Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Can I (and how) configure Cyberoam to filter internet access for the same user differently during multiple periods of time in the same day?

Posted on 2015-01-28
1
Medium Priority
?
273 Views
Last Modified: 2015-01-29
Here's the scenario I would like to configure Cyberoam for...

1. Group of users A have restricted access to internet during business hours (e.g. no social network).
2. Group of users B have another restricted access (which includes social network) but only during break time (12:00-14:00) and outside of business hours (outside of 08:00 to 17:00).
3. I want Group A to have the same access as Group B during break time and outside of business hours.

Is this possible and how can I do this?

I'm using Cyberoam CR300iNG, with Firmware version: 10.04.5 build 007.

Thanks!
0
Comment
Question by:Serge_De_Pauw
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 40576835
if based on logic (3), Group A has no internet to social n/w at all while Group B has access except that two time period stated. It is likely then 2 possible Web Filter policy rules e.g. Grp A "deny internet" and Grp B "deny internet in lunch-off hr". You can check out the below for the policy configuration on the "Schedule" and "Category Type", then apply the policy to Firewall Rule or User/User Group @ http://kb.cyberoam.com/default.asp?id=2395

Other use case references

Apply Schedule on a Specific Web Category in Cyberoam
http://kb.cyberoam.com/default.asp?id=2025&Lang=1&SID=

Block Facebook Games
http://kb.cyberoam.com/default.asp?id=2792&Lang=1&SID=

Block URL for Specific User
http://kb.cyberoam.com/default.asp?id=1744&Lang=1&SID=
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question