User's Manual

UTT Technologies Chapter 11 Restriction
http://www.uttglobal.com Page 294
11.5 Configuration Example for Internet
Behavior Management
1. Requirements
In 2011, a business CEO wants to control online behavior of the employees. He wants to
block all the predefined IM and P2P applications, online games, game and stock websites
during working time, but allow all the Internet services during rest periods. But there are
some exceptions which are as follows:
Ɣ The CEO and vice CEO can access the Internet without any restrictions. Their IP
addresses are 192.168.16.4 and 192.168.16.5 respectively.
Ɣ The Customer Service and Sales Departments employees need to use IM
applications to communicate with customers during working time. Their IP address
ranges are: from 192.168.16.50 to 192.168.16.70, and from 192.168.16.100 to
192.168.16.120 respectively.
Ɣ There are five employees with dynamic IP addresses, and they need to use QQ.
Their QQ numbers are 21586375, 29583674, 1572681475, 1143550132 and
66587954 respectively.
The businesss working time is: Monday to Friday, 9:00 to 12:00 am, and 1:00 to 6:00 pm.
2. Analysis
We need to create three Internet behavior management policies, enable QQ whitelist
feature and add five QQ numbers into the QQ Whitelist to meet requirements.
1) Policy 1: It is used to block all the LAN users from using IM and P2P applications,
playing online games, and accessing game and stock websites.
2) Policy 2: It is used to allow the Customer Service and Sales Departments employees
to use IM applications during working time. Note that as this policy has higher priority
than policy 1, it should be created later than policy 1.
3) Policy 3: It is used to allow the CEO and vice CEO to access all the Internet services.
Note that as this policy has the highest priority, it should be created at last.
4) Enable QQ whitelist feature and add five QQ numbers into the QQ Whitelist.
3. Configuration Procedure
Before creating the Internet behavior management policies, you may do the following
tasks: