6. Click Save when done.

Deleting Profile Objects

Several different options are provided for deleting a Content Filtering Profile Object. However you do it, you are asked to confirm that you really want to delete the item.

NOTE: The CFS Default Profile cannot be deleted.

Configuring CFS Action Objects

The CFS Action Object defines what happens after a packet is filtered by CFS and matches a CFS policy. SonicWall provides the CFS Default Action object. This object cannot be deleted but you can edit it and customize some of the settings. You can also add and delete customized action objects for CFS. To configure CFS Action Objects, navigate to OBJECT | Action Objects > Content Filter Actions.

Topics:

Adding or Editing CFS Action Objects

Adding and editing an action object is very similar. The following procedures describe the options you can set in either instance.

To add a Project Object for Content Filtering:

  1. Navigate to OBJECT | Action Objects > Content Filter Actions.
  2. Click +Add.

To edit a Project Object for Content Filtering:

  1. Navigate to OBJECT | Action Objects > Content Filter Actions.
  2. Highlight the action object and click the Edit icon.

To set or change the parameters for a CFS Action Object:

  1. Open the CFS Action Object window as previously described.
  2. Enter or edit the action object Name in the field provided.
  3. Click the switch to green to Wipe Cookies. [On/Off Toggle] This feature takes effect for HTTPS sites, only when Content Filter is enabled for the DPI-SSL Client SSL.
  4. Click the switch to green to Enable Flow Reporting. [On/Off Toggle] This feature allows CFS flow data to be collected for analysis.

NOTE: The name of the CFS Default Action cannot be changed.

NOTE: The DPI-SSL Client SSL is set on the General tab at POLICY | DPI-SSL > Client SSL.

IMPORTANT: If the Wipe Cookies option is enabled, it could break the Safe Search Enforcement function for some search engines.

Block Tab:

In the Block tab of the Operations Configurations section, define the HTML for the blocked page you want to display.

Passphrase Tab:

In the Passphrase tab of the Operations Configurations section, define the settings for requiring a passphrase when certain URIs are detected.

NOTE: For HTTPS sites, the Content Filtering option for the DPI-SSL Client SSL must be enabled for Passphrase to work. Navigate to the General tab at POLICY | DPI-SSL > Client SSL to set this.

Confirm Tab:

In the Confirm tab of the Operations Configurations section, define the settings for requiring a confirmation when certain URIs are detected.

NOTE: For HTTPS sites, the Content Filtering option for the DPI-SSL Client SSL must be enabled for Confirm to work. Navigate to the General tab at POLICY | DPI-SSL > Client SSL to set this.

BWM Tab:

In the BMW tab of the Operations Configurations section, define the settings for bandwidth management when certain URIs are detected.

Deleting Action Objects

Several different options are provided for deleting a Content Filtering Action Object. Whichever way you do it, you are asked to confirm that you really want to delete the item.

NOTE: The CFS Default Action cannot be deleted.

Configuring the Reputation Match Object

The Reputation match object is used to simplify the process for defining objects and policies. A reputation score is calculated and categorized based on value. The six categories are:

The Reputation Object defines the operation for something that is found to match one of these categories. Operations include Allow, Block, Confirm, Passphrase, and BWM. The default value for High Risk and Suspicious is to block access. The default for the other categories are to allow access.

SonicWall provided a CFS Default Reputation Object. This object cannot be deleted, but can be edited or cloned. Customized Reputation Objects can also be developed.

Topics:

Adding or Editing a Reputation Object

To add a Reputation Object:

  1. Navigate to OBJECT | Match Objects > Reputation.
  2. Click +Add to add a new object, or click the Edit icon for the object you want to edit.

Enter or update the object Name.

Select the action you want to take—Allow, BMW, Block, Confirm, or Passphrase—from the drop-down menu for each category. The categories are defined in the following table. The lower the scores indicate higher the risk.

CategoryReputation Score
High Risk01-20
Suspicious21-40
Moderate Risk41-60
Low Risk61-80
Trustworthy81-100
URL without Reputation0

Add Comments in the field provided.

Click Save. The new object appears in the Reputation table.

Cloning a Reputation Object

The Cloning option allows you to copy an existing Reputation Object and customize it without having to start with a brand new, empty template. It is very similar to creating a new object, but you change only those fields that need to be different from the source.

To clone a Reputation Object:

  1. Navigate to OBJECT | Match Objects > Reputation.
  2. Select the object you want to clone.
  3. Select the Clone icon.
  4. Give the object a new Name.
  5. Change the category definitions as needed.
  6. Add Comments in the field provided.
  7. Click Save.

Deleting a Reputation Object

Several different options are provided for deleting a Content Filtering Reputation Object. However you do it, you are asked to confirm that you really want to delete the item.

NOTE: The CFS Default Reputation Object cannot be deleted.

Configuring CFS Policies and Rules

After CFS is configured and the objects needed for the policy have been defined, you can define the CFS rules for managing CFS content. To define the CFS rules and policies, navigate to POLICY | Rules and Policies > Content Filter Rules.

Topics:

Adding or Editing CFS Policy Rules

Adding and editing Content Filtering rules is very similar. The following procedures describe the options you can set in either instance.

To add a Content Filter Rule:

  1. Navigate to POLICY | Rules and Policies > Content Filter Rules.
  2. Click +Add.

To edit a Content Filer Rule:

  1. Navigate to POLICY | Rules and Policies > Content Filter Rules.
  2. Highlight the action object and click the Edit icon.

To define or update the parameters for a Content Filer Rule:

  1. Open the CFS Policy window as previously described.
  2. Select a Source Zone from the drop-down menu.
  3. Select a Destination Zone from the drop-down menu.
  4. Select the Source Address Included from the drop-down menu. If you need to create a new address object for this rule, you can click the Edit icon beside the field.
  5. Select the Source Address Excluded from the drop-down menu. If you need to create a new address object for this rule, you can click the Edit icon beside the field.
  6. Select the User/Group Included from the drop-down menu.
  7. Select the User/Group Excluded from the drop-down menu.
  8. Select the Schedule from the drop-down menu during which the policy is applied. If you need to create a new schedule object for this rule, you can click the Edit icon beside the field.
  9. Select the Profile from the drop-down menu. The items in the list are the same profiles listed in the CFS Profile Objects table. If you need to create a new profile object for this rule, you can click the Edit icon beside the field.
  10. Select the Action from the drop-down menu. The items in the list are the same actions listed in the CFS Action Objects table. If you need to create a new action object for this rule, you can click the Edit icon beside the field.
  11. Click OK when done.

Deleting CFS Policy Rules

Several different options are provided for deleting a Content Filtering policy and rules. Whichever way you do it, you are asked to confirm that you really want to delete the item.

Monitoring Content Filtering

One of the first places you might look for status information is in the HOME section of the interface.

To confirm licensing status:

  1. Navigate to HOME | Dashboard > System > Device tab.
  2. Scroll down to see the Services pane.
  3. Look for Content Filtering in that pane.

This example shows that Content Filtering Service is currently not licensed. You can click on the License? link to go to DEVICE | Settings > Licenses to renew or activate the suite of services with Content Filtering in it.

If your CFS license is active, you can also go to HOME | Dashboard > System > Security Services tab. Scroll to the Content Filter pane to see the details of the license.

SonicWall Support

Technical support is available to customers who have purchased SonicWall products with a valid maintenance contract.

The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. To access the Support Portal, go to https://www.sonicwall.com/support.

The Support Portal enables you to:

To contact SonicWall Support, visit https://www.sonicwall.com/support/contact-support.

About This Document

SonicOS Content Filtering Administration Guide

Updated - December 2023

Software Version - 7.1

232-005886-00 Rev A

Copyright © 2023 SonicWall Inc. All rights reserved.

The information in this document is provided in connection with SonicWall and/or its affiliates' products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. and/or its affiliates do not make any commitment to update the information contained in this document.

For more information, visit https://www.sonicwall.com/legal.

End User Product Agreement

To view the SonicWall End User Product Agreement, go to: https://www.sonicwall.com/legal/end-user-product-agreements/.

Open Source Code

SonicWall Inc. is able to provide a machine-readable copy of open source code with restrictive licenses such as GPL, LGPL, AGPL when applicable per license requirements. To obtain a complete machine-readable copy, send your written requests, along with certified check or money order in the amount of USD 25.00 payable to "SonicWall Inc.", to:

General Public License Source Code Request
Attn: Jennifer Anderson
1033 McCarthy Blvd
Milpitas, CA 95035

Models: SonicOS 7.1 Content Filtering, SonicOS 7.1, Content Filtering, Filtering

File Info : application/pdf, 38 Pages, 1.15MB

PDF preview unavailable. Download the PDF instead.

sonicos-7-1-content filtering

References

madbuild

Related Documents

Preview SonicOS 7.1 Dashboard Administration Guide - SonicWall
Comprehensive administration guide for SonicWall SonicOS 7.1, focusing on the Dashboard features for network monitoring, security management, and device configuration. Learn about system views, access points, topology, threat analysis, and more.
Preview SonicOS 7.1 System Administration Guide
A comprehensive guide to administering and monitoring the SonicWall family of firewalls using SonicOS 7.1. This document details network configuration, security services, and advanced features for network administrators.
Preview SonicOS 7 Rules and Policies Administration Guide
Comprehensive guide to configuring network security policies, access rules, NAT, routing, content filtering, and application control within SonicWall's SonicOS 7.
Preview SonicOS 8 Capture ATP Administration Guide
Comprehensive guide to administering SonicWall's Capture ATP service on SonicOS 8, covering setup, configuration, threat analysis, and management for enhanced network security.
Preview SonicOS 7.1 Logs Administration Guide
Comprehensive administration guide for SonicOS 7.1, detailing system logs, auditing logs, threat logs, and SonicWall support resources. Learn to configure, manage, and monitor your SonicWall firewall security.
Preview SonicOS 7.1 Access Points Administration Guide
This administration guide from SonicWall provides comprehensive instructions for configuring, managing, and troubleshooting SonicOS 7.1 Access Points, including SonicPoint and SonicWave devices. Learn about provisioning, firmware updates, RF monitoring, and advanced security features.
Preview SonicOS 7.0 Internal Wireless Administration Guide
This administration guide provides comprehensive instructions for configuring and managing the internal wireless features of SonicWall's SonicOS 7.0, covering setup, security, and advanced settings for network security appliances.
Preview SonicOS 7.1 Tools & Monitors Administration Guide
A comprehensive guide detailing the Tools & Monitors features within SonicOS 7.1, covering packet monitoring, connection logging, core process monitoring, and packet replay for SonicWall network security appliances.