UTT Technologies
Chapter 9 Firewall
http://www.uttglobal.com
Page
12012012
Figure 8-14 Access Rule List - Example 3 (Continue)
Figure 8-15 Access Rule List - Example 3 (Continue)
8.1.4.4 Example 4
-
Control Internet Behaviors of a Single
User
You can assign a range of contiguous IP addresses to the users that have the same
Internet access privileges, and then create access rules for the user group. However, if
one or several users in the group have special or new Internet needs, you need to
individually create access rules for a single user.
In this example, we want to allow a group of users (IP address range:
192.168.1.10-192.168.1.120) to access web service, and block them from accessing all
other services. The exception is that the user with IP address 192.168.1.16 is allowed to
access all Internet services during business hours (Monday to Friday, 9:00 to 17:00).
We need to create four access rules to meet the requirements:
●
Access rule 1: It allows the user group to access DNS service.
●
Access rule 2: It allows the user group to access web service.
●
Access rule 3: It allows the user with IP address 192.168.1.16 to access all Internet
services during business hours.
●
Access rule 4: It blocks the user group from accessing any Internet services.
Therein, rule 4 must have a lower priority than the other three rules.