UTT Technologies
Chapter 9 Firewall
http://www.uttglobal.com
Page
1191191
Figure 8-12 Access Rule List - Example 2 (Continue)
8.1.4.3 Example 3
-
Control Internet Behaviors of a Group of
Users based on Schedule
In this example, we want to only allow a group of users (IP address range: 192.168.1.150
-192.168.1.200) to access web service during business hours (Monday to Friday, 9:00 to
17:00), and block them from accessing any Internet services during rest periods.
We need to create three access rules to meet the requirements:
●
Access rule 1: It allows those users to access DNS service during business hours.
And it is used to ensure that the domain names can be resolved successfully, thus the
users can access web service properly.
●
Access rule 2: It allows those users to access web service during business hours.
●
Access rule 3: It blocks those users from accessing any Internet services.
Therein, both rule 1 and rule 2 must have a higher priority than rule 3. Otherwise, rule 3
will be matched first. This will make those users unable to access web service during
business hours.
Figure 8-13 Access Rule List - Example 3