HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents Back
 . . . . . . . . . . . . .
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Authentication
DrillDown Icon Customize Captive Portal in Cyberoam
DrillDown Icon Active Directory (AD) Authentication
DrillDown Icon NTLM Authentication
DrillDown Icon Integrate Cyberoam with Gemalto SA Server NPS Agent
DrillDown Icon How to Login in a Two Factor Authentication Environment?
DrillDown Icon Guest User Creation using Captive Portal
DrillDown Icon Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication
DrillDown Icon Configure Captive Portal URL Redirection
DrillDown Icon Integrate Cyberoam with RSA SecurID as a RADIUS Client
DrillDown Icon Integrate Cyberoam with ESET Secure Authentication Server
DrillDown Icon Allow Specific Websites without Authentication
DrillDown Icon Configure Cyberoam to use RADIUS Server for Authentication
DrillDown Icon Integrate Cyberoam with LDAP Server
DrillDown Icon Serve a Custom Page to unauthenticated users instead of Captive portal
DrillDown Icon How do I enforce authentication upon network users?
DrillDown Icon How to customize the Default SMS sent to Guest Users?
DrillDown Icon Why is Captive Portal not displayed to users while trying to access Internet when a default Drop Policy is applied?
DrillDown Icon How to set authentication mechanism for L2TP VPN users?
DrillDown Icon How to setup the maximum session timeout for all users?
DrillDown Icon How do I configure Cyberoam to automatically logout inactive users?
DrillDown Icon Users and Groups
DrillDown Icon Apply Surfing Quota Policy for User/Group
DrillDown Icon Create a Data Transfer Policy
DrillDown Icon Implement BYOD Security with Cyberoam
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Tech Notes
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils for Cyberoam security appliances
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
How do I configure Cyberoam to automatically logout inactive users?

Applicable Version: 10.00 onwards

Overview

Cyberoam allows administrator to set the Inactivity Timeout and Data Transfer Threshold of users. 

Inactivity Timeout: User Inactivity timeout is the inactive/idle time in minutes after which user will be logged out and has to re-authenticate. 

Data Transfer Threshold: Specify threshold value in Bytes for Data Transfer. If mentioned amount of data is not transferred within the specified Inactivity Time, the user will be marked as inactive.

Scenario

Set Inactivity Timeout and Data Transfer Threshold for users authenticating using: 

Configuration

You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).

Cyberoam Transparent Authentication (CTAS)

Set Inactivity Timeout and Data Transfer Threshold for users authenticating using CTAS from Identity > Authentication > Firewall > CTAS Settings.
 

NT LAN Manager (NTLM)
Set Inactivity Timeout and Data Transfer Threshold for users authenticating using NTLM from Identity > Authentication > Firewall > NTLM Settings.
 

Web Clients (iOS, Android and API)
Set Inactivity Timeout and Data Transfer Threshold for iOS, Android and API users authenticating using Web Clients from Identity > Authentication > Firewall > Web Client Settings.
 
 

Captive Portal

Set Inactivity Timeout and Data Transfer Threshold for users authenticating using Captive Portal from Identity > Authentication > Firewall > Captive Portal Settings.
  

Parameters

Value

Description

Keep Alive

Request for

Captive Portal

Disable

Keep-Alive request is exchanged at pre-configured intervals between Cyberoam and user machine to check whether user has logged out or idle. If the appliance does not receive the response, user is logged out automatically.

 

If disabled, admin has to specify User Inactivity Time and Data Transfer Threshold. User is logged out according to configured parameters.

User Inactivity

Timeout

5

This parameter is available if Keep Alive Request for Captive Portal is Disabled. It is the inactive/idle time in minutes after which user will be logged out and has to re-authenticate.

 

Default: Unlimited

Data Transfer

Threshold

100 Bytes

This parameter is available if User Inactivity Timeout is NOT set as Unlimited. It is the minimum data transfer required within the time period specified in Inactivity Timeout failing which user is logged out.

 

 

 

 





                                                                                                                                                                        Document Version: 2.0 – 29 September, 2014
Attachments
Article ID: 1795


How helpful was this information?
Poor Below Average Average Above Average Very High
Provide suggestions for article improvment. Please provide your email address if you wish to receive mail updates on your suggestion.
 Get a new challenge
Write the characters in the image above