HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents Back
 . . . . . . . . . . . . .
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Authentication
DrillDown Icon Customize Captive Portal in Cyberoam
DrillDown Icon Active Directory (AD) Authentication
DrillDown Icon NTLM Authentication
DrillDown Icon Integrate Cyberoam with Gemalto SA Server NPS Agent
DrillDown Icon How to Login in a Two Factor Authentication Environment?
DrillDown Icon Guest User Creation using Captive Portal
DrillDown Icon Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication
DrillDown Icon Configure Captive Portal URL Redirection
DrillDown Icon Integrate Cyberoam with RSA SecurID as a RADIUS Client
DrillDown Icon Integrate Cyberoam with ESET Secure Authentication Server
DrillDown Icon Allow Specific Websites without Authentication
DrillDown Icon Configure Cyberoam to use RADIUS Server for Authentication
DrillDown Icon Integrate Cyberoam with LDAP Server
DrillDown Icon Serve a Custom Page to unauthenticated users instead of Captive portal
DrillDown Icon How do I enforce authentication upon network users?
DrillDown Icon How to customize the Default SMS sent to Guest Users?
DrillDown Icon Why is Captive Portal not displayed to users while trying to access Internet when a default Drop Policy is applied?
DrillDown Icon How to set authentication mechanism for L2TP VPN users?
DrillDown Icon How to setup the maximum session timeout for all users?
DrillDown Icon What does the term User Inactivity Timeout & Data Transfer Threshold values in the Authentication settings page mean?
DrillDown Icon Users and Groups
DrillDown Icon Apply Surfing Quota Policy for User/Group
DrillDown Icon Create a Data Transfer Policy
DrillDown Icon Implement BYOD Security with Cyberoam
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Tech Notes
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils for Cyberoam security appliances
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
What does the term User Inactivity Timeout & Data Transfer Threshold values in the Authentication settings page mean?

Applicable to Version: 10.00 (All builds)

When Captive Portal is used for authentication, Cyberoam uses Keep alive requests to check if the user has kept the Captive portal page open and keeps him authenticated. If the page is closed then it logs out the user.
In case when the "Keep Alive Request For Captive Portal" is set to Disabled, Cyberoam would not check that the page is still open or not. So, even after the user shuts down the PC, he will be showing authenticated in Cyberoam live users page.

In order to determine, that the user is no more using his computer, you can use "User Inactivity Timeout".
User Inactivity Timeout
User Inactivity timeout is the inactive/idle time in minutes after which user will be logged out and has to re-authenticate. The acceptable range is 3 to 1440 minutes. By default it is set to disabled. If it is set to unlimited, the user will not be logged off.

E.g. :- If you have set it to 5 minutes, Cyberoam will check the Data transfer from that user after every 5 minutes.

To check this data transfer, Cyberoam uses "Data Transfer Threshold" value.

E.g. :- If you have set it to 10 Bytes, then every 5 minutes (as set above) Cyberoam will check the user data transfer. If it is below 10 Bytes, Cyberoam will log out that user.

So, with this settings, even after disabling the Keep Alive Request, we can know when the user logs out and when he is idle or shuts down his PC.
  1. Login to Cyberoam Web Admin Console with user having “Administrator” profile.
  1. Go to Identity à Authentication à Firewall and go to Captive Portal Settings to disable the Keep Alive Request for Captive Portal.


     3.  Click Apply and the Captive Portal Settings will be updated successfully.


Administrator must consider other background (transparent) data transfer done by other applications like Anti-Virus, Host based firewall or Operating System (Like NetBIOS in case of Microsoft OS) while defining Data Transfer Threshold value.
                                                                                                                             Document Version: 1.1 – 23/09/2011
Article ID: 1795

How helpful was this information?
Poor Below Average Average Above Average Very High
Provide suggestions for article improvment. Please provide your email address if you wish to receive mail updates on your suggestion.
 Get a new challenge
Write the characters in the image above