Just edited some of my previous material, I hope it helps.
Below is an example policy to have everyone restricted to authorized websites but any website at lunchtime. The Administrator, Support Dept. and CEO have full access. You will want to set how the WWW Proxy Server interacts with the System Policies by a small menu at the right of where you add the policies in; more explained below. I need to also acknowledge that this could be done a few ways.
Everyone (first entry in WWW Proxy --> Policies)
Select your authentication level which corresponds to your authentication method.
Navigate to the Advanced tab
Filter 1
This criterion is met if HTTP URL Contains supplier.com
Filter 2
This criterion is met if HTTP URL Contains partner.com
Everyone (Second entry in WWW Proxy --> Policies)
Select your authentication level which corresponds to your authentication method.
Navigate to the Time tab and put in the lunchtime values
Administrator --> (Third entry in WWW --> Policies)
Select your authentication level which corresponds to your authentication method.
Support Group (Fourth entry in WWW --> Policies)
Select your authentication level which corresponds to your authentication method.
CEO (Fifth entry in WWW --> Policies)
Select your authentication level which corresponds to your authentication method.
***Please also remember that the key to policies in WinGate is that the one with the most access will always override one with the least access - and how they interact with the System policies.
So for example, if within the WWW Proxy Server you have two "Everyone groups", and the first one only allows access to wingate.com, and the second Everyone group has no restrictions set, then there will be no restrictions set for Everyone.
Another thing to consider is how each individual Server / Service is setup to interact with the System Policies (can be found via Users tab, far bottom left); they could be set in one of the three following ways:
"Must also be granted": If the e.g. WWW Proxy Server allows access to this service, then it must also be checked in the System Polices before it is allowed.
"May be used instead": If the e.g. WWW Proxy Server denies the request, then check if the System Policies allow it; if it does, allow the user to access.
"Are ignored": Do not check the System Policies to check if this user is allowed to access.
So in the example above in the WWW Proxy Server you could set the System Policies to “Must Also be granted” and then have a base control for their requests. For simplicity to begin with you could just add in Everyone, user may be unknown.
****Since there are a few different ways to connect to the internet with WinGate, please consider the following.
1. The NAT connection method does not always have a way to authenticate and to control it is done via the Extended Networking Service (ENS) in WinGate.
2. The WinGate Internet Client (WGIC) is an optional connection method and the requests are fulfilled by the Winsock Redirector Service (WRS).
3. To allow the WWW Proxy Service in WinGate to also intercept HTTP requests passing through the NAT or WGIC connection method, then you would turn on the transparent proxy for port 80 in WWW Proxy Server --> Sessions
*Edit
So since the ENS and WRS are other main connection methods, you probably want to add in for NAT at least that the Everyone Group can be unknown and set the way they interact with the System Policies to “Must also be granted” and then you can add in *System Policies* to restrict their internet connectivity. I say NAT at least because the WRS takes on a different facet to controlling internet usage, it can also control what applications can do on a network; server / client / both / no networking / not allowed to run - and can be centrally configured from that service.
*End Edit
For example, all users always have access to the ISP’s POP3 / SMTP / Web (although you should use WinGate’s email server so you can potentially create better traffic management policies for the users recreational usage) and the CEO, Administrator and Support always get full access.
Everyone (first entry in System Policies)
Select your authentication level which corresponds to your authentication method. You may want to set it to “User may be unknown” if they will be using NAT because NAT has no default way to authenticate.
Navigate to the Advanced tab
Filter 1
This criterion is met if server port equals 25
Filter 2
This criterion is met if Server port Equals 110
Filter 3
This criterion is met if Server port Equals 80
Filter 4
This criterion is met if Server port Equals 443
Administrator --> (Second entry in System Policies)
Select your authentication level which corresponds to your authentication method.
Support Group (Third entry in WWW --> Policies)
Select your authentication level which corresponds to your authentication method.
CEO (Fourth entry in WWW --> Policies)
Select your authentication level which corresponds to your authentication method.
Guest (Fifth entry in System Policies, used to allow to run servers on your internal network which are accessible to clients on the internet. It is not practical to authenticate random internet clients connecting to your servers, but you don’t want the Guest user to be used by your LAN for any request and presuming your LAN is 192.168.0.x)
Select the Authentication method as “User may be unknown”
Navigate to the advanced tab.
Filter 1
This criterion is not met if Client IP address Begins with 192.168.0
*And remembering the Client or Server criterion is dependent on the direction that the request is coming in.
******And these are the way you can authenticate depending on what user database you are using.
WinGate User Database.
Java Authentication - Secure method.
WGIC Authentication - Secure method.
Qbik Authentication - Secure method.
GateKeeper Authentication - Secure method
Basic Authentication - Insecure method.
Assumed by IP Address - Insecure method.
Assumed by Computer name - Insecure method and WinGate must be DHCP Server.
Unauthenticated Access - Can be set for different connection methods or ports.
Local Windows User Database
WWW Proxy NTLM Authentication - Secure method.
WGIC NTLM Authentication - Secure method.
Qbik NTLM Authentication - Secure method.
GateKeeper NTLM Authentication - Secure method
Basic Authentication - Insecure method.
Assumed by IP Address - Insecure method.
Assumed by Computer name - Insecure method and WinGate must be DHCP Server.
Unauthenticated Access - Can be set for different connection methods or ports.
Domain User Database.
WWW Proxy NTLM Authentication - Secure method.
WGIC NTLM Authentication - Secure method.
Qbik NTLM Authentication - Secure method.
GateKeeper NTLM Authentication - Secure method
Basic Authentication - Insecure method.
Assumed by IP Address - Insecure method.
Assumed by Computer name - Insecure method and WinGate must be DHCP Server.
Unauthenticated Access - Can be set for different connection methods or ports.
******* And when using an AD Database it is desirable to read the section of the Help file labeled “WinGate in an Active Directory”. The key is to avoid DNS loops and have the “Qbik WinGate Engine” start with a Domain Administrator Account in the Windows Services.
Last edited by
jamesc on Dec 16 06 2:50 pm, edited 1 time in total.