How To - Block Unauthorized Internet Access through Proxies How To Block Unauthorized Internet Access through Proxies Applicable Version: 10.00 onwards Overview A Proxy is a tool that attempts to make a user s activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the computer's identifying information. Users tend to use the services of proxies to bypass Cyberoam s restrictive policies. Hence, it is required to block access to these proxies themselves. This article describes how to block unauthorized Internet access by users through Proxies. Scenario Create Policies to block access to proxies. Prerequisite Web and Application Filter Module is subscribed. Configuration You can block proxies by following steps given below. You must be logged on to Cyberoam Web Admin Console as an administrator with Read-Write permission for relevant feature(s). Step 1: Create Application Filter Policy Go to Application Filter > Policy > Policy and click Add to create a new policy with parameters given below.
Click OK to create the policy. Note: Appliance is shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization s requirements. Step 2: Add Rules to App Policy Go to Application Filter > Policy > Policy and select the policy created in step 1. Click Add to add rules in the policy according to parameters given below.
Parameter Value Description Application Filter Criteria Category List of Matching Applications Proxy and Tunnel Select All Select the category of applications that are to be selected Based on the Application Filter Criteria, applications are listed. Action Deny Select the Action: Allow OR Deny. Schedule All the time Select the Schedule from the list of Schedules available Click OK to add rule to policy. Click OK to save the policy. Step 3: Create Web Filter Policy Go to Web Filter > Policy > Policy and click Add to create a policy called BlockURLTranslations.
Click OK to save policy. How To Block Unauthorized Internet Access through Proxies
Step 4: Add Rules to Web Policy Select the policy created in step 3 and click Add to add rules to the policy. Parameter Value Description Category Type Web Category Select Category Type for which the rule is to be added. Category URLTranslationSites You can also search the category name from the search text box provided. HTTP Action HTTPS Action Deny Select HTTP and HTTPS action. Schedule All the time Select the Schedule for categories selected.
Click Add to add the rule. Click OK to save changes to the policy.
Step 5: Apply Policy to Firewall Rule or User/Group Firewall Rule You can apply the policy through a Firewall Rule such that it is applied on all traffic that hits on that rule. To create a Firewall Rule, go to Firewall > Rule > Rule and click Add. As shown below, apply the Policies created in step 1 and 3. Click OK to create the Firewall Rule. User/User Group You can apply the policies to individual users or user groups. Here, as an example we have applied the policies on a user named John Smith. To apply the policy on an individual user, go to Identity > Users > Users and select the user on whom policy is to be applied, i.e., John Smith. As shown below, apply the Policy created in step 1.
Click OK to apply policies on the user. Document Version: 2.0 12 January, 2015