Limitations and Precautions for URL Filtering
Read limitations and precautions before configuring URL filtering.
Hardware Requirements
The URL filtering function is supported by all models.
Only the USG6510E/6510E-POE/6530E does not support safe search for HTTP search requests.
License Requirements
The URL filtering blacklist and whitelist functions, user-defined URL categories, and predefined URL categories based on the preset URL category database are not license-controlled.
The URL remote query function is URL remote query license-controlled. For details about the license control scopes, see the License Control Items.
Component package Requirements
To use the URL remote query function, you need to load the URL remote query component package. For details about the component package, see Dynamic Loading.
Limitations for URL Categories
- If the URL remote query license and component package are not loaded, the configuration items of the remote URL query function are unavailable on the web UI.
- User-defined URL categories have a higher priority than predefined URL categories.
- If the domain name in a URL request meets any of the following conditions, remote query-based URL category filtering is not supported. If the domain name does not match the URL blacklist/whitelist, user-defined URL categories, or predefined categories in the local cache, the device takes the action specified for the Others category (allow by default) and does not perform remote query.
- The domain name length is less than four bytes.
- The domain name starts and ends with a hyphen (-).
- The domain name contains characters other than letters, digits, hyphens (-), colons (:), and periods (.).
- Invalid IPv6 address
- Other domain names that do not comply with RFC standards (such as RFC 1034 and RFC 1035)
Limitations for Safe Search
- The safe search function can be available only when a TCP proxy policy and an SSL-encrypted traffic detection policy are configured on the FW.
- For HTTP search requests, you need to configure a TCP proxy policy on the FW.
- For HTTPS search traffic, you need to configure an SSL-encrypted traffic detection policy on the FW.
- The safe search of the FW does not take effect when the SSL proxy is deployed between the browser and the browser proxy server.
- The URL safe search function is unavailable in the following scenarios:
- Protocol traffic scenarios that are not supported by the FW, such as HTTP/2, HTTP/3, and QUIC
- URL GET requests are segmented in cross-packet scenarios.
- POST request scenario for the YouTube search engine
- Scenario where encrypted traffic cannot be decrypted by the FW
The URL safe search function is implemented based on some solutions disclosed by the search engine service provider. The actual filtering effect depends on the safe search capabilities of the service provider. The FW cannot 100% ensure the safe search filtering effect.
URL safe search and DNS safe search must be used together.
Limitations for Google Account Control
Restrictions for Encrypted Traffic Filtering of HTTPS URL Filtering
Other Limitations for URL Filtering
- In the exact match mode of the URL/HOST rule in URL filtering, the length of URLs that can be matched cannot contain more than 1279 characters. If the URL length exceeds this limit, exact match cannot be performed. In this case, you need to change the match of the URL/HOST rule to fuzzy match (with the wildcard *).
- The default HTTP port number is 80, and the default HTTPS port number is 443. If the server uses the default port, you do not need to configure the port number in a URL filtering rule. If the server uses a non-default port, the port number is mandatory in a URL filtering rule. For example, to block the access of 10.1.1.1, if the server uses the default port 80, configure 10.1.1.1 instead of 10.1.1.1:80 in the URL filtering blacklist; if the server uses port 8080, configure 10.1.1.1:8080 in the URL filtering blacklist.
- The URL filtering function is unavailable in the networking where the forward and return packet paths are different.
- The URL filtering function does not support filtering online-proxied URL requests.
- URL filtering supports IPv4 and IPv6.
- The port mapping function supports only IPv4.
- If the browser (for example, Google Chrome) caches a web page, the browser does not request the web page but refreshes the sub-pages on the web page when the web page is accessed again. This may result in the failure to display the URL filtering push page. Therefore, you are advised to clear the browser cache before using the URL filtering push page.
- The TCP proxy and SSL-encrypted traffic detection features do not support IPv6. Therefore, the following situations occur:
- IPv6-based HTTPS traffic cannot be decrypted during SSL encrypted traffic detection.
- The IPv6-based safe search function does not take effect.
- The FW preferentially ensures network connectivity based on the service preference principle. URL filtering is a functional component, and its effect is affected by multiple factors. The URL filtering effect cannot be 100% guaranteed.
The factors include but are not limited to device performance overload (traffic burst and traffic threshold-crossing), insufficient resources (such as CPU, memory, and queue channel resources), performance first mode, escape mechanism in resilience scenarios where URL filtering is bypassed. (Examples of such scenarios include integrated policy matching timeouts, protocol decoder exceptions, and domain names with special characters.)
In scenarios where strict domain name control (such as monitoring) is required, a single FW cannot 100% ensure the filtering effect. In this case, you are advised to select a proper end-to-end solution.
Precautions for URL Filtering
- When the URL filtering is used to perform content security detection on traffic, the performance of the device is affected. Therefore, configure the function as required.
- The URL filtering function takes effect for all URL requests, including the web pages accessible to users and all website links on a web page. Generally, URL filtering rules take effect only for the URLs of web pages. To limit the website links on web pages, configure separate URL filtering rules.
- If a URL rule contains a number sign (#), # and the following string do not apply to rule matching. If the URL that a user accesses contains #, # and the following string will not be sent to the URL module for URL matching.
- If a session contains multiple URLs, the FW performs URL filtering on each URL and blocks the entire session as long as any one of the URLs is blocked.
- If the FW is deployed between two routers, and the routers detect each other through BFD, you are advised to properly prolong the BFD time (longer than 100 ms is recommended) to prevent BFD flapping resulting from occasional network congestion.
- To ensure that functions such as the URL blacklist and whitelist take effect, you need to configure the fuzzy match method for HTTPS URL filtering. For example, you can set the fuzzy match mode of www.huawei.com to *huawei*.
- The embedded URL filtering whitelist function solves the problem that users cannot access some embedded web pages in the whitelist. This function needs to obtain the Referer field (identifying the web page from which a user is directed) in an HTTP request for whitelist matching. Pay attention to the following when using this function:
- For HTTPS requests, you need to configure SSL-encrypted traffic detection for decryption so that the device can obtain the Referer field information and match against the embedded whitelist.
- Generally, when you access an embedded web page, the browser sets the HTTP Referer field information.
- If the embedded page request does not contain the HTTP Referer field due to special browser settings, the embedded whitelist function is unavailable.
- When a user attempts to access an embedded web page in the whitelist, if the resources (such as images, CSS files, JS files, and subpages) contained in the embedded web page are not in the whitelist, URL filtering blocks the access.
- Therefore, only some static content can be displayed on the embedded web page, and the URL filtering blocking page is displayed for the blocked content.