Solved

Prevent some users from using the internet - ssg5

Posted on 2009-05-20
7
572 Views
Last Modified: 2013-11-25
How do I control internet access for a particular group of users at certain times in the day on a juniper ssg5?
0
Comment
Question by:trose2
  • 3
7 Comments
 
LVL 5

Expert Comment

by:devangshroff
ID: 24439134
Hi,

you can do it by configurin policy from LAn to WAN
where sorce will be routr user ip address and destination will be any and action will be drop or block
done

regards,

devang
0
 
LVL 68

Accepted Solution

by:
Qlemo earned 500 total points
ID: 24447076
This needs correction:
  1. Create a policy Trust to Untrust, with related source IP addresses and destination any, service any, Action Deny or Reject (Deny will just time out, Reject will send a "no-no" packet to the source, which leads to quicker reactions).
  2. Create a time schedule.
  3. Assign the time schedule to the above policy.
  4. Place the policy before your policy allowing Internet access.
With the time schedule, you can also define several policies with different traffic shaping parameters (action has to be Allow then). That way you can throttle instead of deny Internet access, which is sometimes more "educative".

0
 

Author Comment

by:trose2
ID: 24450750
I created an address list, created a group to put those users in, then created a schedule attached the policy to the schedule, place deny on the policy, but the time is not shutting the users on and off.  It just keep the users of
0
 
LVL 68

Assisted Solution

by:Qlemo
Qlemo earned 500 total points
ID: 24451182
Existing sessions are not cut off. Deny/Permit changes only apply on new sessions. However, HTTP is a stateless protocol, sessions are created all the time. FTP and BitTorrent aso. are different, as they maintain one or more parallel data streams over some time.

The traffic shaping, however, should work, as it can be applied to active sessions (I reckon).
0
 
LVL 68

Expert Comment

by:Qlemo
ID: 25877601
http:/Q_24425644.html#24439134 does not provide any useful details to a solution.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You can provide a virtual interface for remote stakeholders in a SWOT analysis through a Google Drawing template. By making real time viewing and collaboration possible, your team can build a stronger product.
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now