HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon FAQs on Cyberoam and Sophos Firewall
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Allow Read-Only Access of Facebook
DrillDown Icon Block Gmail Application in Desktop, iOS and Android Devices
DrillDown Icon Configure Cyberoam for Integration with ICAP Server
DrillDown Icon Determine Web Category of specific URL
DrillDown Icon Create Web Category with External URL Database
DrillDown Icon Block Facebook Games
DrillDown Icon Configure YouTube Education Filter
DrillDown Icon Allow Only Specific YouTube Videos
DrillDown Icon Import Domain Names and Keywords into Custom Web Filter Category
DrillDown Icon Configure Web Filter Policy
DrillDown Icon Update Web Category Database
DrillDown Icon Allow download of specific file types from selected website(s) only
DrillDown Icon Apply Schedule on a Specific Web Category
DrillDown Icon How to block the Facebook add-in in Skype?
DrillDown Icon Block Video Files in Cyberoam
DrillDown Icon Block a Specific File Type in Web Category in Cyberoam
DrillDown Icon Allow only specific member-URL(s) of default Web Category and block others
DrillDown Icon Block URL for Specific User
DrillDown Icon Block HTTP/HTTPS Upload
DrillDown Icon Can we add a website from default category to custom category?
DrillDown Icon Enforce Safe Search through Cyberoam
DrillDown Icon From where can I disable the reporting for a Web Filter Policy?
DrillDown Icon Which among Domain and Keyword is given precedence when a Custom Web Category is created?
DrillDown Icon Block a Specific Website
DrillDown Icon How to submit uncategorized website to Cyberoam Team?
DrillDown Icon Does Cyberoam’s Web Filter block HTTPS-based websites when HTTPS scanning is disabled?
DrillDown Icon Customize a Denied Message
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
Block a Specific File Type in Web Category in Cyberoam

Applicable to Version: 10.00 onwards

Overview

Cyberoam provides default categories, which can be used to block the malicious and objectionable web contents. Category is a grouping of URLs. When we block the category, access to all the URLs get blocked.

In this article, a hypothetical example is illustrated to block specific file type i.e. Executable Files in web category (WebBasedEmail) in Cyberoam.If you want to allow WebBasedEmail category and deny executable file from WebBasedEmail category, then specify Allow action for WebBasedEmail category and add Executable File in Exception list.

Scenario

Block Executable file type (.exe) for WebBasedEmail category only, while allowing the file type for other categories.

Prerequisite

Web and Application Filter Module Subscribed.

Configuration

You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).

Step 1: Create Web Filter Policy

Here, the Executable File Type (.exe) has been blocked for WebBasedEmail Category and has been allowed for all other categories.

Go to Web Filter > Policy > Policy and click Add to create a new Web Filter Policy named Block_EXE_Files as shown in the image below.
 

Click OK and the Web Filter Policy Block_EXE_Files will be created successfully.

Step 2: Add Web Filter Policy Rules

Select the Policy Block_EXE_Files created in Step 1 and click Add to add the Web Filter Policy Rules.
 

Specify Web Filter Policy Rule as shown in the table below.Here, file type category .exe is blocked.
 

Parameter

Value

Description

Category Type

Web Category

Select Category Type for which the rule is to be added.

Category

Web Based Email

Select the Categories which you want to allow/deny for all the sites.

HTTP and

HTTPS Action

Allow

Select HTTP and HTTPS action.

File Type Category

Executable Files

To block specific file type, clickExceptionand specify theFile Type Categoryto exclude from this rule

Schedule

All the time

Select the Schedule for categories selected.

 

Click OK and the Web Filter Policy Rule will be added successfully.

Step 3: Apply Policy to Firewall Rule or User/User Group

Firewall Rule

You can apply the policy through a Firewall Rule such that it is applied on all traffic that hits on that rule. Go to Firewall > Rule > IPv4 Rule and select desired Firewall Rule.As shown below, apply the Policy created in Step 1.
 

  


Click OK to apply the Firewall Rule.

User/User Group

You can apply the rule to individual users or user groups. Here, as an example we have applied the rule on a user named John Smith. To apply the policy on an individual user, go to Identity > Users > Users and select the user on whom policy is to be applied, i.e., John Smith. As shown below, apply the Policy created in Step 1.
 

Click OK to apply policy on the user.

 

                                                                                                                                                                                                               Document Version 2.0 – 02 July, 2014

 

 

Attachments
Article ID: 2033