Skip to main content

Enable and overwrite Content Filter

Enable Content Filter


  • Content filtering functionality is part of Enterprise Firewall.
  • Under Content Filter you have the option to enable Web Filter, Safesearch and Antivirus.
  • The Activation of the Content Filter option is done at the VPN level.

plot

Configuration option TLS Inspection


  1. For Security go to Outbound Links / Content Filter

  2. First, select TLS Inspection Mode because this selection affects other options such as "Anti-Virus" and Web Filter. Choose between Deep Inspection Mode and Certificate Inspection Mode.

Deep Inspection

  • Today, most Internet traffic is encrypted.
  • To check the content of encrypted web traffic, the firewall must decrypt it, the decrypted data can then be inspected accordingly.
  • After the content filter has filtered the data stream, the connection with the Swisscom certificate is encrypted and forwarded to the client.
  • For the client to trust the certificate, this certificate must be installed on the client.
  • If you want to enable anti-virus on your firewall, the Deep Inspection option must be enabled.
  • Activating Deep Inspection will result in a reduction of network performance.
  • This is to be expected as the operations associated with deep inspection are computationally intensive.
  • If the performance drop is too high, you have the option to whitelist the websites you trust.
  • Deep Inspection will not inspect the URLs listed on the whitelist.

Certificate Verification

  • In contrast to Deep Inspection, this option does not break the network packets for inspection, but the firewall only controls the website SSL certificate.
  • Devices on which a certificate installation difficult or impossible, this option can be used to create Internet access.
  • If a website is blocked according to your category, no splash page appears in the browser.
  • "Certificate Verification" does not check web traffic for signs of malware.
  • This option allows you to ensure that the Web server you are reaching has a valid certificate.

Configuration: Install SSL Certificate for Deep Inspection

  • To check the encrypted web traffic, the web filter decrypts the connection and encrypts it with the Swisscom Webfilter certificate.
  • The Web Filter Gateway Certificate can be downloaded from this website.
  • Attention: To download the certificate, you must be on the LAN where the web filter is enabled.
  • The file can be installed on the device (laptop, tablet, etc...) by a user who has local administrator rights on the device (e.g. for Internet Explorer).

plot

SafeSearch


  • SafeSearch is an option to filter offensive search results, such as pornographic content, from search engine results.
  • SafeSearch does not always work seamlessly.
  • However, it may help you to avoid explicit (explicit) and inappropriate search results on your smartphone, tablet or computer.
  • SafeSearch covers searches on Google, Chrome and Bing today.
  • When you enable SafeSearch in the dashboard, an additional option is appended to the URL or HTTP request to force it into safe mode.
  • When SafeSearch is enabled, traffic is TLS-inspected, even if the user has not explicitly selected Deep Inspection under TLS-Inspection.

Antivirus


  • The Antivirus option scans the contents of web connections for known virus patterns.
  • It can be activated in the dashboard under Managed Security > Outbound Links > Content Filter.
  • For the Antivirus option, the certificates must be installed and Deep Inspection enabled to verify encrypted connections.
  • Once you enable Anti-Virus in the dashboard, you will be prompted to install the certificate on your devices.
  • Click Installation Instructions to get step-by-step guidelines for installing the certificates on your devices.

plot

Web Filter


  • The Web Filter option requires the certificates to be installed to verify encrypted connections.
  • Here you can select one of the three web filter level templates, Weak / Medium / Strong.
  • The predefined Web Filter Ruleset templates are listed in the table below (A= Allow / B=Block / M=Monitor)

B: Traffic is blocked by the web filter. M: The traffic is monitored and is visible in the report. A: Traffic is not monitored and is not visible in the report.

plot plot plot plot plot plot

Webfilter Ruleset


  • The Web Filter Ruleset can be configured individually in each subcategory based on category.
  • Websites of the categories, Banking / Health and Insurance are excluded from the web filter and are not monitored.

Note:

  • If you want to enable the web filter, make sure that the firewall rules allow traffic specifically on ports 80 and 443.
  • If you want to enable anti-virus, in addition to ports 80 and 443, traffic on ports 25,465,110,143,993,995 should also be allowed.

plot

  • Finally, you can enable a global whitelist or a global blacklist here at the VPN level.
  • URL filtering does not require an in-depth investigation.
  • It can access domain names even in encrypted sessions.

plot

Overwrite Content Filter

  • You have the option to override the content filter settings configured on the VPN level.
  • To do this, you can activate the setting Content Filter Override on the firewall rule level.

Configuration


  1. Select Security > Outbound Links and the corresponding VPN.

  2. Then Content Filter Note: If you have previously activated AntiVirus in the global Content Filter settings, you can deactivate http traffic if necessary

  3. Override global settings: move the slider to the right to activate it

  4. Save the configuration

  5. The configuration is activated by sending the shopping cart.

Content filter overrides can be applied to:

  • TLS inspection for the ports: 443, 465, 993, 995
  • Antivirus for the ports: 25, 80, 110, 143, 443, 465, 993, 995
  • Webfilter for the ports: 80 and 443
  • Attempting to override the content filter on port 22 does not work