HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Block Whatsapp
DrillDown Icon How To Block Unauthorized Internet Access through Anonymous Proxies
DrillDown Icon Block Google Drive
DrillDown Icon Block Skype
DrillDown Icon Block UltraVPN
DrillDown Icon Block Browser-based File Transfer
DrillDown Icon Block Gmail Web Chat
DrillDown Icon Block High Risk Applications with Cyberoam’s Proactive Protection Model
DrillDown Icon Block Internet Download Manager (IDM) in Cyberoam
DrillDown Icon Block LinkedIn Applications in Cyberoam
DrillDown Icon Block Facebook Applications in Cyberoam
DrillDown Icon Block P2P Applications
DrillDown Icon How to enable Application Classification in Cyberoam? What is the advantage of enabling it?
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Tech Notes
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils for Cyberoam security appliances
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
Block Internet Download Manager (IDM) in Cyberoam


Applicable Version: 10.00 onwards

Overview

Internet Download Manager (IDM) is a Multi threaded application which breaks a file into many small parts and starts downloading all parts simultaneously. This increases download speed by up to 5 times. Comprehensive error recovery and resume capability restarts broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your download.

Scenario

Create an Application Filter Policy to block IDM.

Prerequisite

Web and Application Filter Module is subscribed.

Configuration

You can IDM by following steps given below. You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).

Step 1: Create Application Filter Policy

Go to Application Filter > Policy > Policy and click Add to create a new policy with parameters given below.
 
 
 

Click OK to create the policy. 

Note: 

Applianceis shipped with the following predefined policies for applications: Allow All and Deny All. These two predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization’s requirements.

Step 2: Add Rules to Policy

Go to Application Filter > Policy > Policy and select the policy created in step 1. Click Add to add rules in the policy according to parameters given below.
 
 
 

Parameter

Value

Description

Application Filter Criteria

Category

File Transfer

Select the category of applications that are to be selected

List of

Matching Applications

Select Individual Application

Based on the Application Filter Criteria, applications are listed.

Application

Search for

Multi Thread File Transfer

Select the Application you wish to allow/block.

Action

Deny

Select the Action: Allow OR Deny.

Schedule

All the time

Select the Schedule from the list of Schedules available

 

Click OK to add rule to policy.
 
 

Click OK to save the policy.

Step 3: Apply Policy to Firewall Rule or User/User Group

Firewall Rule

You can apply the policy through a Firewall Rule such that it is applied on all traffic that hits on that rule. To create a Firewall Rule, go to Firewall > Rule > Rule and click Add. As shown below, apply the Policy created in step 1.
 
 

Click OK to create the Firewall Rule.

User/User Group

You can apply the rule to individual users or user groups. Here, as an example we have applied the rule on a user named John Smith. To apply the policy on an individual user, go to Identity > Users > Users and click the user on whom policy is to be applied, i.e., John Smith. As shown below, apply the Policy created in step 1.
 
 

Click OK to apply policy on the user.

 

 

 



                                                                                                                                                                        Document Version: 2.0 – 24 June, 2014
 
Attachments
Article ID: 2194


How helpful was this information?
Poor Below Average Average Above Average Very High
Provide suggestions for article improvment. Please provide your email address if you wish to receive mail updates on your suggestion.
 Get a new challenge
Write the characters in the image above