To learn which applications and categories have a high risk, look through the Application Wiki in the Access Tools part of the Security Policies view. Find ideas for applications and categories to include in your Policy.
To see an overview of your Access Control Policy and traffic, see the Access Control view in Logs & Monitor > New Tab > Views .
Best Practice - Do not use Application Control and URL Filtering in the same rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. , this may lead to wrong rule matching. Use Application Control and URL Filtering in separate rules. This makes sure that the URL Filtering rule is used as soon as the category is identified. For more information, see sk174045.
Scenario: I want to monitor all Facebook traffic in my organization. How can I do this?
To monitor all Facebook application traffic:
Note - Applications are matched by default on their Recommended services. You can change this (see Configuring Matching for an Allowed Application). Each service runs on a specific port. The recommended Web Browsing Services are http , https , HTTP_proxy , and HTTPS_proxy . |
The rule allows all Facebook traffic but logs it. You can see the logs in the Logs & Monitor view, in the Logs tab. To monitor how people use Facebook in your organization, see the Access Control view ( SmartEvent Server required).
Scenario: I want to block pornographic sites in my organization, and tell the user about the violation. How can I do this?
To block an application or category of applications and tell the user about the policy violation:
Note - This Rule Base example contains only those columns that are applicable to this subject. |
Name | Source | Destination | Services & Applications | Action | Track | Install On |
---|---|---|---|---|---|---|
Block Porn | Any | Internet | Pornography (category) | Drop Blocked Message | Log | Policy Targets |
The rule blocks traffic to pornographic sites and logs attempts to access those sites. Users who violate the rule receive a UserCheck message that informs them that the application is blocked according to company security policy. The message can include a link to report if the website is included in an incorrect category.
Important - A rule that blocks traffic, with the Source and Destination parameters defined as Any , also blocks traffic to and from the Captive Portal .
Scenario: I want to limit my employees' access to streaming media so that it does not impede business tasks.
If you do not want to block an application or category, there are different ways to set limits for employee access:
The example rule below:
To create a rule that allows streaming media with time and bandwidth limits:
Note - Applications are matched on their Recommended services, where each service runs on a specific port, such as the default Application Control Web browsing Services : http , https , HTTP_proxy , and HTTPS_proxy . To change this, see Services & Applications Column. |
Name | Source | Destination | Services and Applications | Action | Track | Install On | Time |
---|---|---|---|---|---|---|---|
Limit Streaming Media | Any | Internet | Media Streams (Category) | Accept Upload_1Gbps | Log | All | Off-Work |
Scenario: I want to allow a Remote Access application for a specified group of users and block the same application for other users. I also want to block other Remote Access applications for everyone. How can I do this?
To do this, add two new rules to the Rule Base :
Name | Source | Destination | Services & Applications | Action | Track | Install On |
---|---|---|---|---|---|---|
Allow Radmin to Identified Users | Identified_Users | Internet | Radmin | Allow | Log | All |
Block other Remote Admins | Any | Internet | Remote Administration | Block | Log | All |
Notes on these rules: :
For more about Access Roles and Identity Awareness , see the R81 Identity Awareness Administration Guide.
Scenario: I want to block sites that are associated with categories that can cause liability issues. Most of these categories exist in the Application Database but there is also a custom defined site that must be included. How can I do this?
You can do this by creating a custom group and adding all applicable categories and the site to it. If you enable Identity Awareness on a Security Gateway , you can use it together with URL Filtering to make rules that apply to an access role. Use access role objects to define users, machines, and network locations as one object.
You can now use the Liability_Sites group in the Access Control Rule Base .
In the Security Policies view of SmartConsole , go to the Access Control Policy.
Note - Applications are matched on their Recommended services, where each service runs on a specific port, such as the default Application Control Web Browsing Services : http , https , HTTP_proxy , and HTTPS_proxy . To change this see Changing Services for Applications and Categories. |