No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Web-based Configuration Guide

AR650, AR1600, and AR6100 V300R003

This document describes how to configure and maintain your routers using the web platform.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
URL Filtering Policy

URL Filtering Policy

Context

As Internet applications rapidly develop, the computer network is widely applied, which facilitates information obtaining, sharing, and spreading. However, this brings enterprises the following threats:
  • Employees access the websites that are irrelevant to their jobs, affecting working efficiency.
  • Employees access illegal or malicious websites that may cause attacks caused by viruses including Trojan horses, and worms.

URL filtering is used to control URLs that users access. Website resources that are open to users are limited.

By default, one URL filtering policy is predefined on a device. If the predefined intrusion defense policy meets scenario requirements, you can reference the predefined URL filtering policy. The following parameters are used to distinguish the predefined URL filtering policy and its scenario:
  • default

    Default policy. This policy contains all signatures and its action is Allow and HTTP packets are allowed to pass without any processing.

Prerequisite

To use the deep security function, you must enable it. By default, the deep security function is disabled.

  1. Open the Service Management page.

    Log in to the web system, choose System Management > System Configuration > Service Management to open the Service Management page, as shown in Figure 14-34.

    Figure 14-34  Service Management tab page

  2. Enable or disable deep security.
    • Enable deep security.

      In the Service Management area, click Enabled > Apply of Value-added security service to enable the deep security function.

    • Disable deep security.

      To disable deep security, click Disable and Apply, and restart the device.

      After the device restarts, the deep security configurations are deleted.

Procedure

  • Configuring a URL filtering policy list

    • Creating a URL filtering policy

    1. Access the URL Filtering Policy tab page, as shown in Figure 14-35.

      Log in to the tab pageDeep Security and choose URL Filtering Policy.

      Figure 14-35  URL Filtering Policy tab page

    2. In the URL Filtering Policy Configuration List area, click Create and set parameters of the URL filtering policy. Table 14-13 describes the parameters, as shown in Figure 14-36.

      Table 14-13  URL filtering policy parameters

      Parameter

      Description

      Policy name

      Name of the URL filtering policy.

      Default action

      Default action.
      • Allow: HTTP packets are allowed to pass without any processing.
      • Block: HTTP packets are discarded, which is recorded in the log. A block page is displayed on the terminal of the user that sends HTTP requests.
      • Alert: HTTP packets are allowed to pass, which is recorded in the log.

      All URL categories without actions configured use the default action.

      URL classification

      • Enable Predefined URL Classification is chosen by default, it can be used to control user access to common websites, by default, Filtering Level is low. Set the filtering level, for details, see Table 14-14.
      • Enable User-Defined URL Classification can be used to control user access to websites that are not controlled by predefined categories and websites defined by the administrator. After clicking Enable User-Defined URL Classification, you can add, modify, or delete a URL category. For details, see Configuring a URL category. If no action is configured for a URL category, the default action Allow is used. To modify the action, select the URL category and choose Alert or Block from the Action drop-down list box.

      URL whitelist

      URL whitelist containing learning websites that employees can access at any time.

      1. Click Enabled. The URL whitelist function is enabled.
      2. Enter a URL on each line in the dialog box. You can add the wildcard (*) indicating any character to the start or end of the URL.
      NOTE:

      The whitelist is prior to the blacklist. If the URL that a user wants to access is in the URL whitelist, packets from the user are allowed to pass and the URL is not compared against the URL blacklist.

      URL blacklist

      URL blacklist containing websites that employees cannot access at any time, including the entertainment, game, and video websites.

      1. Click Enabled. The URL blacklist function is enabled.
      2. Enter a URL on each line in the dialog box. You can add the wildcard (*) indicating any character to the start or end of the URL.
      NOTE:

      If the URL that a user wants to access is not in the URL whitelist, the URL is compared against the URL blacklist. If the URL is in the URL blacklist, the URL is blocked. If the URL is not in the URL blacklist, the device queries the URL category.

      Table 14-14  Filtering levels of the predefined URL category library

      Filtering Level

      Description

      High

      Strictly controls access to all adult websites, illegal websites, social websites, and video sharing websites.

      Medium

      Controls access to all adult websites and illegal websites.

      Low

      Controls access to porn websites.

      Predefined action type

      1. Click Configuration. The Set Predefined Classification Action dialog box is displayed.
      2. Set the predefined actions in either of the following ways:

        • Select a main category such as Download and set an action (allow, alert, or block) for the category.
        • Click and select a subcategory (such as e-Books under Download). Set an action for the subcategory for accurately controlling the URL category.
      3. Click OK.

      Figure 14-36  Create URL Filtering Policy

    3. Click OK.

    • Modifying a URL filtering policy

    1. Select a URL filtering policy in the URL Filtering Policy Configuration List area and click .
    2. In the Modify URL Filtering Policy dialog box, modify the parameters, among which Policy name cannot be changed.
    3. Click OK.

    • Deleting a URL filtering policy

    1. Select a URL filtering policy in the URL Filtering Policy Configuration List area and click Delete.
    2. In the dialog box that is displayed, click OK. The URL filtering policy is deleted.
  • Configuring a URL category

    • Creating a user-defined URL category

    1. Click Create in URL Classification and set parameters. Table 14-15 describes the parameters.

      Table 14-15  URL category parameters

      Parameter

      Description

      Name

      Name of the URL category.

      URL

      Specified URL. Enter a URL on each line. You can add the wildcard (*) indicating any character to the start or end of the URL.

      Figure 14-37  Create URL Classification

    2. Click OK.

    • Modifying a user-defined URL category

    1. Select User-defined Classification in URL Classification and click .
    2. In the Modify URL Classification dialog box, modify the parameters, among which Name cannot be changed.
    3. Click OK. The URL category is modified.

    • Deleting a user-defined URL category

    1. Select User-defined Classification in URL Classification and click Delete.
    2. In the dialog box that is displayed, click OK. The user-defined URL category is deleted.
  • Committing the configuration

    After the preceding configurations are complete, click Submit to make the configurations take effect. In the dialog box that is displayed, click OK.

Download
Updated: 2019-04-12

Document ID: EDOC1100041803

Views: 33063

Downloads: 79

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next