SlideShare a Scribd company logo
1 of 4
How To - Allow users to access only selected web sites (domain) and block all others
in Version 10:

Issue: How to allow users to access only selected web sites (domain) and blocks all
others.

Step 1: First we need to create a Custom Web Category for the web sites (domains) we
wish to allow or block for users. Open the Cyberoam GUI and navigate to Web filter >
Category > Add. It allows you to create custom web categories.

1.     Enter web category name. Custom and default category name cannot be same.
3.     Select Classification
3.     Select QoS policy if you want to apply specific bandwidth to this web category.
4.     Under Domain
              Enter domain. Multiple domain names can be specified using comma e.g.
              cyberoam.com,bbc.com.
5.     Under Keyword
              Enter keyword. Multiple keywords can be specified using comma e.g.
              cyberoam,bbc.

Note: Domains and Keywords can be added at the time of creation of category or later
whenever required.

Please refer the below given screen shot for more detail.
Step 2: Create a Web Filter Policy and allow/add this Custom Web Category.

In the Cyberoam GUI, navigate to:

1. Web filter > Policy > Add page allows you to create custom Web Filter Policy. Enter
   policy name. Duplicate names are not allowed.

2. Select “Deny All” Template based on which you want to create new policy because
   we only wish to allow our Custom Web Category. After creation you can always
   customize the category restrictions according to the requirement.

   Select:
   Allow All – Allows access to all the categories except the specified categories.
   Deny All– Allows denies access to all the categories except the specified categories.

3. Enter policy description.

4. To apply HTTPS Based Categorization, you need to select action “Allow or Deny”
   for HTTPS while adding that custom web category in Web Filter Policy.

5. Enable Reporting: If “Unchecked”, it would bypass reporting for this Internet access
   policy. Internet usage reports will not include access details of all the users to whom
   this policy will be applied. “Check” Enable Reporting to include access details of all
   the users in Internet usage reports to whom this policy is applied.
7. Click on Add button to add the custom web category. Select the Custom Web
   Category created for allowed websites and select the Strategy as ‘Allow’ in both
   HTTP and HTTPS action and select the Schedule as ‘All the Time’. Click on Add to
   add this Web Category and Click on “OK” button to save this Web Filter Policy.




8. Similarly, we can add more category by clicking ‘Add’ button as shown in the below
   given screen shot.




9. We can apply this policy to User, Group or in Firewall Rule. This would allow users
   to access only two websites which are specified in the Custom Web Category.

Note: When we select the Policy Type as DENY ALL template in Web Filter Policy, it
would only allow the HTTP based traffic, which means it would only allow traffic which
is running on port 80. So if there are application which requires login (running on
HTTPS), the Deny policy would not allow you to login with when you select deny all
template in Web Filter Policy. For Example, if we include the hotmail.com in the Internet
Access Policy with the Deny template, it would allow you to open the hotmail.com
website but it would not allow you to login to the hotmail.com as it is running on secure
port (HTTPS).

   To allow secure web site in IAP, we need to create a Web Filter Policy with the
   Policy Type as “Allow All” template. In the allow policy type, we need to deny all
   the Web Categories except the categories we wish to allow. Please, find attached
   snapshot for more detail as below:
Web Filter Policy with “Allow All” Template:

More Related Content

Viewers also liked

Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv camerasMritunjay Kumar
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Denis kisina
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentationwillyaoll
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentationguestaec424
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera PresentationBasith JM
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZIPMAX s.r.l.
 

Viewers also liked (11)

Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera
 
Ip Cctv Presentation
Ip Cctv PresentationIp Cctv Presentation
Ip Cctv Presentation
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
Isp
IspIsp
Isp
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
How to Use Slideshare
How to Use SlideshareHow to Use Slideshare
How to Use Slideshare
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

How to allow users to access only selected web sites (domain) and block all others in version 10

  • 1. How To - Allow users to access only selected web sites (domain) and block all others in Version 10: Issue: How to allow users to access only selected web sites (domain) and blocks all others. Step 1: First we need to create a Custom Web Category for the web sites (domains) we wish to allow or block for users. Open the Cyberoam GUI and navigate to Web filter > Category > Add. It allows you to create custom web categories. 1. Enter web category name. Custom and default category name cannot be same. 3. Select Classification 3. Select QoS policy if you want to apply specific bandwidth to this web category. 4. Under Domain Enter domain. Multiple domain names can be specified using comma e.g. cyberoam.com,bbc.com. 5. Under Keyword Enter keyword. Multiple keywords can be specified using comma e.g. cyberoam,bbc. Note: Domains and Keywords can be added at the time of creation of category or later whenever required. Please refer the below given screen shot for more detail.
  • 2. Step 2: Create a Web Filter Policy and allow/add this Custom Web Category. In the Cyberoam GUI, navigate to: 1. Web filter > Policy > Add page allows you to create custom Web Filter Policy. Enter policy name. Duplicate names are not allowed. 2. Select “Deny All” Template based on which you want to create new policy because we only wish to allow our Custom Web Category. After creation you can always customize the category restrictions according to the requirement. Select: Allow All – Allows access to all the categories except the specified categories. Deny All– Allows denies access to all the categories except the specified categories. 3. Enter policy description. 4. To apply HTTPS Based Categorization, you need to select action “Allow or Deny” for HTTPS while adding that custom web category in Web Filter Policy. 5. Enable Reporting: If “Unchecked”, it would bypass reporting for this Internet access policy. Internet usage reports will not include access details of all the users to whom this policy will be applied. “Check” Enable Reporting to include access details of all the users in Internet usage reports to whom this policy is applied.
  • 3. 7. Click on Add button to add the custom web category. Select the Custom Web Category created for allowed websites and select the Strategy as ‘Allow’ in both HTTP and HTTPS action and select the Schedule as ‘All the Time’. Click on Add to add this Web Category and Click on “OK” button to save this Web Filter Policy. 8. Similarly, we can add more category by clicking ‘Add’ button as shown in the below given screen shot. 9. We can apply this policy to User, Group or in Firewall Rule. This would allow users to access only two websites which are specified in the Custom Web Category. Note: When we select the Policy Type as DENY ALL template in Web Filter Policy, it would only allow the HTTP based traffic, which means it would only allow traffic which is running on port 80. So if there are application which requires login (running on HTTPS), the Deny policy would not allow you to login with when you select deny all template in Web Filter Policy. For Example, if we include the hotmail.com in the Internet Access Policy with the Deny template, it would allow you to open the hotmail.com website but it would not allow you to login to the hotmail.com as it is running on secure port (HTTPS). To allow secure web site in IAP, we need to create a Web Filter Policy with the Policy Type as “Allow All” template. In the allow policy type, we need to deny all the Web Categories except the categories we wish to allow. Please, find attached snapshot for more detail as below:
  • 4. Web Filter Policy with “Allow All” Template: