Solved

Can I (and how) configure Cyberoam to filter internet access for the same user differently during multiple periods of time in the same day?

Posted on 2015-01-28
1
261 Views
Last Modified: 2015-01-29
Here's the scenario I would like to configure Cyberoam for...

1. Group of users A have restricted access to internet during business hours (e.g. no social network).
2. Group of users B have another restricted access (which includes social network) but only during break time (12:00-14:00) and outside of business hours (outside of 08:00 to 17:00).
3. I want Group A to have the same access as Group B during break time and outside of business hours.

Is this possible and how can I do this?

I'm using Cyberoam CR300iNG, with Firmware version: 10.04.5 build 007.

Thanks!
0
Comment
Question by:Serge_De_Pauw
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 40576835
if based on logic (3), Group A has no internet to social n/w at all while Group B has access except that two time period stated. It is likely then 2 possible Web Filter policy rules e.g. Grp A "deny internet" and Grp B "deny internet in lunch-off hr". You can check out the below for the policy configuration on the "Schedule" and "Category Type", then apply the policy to Firewall Rule or User/User Group @ http://kb.cyberoam.com/default.asp?id=2395

Other use case references

Apply Schedule on a Specific Web Category in Cyberoam
http://kb.cyberoam.com/default.asp?id=2025&Lang=1&SID=

Block Facebook Games
http://kb.cyberoam.com/default.asp?id=2792&Lang=1&SID=

Block URL for Specific User
http://kb.cyberoam.com/default.asp?id=1744&Lang=1&SID=
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question