Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Can I (and how) configure Cyberoam to filter internet access for the same user differently during multiple periods of time in the same day?

Posted on 2015-01-28
1
Medium Priority
?
284 Views
Last Modified: 2015-01-29
Here's the scenario I would like to configure Cyberoam for...

1. Group of users A have restricted access to internet during business hours (e.g. no social network).
2. Group of users B have another restricted access (which includes social network) but only during break time (12:00-14:00) and outside of business hours (outside of 08:00 to 17:00).
3. I want Group A to have the same access as Group B during break time and outside of business hours.

Is this possible and how can I do this?

I'm using Cyberoam CR300iNG, with Firmware version: 10.04.5 build 007.

Thanks!
0
Comment
Question by:Serge_De_Pauw
1 Comment
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 40576835
if based on logic (3), Group A has no internet to social n/w at all while Group B has access except that two time period stated. It is likely then 2 possible Web Filter policy rules e.g. Grp A "deny internet" and Grp B "deny internet in lunch-off hr". You can check out the below for the policy configuration on the "Schedule" and "Category Type", then apply the policy to Firewall Rule or User/User Group @ http://kb.cyberoam.com/default.asp?id=2395

Other use case references

Apply Schedule on a Specific Web Category in Cyberoam
http://kb.cyberoam.com/default.asp?id=2025&Lang=1&SID=

Block Facebook Games
http://kb.cyberoam.com/default.asp?id=2792&Lang=1&SID=

Block URL for Specific User
http://kb.cyberoam.com/default.asp?id=1744&Lang=1&SID=
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question