![untangle firewall object-groups untangle firewall object-groups](https://www.untangle.com/wp-content/uploads/ng-firewall/ng-firewall-laptop.jpg)
For example, we may want to provide executives with non-restricted access to the Internet, while blocking the remaining employees of the company unless in the break hour.įirst, we will need to use Untangle's Directory Connector to identify the logged in user and their Active Directory group membership. In this chapter, we will learn how we can set rules per user or per time of day. In addition, each individual application has rules to not scan traffic from a certain website or from certain device.Īll the previous rules are based on the traffic criteria. After that, there are rules that will be applied after fully classifying the traffic, such as the Application Control and Bandwidth Control rules. If the traffic passes the Firewall rule, it will be scanned by other applications such as Web Filter to determine whether to allow or block the traffic. The first rule to be applied is the one that evaluates the traffic at the session initiation such as the Firewall rule. When the traffic is passed to be processed by applications, different rules will be applied on the traffic.
![untangle firewall object-groups untangle firewall object-groups](https://i2.wp.com/edtechdigest.com/wp-content/uploads/2020/08/CREDIT-Untangle.png)
The kernel level rules include bypass rules, QoS rules, input filter rules, port forward rules, and so on. There are the kernel-level rules that evaluate the traffic before being processed by the different applications. Up to this point, we have learned about different rules. Untangle Network Security (2014) Chapter 10.