Fortinet white logo
Fortinet white logo

Administration Guide

Filtering

Filtering

Web filtering is used to block access to harmful, inappropriate, and dangerous web sites (see FortiGuard filter).

Email filtering is used to detect and block spam messages (see FortiGuard-based filters).

To configure filtering in the GUI:
  1. Go to System > FortiGuard
  2. Scroll down to the Filtering section.
  3. Configure the settings as needed:

    Web Filter Cache

    Enable/disable web filter cache, and set the amount of time that the FortiGate will store a blocked IP address or URL locally. After the time expires, the FortiGate contacts the FDN to verify the address.

    Email Filter Cache

    Enable/disable email filter cache, and set the amount of time that the FortiGate will store an email address locally.

    FortiGuard filtering services

    The protocol and port used to contact the FortiGuard servers. These options can be changed in the CLI.

    Filtering service availability

    The status of the filtering service. Click Test Connectivity if the filtering service is not available.

    Request re-evaluation of a URL's category

    Click to re-evaluate a URL category rating on the FortiGuard web filter service.

  4. Click Apply.
To configure filtering in the CLI:
config system fortiguard
    set protocol {https | udp}
    set port {443 | 53 | 8888} 
    set antispam-force-off {enable | disable}
    set antispam-cache {enable | disable}
    set antispam-cache-ttl <integer>
    set antispam-cache-mpercent <percent>
    set antispam-timeout <integer>
    set webfilter-force-off {enable | disable}
    set webfilter-cache {enable | disable}
    set webfilter-cache-ttl <integer>
    set webfilter-timeout <integer>
end
Note

When anycast is enabled (by default) the protocol is HTTPS and the port is 443.

Filtering

Filtering

Web filtering is used to block access to harmful, inappropriate, and dangerous web sites (see FortiGuard filter).

Email filtering is used to detect and block spam messages (see FortiGuard-based filters).

To configure filtering in the GUI:
  1. Go to System > FortiGuard
  2. Scroll down to the Filtering section.
  3. Configure the settings as needed:

    Web Filter Cache

    Enable/disable web filter cache, and set the amount of time that the FortiGate will store a blocked IP address or URL locally. After the time expires, the FortiGate contacts the FDN to verify the address.

    Email Filter Cache

    Enable/disable email filter cache, and set the amount of time that the FortiGate will store an email address locally.

    FortiGuard filtering services

    The protocol and port used to contact the FortiGuard servers. These options can be changed in the CLI.

    Filtering service availability

    The status of the filtering service. Click Test Connectivity if the filtering service is not available.

    Request re-evaluation of a URL's category

    Click to re-evaluate a URL category rating on the FortiGuard web filter service.

  4. Click Apply.
To configure filtering in the CLI:
config system fortiguard
    set protocol {https | udp}
    set port {443 | 53 | 8888} 
    set antispam-force-off {enable | disable}
    set antispam-cache {enable | disable}
    set antispam-cache-ttl <integer>
    set antispam-cache-mpercent <percent>
    set antispam-timeout <integer>
    set webfilter-force-off {enable | disable}
    set webfilter-cache {enable | disable}
    set webfilter-cache-ttl <integer>
    set webfilter-timeout <integer>
end
Note

When anycast is enabled (by default) the protocol is HTTPS and the port is 443.