Using Access Control Rules to Enforce Content Restriction

The following procedure explains how to configure access control rules to restrict content.”

Note

When safe search is enabled in an access control rule, inline normalization is enabled automatically.

Procedure


Step 1

Create a decryption policy.

Step 2

Add rules for handling Safe Search traffic:

  • Choose Decrypt - Resign as the Action for the rules.

  • In Applications, add selections to the Selected Applications and Filters list:

    • Safe Search—Add the Category: search engine filter.

Step 3

Set rule positions for the rules you added. Click and drag, or use the right-click menu to cut and paste.

Step 4

Create or edit an access control policy, and associate the decryption policy with the access control policy.

Step 5

In the access control policy, add rules for handling Safe Search traffic:

  • Choose Allow as the Action for the rules.

  • In Applications, click the icon for Safe search (safe search icon) and set related options.

  • In Applications, refine application selections in the Selected Applications and Filters list.

    In most cases, enabling Safe Search populates the Selected Applications and Filters list with the appropriate values. The system does not automatically populate the list if a Safe Search application is already present in the list when you enable the feature. If applications do not populate as expected, manually add them as follows:

    • Safe Search—Add the Category: search engine filter.

For more information, see Configuring Application Conditions and Filters.

Step 6

Set rule positions for the access control rules you added. Click and drag, or use the right-click menu to cut and paste.

Step 7

Configure the HTTP response page that the system displays when it blocks restricted content; see Choosing HTTP Response Pages.

Step 8

Deploy configuration changes.