How to apply passphrase to websites/web categories on SonicOSX 7.0?
08/31/2020 0 2526
Another restrict action, named Passphrase can be used to restrict the web access other than just block. Once Passphrase action has been selected, the web will be redirected to a passphrase page after user attempts to access the specified website. In this page users should submit the preset password to continue the web browsing.
If the password is correct, the web access will be allowed. Otherwise it will be blocked with a block page sending to client.
If the user didn't enter a correct password the first time, then the passphrase page will be sent to client again for requiring password the second time. Currently, client users have 3 opportunities to enter their passwords, this means the site will be blocked if user tries his password 3 times and the passwords are all wrong.
If client users don't know the password, they can click 'Cancel' button to skip entering the password. In this case, this site will be blocked immediately.
Passphrase action can be applied to the Web category, URI Lists, or both. For HTTPS websites, Client DPI-SSL must be enabled to apply Passphrase. We would need to follow the following steps for this setup.
EXAMPLE: We would like to allow access to Web categories: News and Media, Search Engines and Portals as well as websites: monster.com, indeed.com only if the right passphrase is entered.
- Create a Decryption Policy
- Create Security Policies with the right web categories and URI list selected with CFS Action Profile to apply Passphrase.
Creating a Decryption Policy:
Decryption policy matches the traffic and the only two action we can take are decrypt and bypass. With decryption, we get more visibility to the data helping us in performing better matches and applying the right security policy.
- Make sure that Client DPI SSL is enabled globally based on the KB: How to create a Decryption Policy on SonicOSX 7.0?
- Navigate to Policy | Rules and Policies | Decryption Policy tab and click on Top at the bottom of the screen. If you have multiple policies it is very important to choose the right priority to make sure that the decryption policy is getting applied to the necessary traffic.
- Select the appropriate source/destination/service or you can leave it all on Any to decrypt all traffic. Make sure that the action is set to Decrypt and the policy is enabled.
- On the URL tab, you can perform this specific to a web category or the URI list as well. In this example, they are left on Any. Click Save.
Creating a Security Policy
Security Policy ties together the URI list object, Web category, Security Rule Action so that we know what action needs to be taken for a specific match. Before an HTTP/HTTPS connection can be made, the end machine would need to perform DNS resolution of the URL. Since we have an implicit deny rule, DNS traffic needs to be allowed as well.
To create the DNS related Security Policy:
- Navigate to Policy | Rules and Policies | Security policy tab and click on Top at the bottom of the screen. This adds the new Policy at the top of the list. You might need to adjust its priority based on other rules you have.
- Mention a relevant name and in the Source/Destination tab, you can select many fields like source/destination zones, address, services and also user, geo-location settings. Select the destination Port/Services as DNS(Name Service).
- Under App/URL/Custom Match tab leave everything on defaults.
- Select the Default Profile as the Security rule action. Make sure that the Action is set to Allow and the policy is in enable state. Click Save.
NOTE:This policy can also be created using the DNS protocol application signature, but this example is configured using the services.
To create the passphrase action to allow websites and web categories related Security Policy
- Navigate to Policy | Rules and Policies | Security policy tab and click on Bottom at the bottom of the screen. This adds the new Policy at the bottom of the list. You might need to adjust its priority based on other rules you have.
- Mention a relevant name and in the Source/Destination tab, you can select many fields like source/destination zones, address, services and also user, geo-location settings.
- Under App/URL/Custom Match, use the radio button for 'Match Operation' as OR. Select the pencil icon next to Web Category to add a new Web Category Group.
- Give this new Web Category Group a relevant name. Add the required web categories to the right using the right arrow and click Save.
- Also, select the pencil icon to add a new URI List object. For more details on creating URI List objects, refer How to create URI List Objects/Groups on SonicOSX 7.0?
In this example, we have added indeed.com, monster.com, and naukri.com to the URI list object.
- Under the Security rule action dropdown, click on the pencil icon to create a new Security Action.
- Give it a relevant name and you can set a lot of other security parameters, but the most important section is Content Filter for this setup. Navigate to the Content Filter tab and Enable the toggle button 'Enable Content Filtering'. Also, the Content Filter Action should be set to Passphrase.
- Under the Passphrase tab, you can enter the password that the end-user should use while visiting these websites.
- You can also make other additional changes w.r.t. other security features and click Save once done.
- On the Security Policy, make sure that the Action is set to Allow and the policy is in enable state. Click Add.
While visiting websites like indeed.com, monster.com, or websites that belong to News and media, Search engines and Portal categories, the following page shows up. You can enter the password to continue or hit cancel that automatically blocks the page.
It gives you 3 chances to enter the right password and gets blocked automatically if all 3 entries were incorrect.