Blue Coat OPT-1000-2499-3YR User Manual Page 70

  • Download
  • Add to my manuals
  • Print
  • Page
    / 121
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 69
70
5.7.11. URLs Not
In this option, you will be able to add, delete and modify Not URLs as the criteria of a rule.
The Not list contains the URLs to which the rule must never be applied, which means the
exceptions to the rule. It is possible to indicate an entire site by putting an * at the end. It
is also possible to use the asterisk as a wild card at the beginning or in the middle of the
URL.
5.7.12. Example of rule use
We will now use some simple examples to see how the rules work.
By default, when OPTENET is installed there is only one rule, DenyPorn, which blocks
access to sites with pornographic content. Let’s see how this rule is configured. In the
category option, this rule has the basic filtering categories marked: pornography, racism,
violence, sects, drugs and the construction of explosives, meaning that this rule blocks
these five categories. Who is prohibited from this content? If we look at the users, we see
that there are no users defined, and therefore it affects all users. The same thing
happens with the user groups. Which machine? There also are no IP addresses defined,
and therefore this rule is applicable to all of the,. During what time schedules? Since
none is specified, it is applicable at all times of the day. Is there any exception to this
rule? We see that there are no addresses on either the Yes URL list (the URLs that
directly meet this rule) or the Not URL list (URLs that never meet this rule), which means
that there are no exceptions to this rule.
In summary, by default when the filter is installed, access is blocked to the
aforementioned content for all users and machines that surf via the proxy.
5.7.12.1. Rule for the manager
Now let’s Imagine that the manager requires access without filters. This means that the
manager must not be affected by any filtering rule. The solution is easy. We will create a
rule for the manager where, in users, we include the user id which is used to authenticate
the manager, or if there is no user authentication, in the IP section we will include the IP
of his or her machine. Then we will set the action of the rule as “Allow,” and we will not
Page view 69
1 2 ... 65 66 67 68 69 70 71 72 73 74 75 ... 120 121

Comments to this Manuals

No comments