Solved

Can I (and how) configure Cyberoam to filter internet access for the same user differently during multiple periods of time in the same day?

Posted on 2015-01-28
1
252 Views
Last Modified: 2015-01-29
Here's the scenario I would like to configure Cyberoam for...

1. Group of users A have restricted access to internet during business hours (e.g. no social network).
2. Group of users B have another restricted access (which includes social network) but only during break time (12:00-14:00) and outside of business hours (outside of 08:00 to 17:00).
3. I want Group A to have the same access as Group B during break time and outside of business hours.

Is this possible and how can I do this?

I'm using Cyberoam CR300iNG, with Firmware version: 10.04.5 build 007.

Thanks!
0
Comment
Question by:Serge_De_Pauw
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 40576835
if based on logic (3), Group A has no internet to social n/w at all while Group B has access except that two time period stated. It is likely then 2 possible Web Filter policy rules e.g. Grp A "deny internet" and Grp B "deny internet in lunch-off hr". You can check out the below for the policy configuration on the "Schedule" and "Category Type", then apply the policy to Firewall Rule or User/User Group @ http://kb.cyberoam.com/default.asp?id=2395

Other use case references

Apply Schedule on a Specific Web Category in Cyberoam
http://kb.cyberoam.com/default.asp?id=2025&Lang=1&SID=

Block Facebook Games
http://kb.cyberoam.com/default.asp?id=2792&Lang=1&SID=

Block URL for Specific User
http://kb.cyberoam.com/default.asp?id=1744&Lang=1&SID=
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question