How To - Configure Web Filter Policy



Similar documents
How To Block Unauthorized Internet Access through Proxies

How To Allow and Block s using White or Black List

Workflow Guide. Configuring Web Protection. For Customers with Sophos Firewall Document Date: November November 2015 Page 1 of 44

How To Configure Syslog over VPN

How To Configure SSL VPN in Cyberoam

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To Configure L2TP VPN Connection for MAC OS X client

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To Configure Virtual Host with Load Balancing and Health Checking

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

Balancing and Gateway Failover

How To - Implement Single Sign On Authentication with Active Directory

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

How To Prevent DoS and DDoS Attacks using Cyberoam

How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

How To - Implement Clientless Single Sign On Authentication with Active Directory

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

How To - Deploy Cyberoam in Gateway Mode

Secure Web Appliance. Reverse Proxy

Integrating Juniper Netscreen (ScreenOS)

Burst Technology. bt-webfilter User Guide

Cyclope Internet Filtering Proxy. - Installation Guide -

Google Analytics Playbook. Version 0.92

SHIPSTATION / MIVA MERCHANT SETUP GUIDE

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

NETWRIX EVENT LOG MANAGER

MIS Export via the FEM transfer software

Creating an ESS instance on the Amazon Cloud

Downloading and Configuring WebFilter

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Configuring User Identification via Active Directory

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

NTT Web Hosting Service [User Manual]

Module 12. Configuring and Managing Storage Technologies. Contents:

+27O.557+! RM Auditor Additions - Web Monitor. Contents

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Monitoring Oracle Enterprise Performance Management System Release Deployments from Oracle Enterprise Manager 12c

Laptop Backup - Administrator Guide (Windows)

Print Manager Plus 2010 How to Migrate your Database to a New SQL or Print Server

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

How To Configure Cyberoam as SNMP Agent

Managed Devices - Web Browser/HiView

User Guide Version 9 Document version /03/2007

Securing Networks with PIX and ASA

METAmessage Server and Domain Requirements

Setting Up SSL on IIS6 for MEGA Advisor

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

ACTIVE DIRECTORY DEPLOYMENT

This is a training module for Maximo Asset Management V7.1. In this module, you learn to use the E-Signature user authentication feature.

Download and Launch Instructions for WLC Client App Program

HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE

Chapter 1 - Web Server Management and Cluster Topology

Web based training for field technicians can be arranged by calling These Documents are required for a successful install:

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server

User's Manual. Intego Remote Management Console User's Manual Page 1

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE

Use Host Information in Policy Enforcement

Contents Jive StreamOnce

EC SUITE TRAFFIC MANAGER

Sonian Getting Started Guide October 2008

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Installing and Configuring vcloud Connector

Secure Messaging Server Console... 2

Server Installation Manual 4.4.1


How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

1 Summary. Step by Step Guide to implement SMS authentication to Bluecoat ProxySG

Manual. Traffic Exchange

Owner of the content within this article is Written by Marc Grote

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Lanyon Conference TM Mobile Quick Start Guide

Virtual Appliance Setup Guide

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

UNCLASSIFIED DISABLING USB STORAGE DEVICES THROUGH GROUP POLICY

602LAN SUITE 5.0 Groupware

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

3. From the Merchant Administration drop down select VCS Interfacing (page1)

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10

Edge Configuration Series Reporting Overview

HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper

MultiSite Manager. Setup Guide

MultiSuite for Investor Reporting Windows 7 Upgrade. Internet Explorer (IE) setting updates

How do I set up a branch office VPN tunnel with the Management Server?

Access Control Rules: URL Filtering

Configuration Guide - OneDesk to SalesForce Connector

Accessing the Online Meeting Room (Blackboard Collaborate)

Introduction to the AirWatch Browser Guide

How to Setup SQL Server Replication

IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager

User Management Tool 1.5

Transcription:

How To - Configure Web Filter Policy Applicable Version: 10.00 onwards Overview Web Filter Policies allow you to control Internet access of users or groups of users. Using these policies, you can block or allow specific URLs or an entire category of websites. Cyberoam s webcat database contains millions of websites grouped into categories like Games, DatingAndMatrimonials, Cricket, CrimeandSuicide, etc. Allowing or blocking any particular category allows/blocks all websites falling under that particular category. This reduces the effort on part of the administrator to create policies for each individual website. This article describes how you can block access to websites belonging to a particular category. Prerequisite Web and Application Filter Module Subscribed. Scenario Create and apply a Web Filter Policy such that it denies access to all the websites falling under Games web category. Configuration You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s). Step 1: Create Web Filter Policy to deny Games web category Go to Web Filter > Policy > Policy and click Add to add a Web Filter Policy, with the following parameters:

Parameter Description Parameter Value Description Name Template Enable Reporting Download File Size Restriction Block_Games Allow All Enable 0 Name to identify the Policy. Duplicate names are not allowed. Select a template if you want to create a new policy based on an existing policy and want to inherit all the categories restrictions from the existing policy. Enable to generate Internet usage reports for all the users. Specify the file size (in MB) in the textbox to configure the maximum allowed size of file to be downloaded. Here we have specified 0 for No Restriction.

Click OK to create policy. Step 2: Add Rules to Policy Go to Web Filter > Policy > Policy and Select Block_Games policy created in Step 1.

Click Add to add rules to the policy with the following parameters: Parameter Value Description Category Type Category Web Category Games Select Category Type for which rule is to be added. Select Category for which rule is to be added. Multiple categories can also be selected. HTTP Action Deny Select Action for HTTP traffic. HTTPS Action Deny Select Action for HTTPS traffic. Schedule All the Time Select the Schedule for Categories selected.

Click Add to add the Rule. How To - Configure Web Filter Policy

Step 3: Apply Policy to Firewall Rule or User/User Group Firewall Rule You can apply the policy through a Firewall Rule such that it is applied on all traffic that hits on that rule. To create a Firewall Rule, go to Firewall > Rule > Rule and click Add. As shown below, apply the Policy created in step 1. Click OK to create the Firewall Rule.

User/User Group You can apply the Web-Filter policy to individual users or user groups. Here, as an example, we have applied the policy on a user named John Smith. To apply the policy on an individual user, go to Identity > Users > Users and select the user on whom policy is to be applied. As shown below, apply the Policy created in step 1. Click OK to apply policy on the user. Similarly, you can apply the policy on a Group. To apply the policy on a group, Go to Identity > Groups > Groups and select the group on which the policy is to be applied. As an example, we have applied the policy on the group Sales and Marketing.

Click OK to apply policy on the group. The above configuration shows how to create and apply a Web Filter Policy. Document Version: 1.1 27 March, 2013