Sophos Community
Site
User
Site
Search
User
Community & Product Forums
Intercept X Endpoint
Sophos Firewall
Sophos Central
Sophos Factory
Sophos Mobile
Sophos Cloud Optix
Sophos Sensor
Sophos Switch
Sophos Wireless
Sophos Email
UTM Firewall
Community Blogs & Events
Sophos Community Blog
Community Security Blog
Product Documentation Blog
Application Control
Getting Started
Sophos Partners
Sophos Partners Group
Member Recognition
Community Leaderboards
Sophos Techvids
Product Documentation
Visit docs.sophos.com
Support Portal
Sophos.com
More
Cancel
UTM Firewall
Web Protection: Web Filtering & Application Visibility/Control
Block Internet Access for Non-AD Domain Users
Release Notes & News
Discussions
Recommended Reads
Early Access Programs
More
Cancel
New
Thread Info
State
Not Answered
Locked
Locked
Replies
2 replies
Subscribers
1 subscriber
Views
4925 views
Users
0 members are here
Options
RSS
More
Cancel
Suggested
This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion
Block Internet Access for Non-AD Domain Users
dikzer
over 9 years ago
Hellow,
We Have ASG v8.306. The HTTP proxy is configured with AD 2008 Server SSO authentification in Standard mode
So, how to block internet access for users who are not connected to AD,
Now, Non AD-Domain users can use their AD account (login, password) through ASG popup, and they can access to Internet, knowing that are not connected to AD
Thanks
This thread was automatically locked due to age.
0
StephenWeber
over 9 years ago
It's easy to block the non AD users. Simply block port 80 and 443 in your Firewall Rules. This will disable Website browsing for everyone not connecting to the HTTP Proxy. I typically have a Direct Access Group Setup in the Number 1 rule to allow Internet Access for my Servers and then Rule Number 2 is the Internal Network Block Port 80 and 443.
The Non AD users will just need Proxy Settings setup in the browser and then they'll get prompted to login.
Cancel
Vote Up
0
Vote Down
Cancel
0
Ol Deda
over 9 years ago
Best scenario is in Profile mode
AD user authenticated via LDAP, and internal all ip with browser authentication
In Profile mode you can allow or deny from certain categories by departments, those you have in Forest of your Domain
It's much more easy
Cancel
Vote Up
0
Vote Down
Cancel