Solved

Can I (and how) configure Cyberoam to filter internet access for the same user differently during multiple periods of time in the same day?

Posted on 2015-01-28
1
241 Views
Last Modified: 2015-01-29
Here's the scenario I would like to configure Cyberoam for...

1. Group of users A have restricted access to internet during business hours (e.g. no social network).
2. Group of users B have another restricted access (which includes social network) but only during break time (12:00-14:00) and outside of business hours (outside of 08:00 to 17:00).
3. I want Group A to have the same access as Group B during break time and outside of business hours.

Is this possible and how can I do this?

I'm using Cyberoam CR300iNG, with Firmware version: 10.04.5 build 007.

Thanks!
0
Comment
Question by:Serge_De_Pauw
1 Comment
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40576835
if based on logic (3), Group A has no internet to social n/w at all while Group B has access except that two time period stated. It is likely then 2 possible Web Filter policy rules e.g. Grp A "deny internet" and Grp B "deny internet in lunch-off hr". You can check out the below for the policy configuration on the "Schedule" and "Category Type", then apply the policy to Firewall Rule or User/User Group @ http://kb.cyberoam.com/default.asp?id=2395

Other use case references

Apply Schedule on a Specific Web Category in Cyberoam
http://kb.cyberoam.com/default.asp?id=2025&Lang=1&SID=

Block Facebook Games
http://kb.cyberoam.com/default.asp?id=2792&Lang=1&SID=

Block URL for Specific User
http://kb.cyberoam.com/default.asp?id=1744&Lang=1&SID=
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
Read about achieving the basic levels of HRIS security in the workplace.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question