How To Block Unauthorized Internet Access through Proxies



Similar documents
How To - Configure Web Filter Policy

How To Configure Syslog over VPN

How To Allow and Block s using White or Black List

How To Configure L2TP VPN Connection for MAC OS X client

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Workflow Guide. Configuring Web Protection. For Customers with Sophos Firewall Document Date: November November 2015 Page 1 of 44

How To Configure SSL VPN in Cyberoam

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To Configure Virtual Host with Load Balancing and Health Checking

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

How To - Implement Single Sign On Authentication with Active Directory

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Configuring User Identification via Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Deploy Cyberoam in Gateway Mode

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Balancing and Gateway Failover

How To Prevent DoS and DDoS Attacks using Cyberoam

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

Introduction to the AirWatch Browser Guide

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Manage a Firewall Using your Plesk Control Panel Contents

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

Intro to Firewalls. Summary

PIX/ASA 7.x with Syslog Configuration Example

F-SECURE MESSAGING SECURITY GATEWAY

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

This feature is available on the AppWall standalone and AppWall VA devices. It is not available on the AppWall module within Alteon.

External Device Management - Using SNMP - Enabling the Next Wave of Connectivity

Secure Web Appliance. Reverse Proxy

Preparing for Version 10

User Guide Version 9 Document version /03/2007

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Device Management. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Automatic Hotspot Logon

Securing Networks with PIX and ASA

Forward proxy server vs reverse proxy server

Blue Coat Security First Steps Transparent Proxy Deployments

Configuring Business Monitor for Event Consumption from WebSphere MQ

How to Setup SQL Server Replication

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Streaming Media

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

Setting Up Scan to SMB on TaskALFA series MFP s.

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Routing concepts in Cyberoam

USG40HE Content Filter Customization

To Configure Network Connect, We need to follow the steps below:

Configuring Your Gateman Proxy Server

Reverse Proxy with SSL - ProxySG Technical Brief

Configuring Firewall Settings For Configuration Manager 2012 R2

User Management Tool 1.5

Filter Avoidance and Anonymous Proxy Guard

PROXY SETUP WITH IIS USING URL REWRITE, APPLICATION REQUEST ROUTING AND WEB FARM FRAMEWORK OR APACHE HTTP SERVER FOR EMC DOCUMENTUM EROOM

Virtual Appliance Setup Guide

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Novell Identity Manager

SECURITY ADVISORY FROM PATTON ELECTRONICS

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

Cyberoam Anti Virus Implementation Guide Version 9

Preparing for GO!Enterprise MDM On-Demand Service

Configuring Trend Micro Content Security

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

Core Protection Suite

Deploying NetScaler Gateway in ICA Proxy Mode

What Is Ad-Aware Update Server?

Laptop Backup - Administrator Guide (Windows)

Administration Guide Novell Filr May 2014

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

BROWSER AND SYSTEM REQUIREMENTS

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

NetSpective Global Proxy Configuration Guide

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

How to Make the Client IP Address Available to the Back-end Server

Inspection of Encrypted HTTPS Traffic

SSL VPN Client Installation Guide Version 9

How to Configure Web Authentication on a ProCurve Switch

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Print Manager Plus 2010 How to Migrate your Database to a New SQL or Print Server

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

IBM Security QRadar Vulnerability Manager Version User Guide

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Configuring the Watchguard Edge for RADIUS authentication

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008

Steps to be taken when you are unable to get the license in Tally.ERP 9

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

High Availability Configuration Guide Version 9

Download and Launch Instructions for WLC Client App Program

BusinessObjects Enterprise XI Release 2

Transcription:

How To - Block Unauthorized Internet Access through Proxies How To Block Unauthorized Internet Access through Proxies Applicable Version: 10.00 onwards Overview A Proxy is a tool that attempts to make a user s activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the computer's identifying information. Users tend to use the services of proxies to bypass Cyberoam s restrictive policies. Hence, it is required to block access to these proxies themselves. This article describes how to block unauthorized Internet access by users through Proxies. Scenario Create Policies to block access to proxies. Prerequisite Web and Application Filter Module is subscribed. Configuration You can block proxies by following steps given below. You must be logged on to Cyberoam Web Admin Console as an administrator with Read-Write permission for relevant feature(s). Step 1: Create Application Filter Policy Go to Application Filter > Policy > Policy and click Add to create a new policy with parameters given below.

Click OK to create the policy. Note: Appliance is shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization s requirements. Step 2: Add Rules to App Policy Go to Application Filter > Policy > Policy and select the policy created in step 1. Click Add to add rules in the policy according to parameters given below.

Parameter Value Description Application Filter Criteria Category List of Matching Applications Proxy and Tunnel Select All Select the category of applications that are to be selected Based on the Application Filter Criteria, applications are listed. Action Deny Select the Action: Allow OR Deny. Schedule All the time Select the Schedule from the list of Schedules available Click OK to add rule to policy. Click OK to save the policy. Step 3: Create Web Filter Policy Go to Web Filter > Policy > Policy and click Add to create a policy called BlockURLTranslations.

Click OK to save policy. How To Block Unauthorized Internet Access through Proxies

Step 4: Add Rules to Web Policy Select the policy created in step 3 and click Add to add rules to the policy. Parameter Value Description Category Type Web Category Select Category Type for which the rule is to be added. Category URLTranslationSites You can also search the category name from the search text box provided. HTTP Action HTTPS Action Deny Select HTTP and HTTPS action. Schedule All the time Select the Schedule for categories selected.

Click Add to add the rule. Click OK to save changes to the policy.

Step 5: Apply Policy to Firewall Rule or User/Group Firewall Rule You can apply the policy through a Firewall Rule such that it is applied on all traffic that hits on that rule. To create a Firewall Rule, go to Firewall > Rule > Rule and click Add. As shown below, apply the Policies created in step 1 and 3. Click OK to create the Firewall Rule. User/User Group You can apply the policies to individual users or user groups. Here, as an example we have applied the policies on a user named John Smith. To apply the policy on an individual user, go to Identity > Users > Users and select the user on whom policy is to be applied, i.e., John Smith. As shown below, apply the Policy created in step 1.

Click OK to apply policies on the user. Document Version: 2.0 12 January, 2015