Select Pattern Match or Exact Match (pattern match allows wildcards, exact match is faster)
Enter the sites to be blocked
Click OK when finished
Confirm that the list appears in the Global Data Lists
2. Build the Policy
Go to Policy
Select New Policy from the tasks panel
Enter a name and a description for the policy
For Source Type choose any HTTP Proxy
For Event Type choose ProxyRequest
For Available compatible events choose WWW ProxyServer::ProxyRequest
Click OK
Drag the ProxyRequest event from the list of events into the policy builder
Drag Data list lookup from the Items into the policy builder
Click the Symbol ubtton to choose the event parameters to evaluate and choose Request.URL
Click the drop down arrow and select the ban list that you created above
Click OK and name the policy element
Drag a Result to the NO out put and select allow from the response dropdown, click OK
Connect the policy elements by dragging from each output to the next policy element
Save the policy and test
Using a file in a ban list and nesting lists
Lists can check the contents of a file for a match. This removes the requirement to add every entry to the Global data list and means that third party lists can be used easily. To add a file to the list:
Open the ban list to edit
Click the button to link the contents of a file to this list and browse to the list
Click open and you will see the file appear in the list
Click ok and test a request against the file
Nesting Lists
Lists can also be nested. Simply click the button to link the contents of another list to this list and select the appropriate list. The advantage of nesting lists is that separate lists can be created and maintained and checked as required, without needing to edit the main list.
Using authentication to apply lists to different users
Different levels of access can be provided based on the user/group connecting. In this case we will allow the managers group to access the Internet subject to the blacklist we created above. Users who are not in the managers group will only be able to access a whitelist of sites.
Select multiple policy elements and move them to create room in the policy builder windown
Drag a user/group check item onto the policy and select Authenticated users from the list of users and groups
Drag a result to the No output and select Auth from the dropdown list to force authentication for unauthenticated users
Drag a user/group check into the policy builder window and select the Managers group from the list
Drag a data list lookup to the No output of the Managers group check and select Whitelist from the dropdown
Drag a result to the No output of the Whitelist check and select Reject
Drag a result to the Yes output of the Whitelist check and select Allow