Moderator: Qbik Staff
trace wrote:If i set that way dosen't work :) ! there is no sense if i delete the system policies or if i set in extended networking to ignore them in any case must work but if i delete the system policies and i set in E.N client mac is ok but if i don't delete the system policies and i set in E.N the default rights to ignore the system policies wingate don't let anyone to connect ! i can't understant why is not working if i set to ignore the s.p and if i delete s.p is working perfectily.
trace wrote:i don't connect wingate remotely ! and what can happen if i delete the contain of system polices ?
trace wrote:and one more thong when i remove the S.P it works but i never logout from gatekkeper :)
wingate manual post wrote:Overview
Policies are currently the most intricate part of any WinGate setup (My opinion). However, once you have the basic concepts firmly in hand it becomes very very easy.
The first thing to know is that there are two distinct groups of policies that can act together. The first is the Default (System) Policies. You will find them on the "Users" tab in GateKeeper. Those policies are used if no others are available. By default, they freely grant access.
The second set is the per service policies. They are usually more specific as they have inherently more infomration about the protocol they are working with. You will find these on the policy tab in each service.
Those two policies 'groups' can interact with eachother in three different ways from a Service perspective. For system policies:
- Code: Select all
May be used instead - either version of the policy can grant access
MUST also be granted - the system policies and the service policies must grant access
Are ignored - the system policies are ignored. Only the service policies apply
Now, to implement a policy you must first determine where you want to implement it. For example - some policies you might want to apply irrespective of the service that is in use. (Traffic limits for a user, for example). Others, you might want to block specific URLs, in which case the Web Proxy is the best place to do so. This is sometimes a bit tricky, and I've found that a rough flow diagram helps here sometimes; especially when you are dealing with a very complex setup.
The next thing to know is that the policies are permissive. If any policy grants the user the right to use / do something - even if another policy later denies it the user will have the right to access that resource. This becomes very important when you consider the interaction between Service Policies and System Policies.
Advanced Filters and Criterion seem complicated, but in truth that is the way to get the most out of policies. It's very easy as well, though.
Filters are OR statements. So, if you read them top to bottom they will sayWhen you delve a bit deeper, Criterion within a filter are AND statements.
- Code: Select all
Code:
if Filter1 is granted or if Filter2 is granted or if Filter3 is granted then the user has rights to this resource.
- Code: Select all
Code:
if (Filter1.Criterion1 is granted and Filter1.Criterion2 is granted and Filter1.Criterion3 is granted ) OR (Filter2.Criterion1 is granted) OR (Filter3.Criterion1 is granted) then the user has rights to this resource.
Tips
Alright. Armed with all of that there are a few tips to setting them up. First, try to ensure that your traffic is going through the most appropriate service. That gives you the most control over your policies. As you are using WGIC, redirecting that through your webproxy (By setting Intercepts on the WWW Proxy Service) gives you access to the proxy's policies. You can then define your policies there.
Secondly, you can have the same user in a policy multiple times with different types of rights granted. For example - if I want all my users to authenticate when visiting the entire web except for the Qbik webpages I would create two policies for the "Everyone" user.
The first would be:
- Code: Select all
Code:
Everyone: User must be authenticated
The second would be:
- Code: Select all
Code:
Everyone: User may be unknown
Advanced Filter + Criterion: Right is granted if HTTP URL contains "qbik.com"
Users browsing this forum: Bing [Bot] and 4 guests