Create and Manage Content Filtering Profiles
Use the Create Content Filtering Profiles page to configure content filtering profiles. Content filtering blocks or permits certain types of traffic based on the MIME type, file extension, and protocol command. The content filter controls file transfers across the device by checking traffic against configured filter lists. The following table describes the types of content filters that you can configure as part of a content filtering profile.
The content filtering profile evaluates traffic before all other content security profiles. Therefore, if traffic meets criteria configured in the content filter, the content filter acts first upon this traffic.
Type |
Description |
---|---|
Protocol Command Block and Permit Lists |
Different protocols use different commands to communicate between servers and clients. By blocking or allowing certain commands, traffic can be controlled on the protocol command level. The block or permit command lists are intended to be used in combination, with the permit list acting as an exception list to the block list. Note:
If a protocol command appears on both the permit list and the block list, the command is permitted. |
Extension Block List |
It is recommended to use file extensions to block or allow file transfers, because the name of a file is available during the transfers. All protocols support the use of the extension block list. |
MIME pattern filter |
MIME patterns are used to identify the type of traffic in HTTP and MAIL protocols. There are two lists of MIME patterns that are used by the content filter to determine the action to be taken. The MIME Block List contains a list of MIME type traffic that is to be blocked. The MIME Permit List contains MIME patterns that permitted by the content filter and are generally subsets of items on the block list. Note:
The MIME permit list has a higher priority than the block list. |
Create Content Filtering Profiles
Manage Content Filtering Profiles
-
Edit—Select the profile, and then click the pencil icon (
). You cannot modify the default profiles already present in the system.
-
Clone—Select the profile, and then click
. -
Delete—Select the profile, and then click the trash can icon (
). Before deleting an antispam profile, ensure that the profile is not used in a content security profile that is, in turn, used in a firewall policy rule. If you try to delete an antispam profile that is used in a firewall policy rule, an error message is displayed.