This example will limit the usage by the user group called
rogue_users
to 0.25 Megabit of
bandwidth for both uploading and downloading of data using BitTorrent. Assume the following:
•
Membership of a user in a group called
rogue_users
is established by the authentication
process. This might be done by using a RADIUS server or using other means such as
authenticating against an LDAP server. The means of authentication is not discussed further.
•
A
Pipe
object called
narrow_025_pipe
has already been defined in NetDefendOS that permits
this data flow.
•
An
IP Policy
object called
lan_to_wan_policy
has already been defined that allows
connections from a protected internal network to the public Internet.
•
The
Source Network
property for the
lan_to_wan_policy
IP policy is already set to an IPv4
address book object called
lan_users_net
.
It is assumed that all clients on the local network that access the Internet must be authenticated.
Command-Line Interface
First, the
appcontrol
command is used to create a filter for BitTorrent. This should also include the
uTP
protocol:
gw-world:/> appcontrol -filter -application=bittorrent,utp -save_list
Assume that this filter list is the third filter list created and is therefore assigned the list number
3
.
All filters can be displayed with the command:
gw-world:/> appcontrol -show_lists
Next, create an
ApplicationRuleSet
called
bt_app_list
:
gw-world:/> add Policy ApplicationRuleSet bt_app_list
DefaultAction=Allow
Then, change the CLI context to be
bt_app_list
:
gw-world:/> cc Policy ApplicationRuleSet bt_app_list
gw-world:/bt_app_list>
Now, add the
ApplicationRule
object:
gw-world:/bt_app_list> add ApplicationRule
Action=Allow
AppFilter=3
UserAuthGroups=rogue_users
ForwardChain=narrow_025_pipe
ReturnChain=narrow_025_pipe
Then, return to the default context:
gw-world:/bt_app_list> cc
gw-world:/>
Associate this
ApplicationRuleSet
with the
IPPolicy
:
Chapter 3: Fundamentals
256
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...