Firewall ACLs and Domain Blocking
Overview
Firewall Access Control Lists (ACLs) control which domains and websites users can access through their browsers.
Creating ACL Rules
Step 1: Navigate to Firewall ACLs
- Go to Security Policies > Firewall ACLs
- Click Add New Rule
Step 2: Configure Rule
- Domain Pattern: URL or pattern to match
- Action: Allow or Block
- Priority: Execution order (1 = highest)
- Description: Purpose of the rule
Step 3: Set Conditions
- Service Classes: Which user groups
- Time Schedule: When rule is active
- Exceptions: User or group overrides
Pattern Matching
Exact Domain
example.com
Matches only exact domain
Subdomain Wildcard
*.example.com
Matches all subdomains
Path Matching
example.com/admin/*
Matches specific paths
Multiple Domains
Create separate rules or use category-based blocking
Common ACL Scenarios
Block Social Media (Work Hours)
Domain: *.facebook.com, *.twitter.com, *.instagram.com
Action: Block
Schedule: Monday-Friday, 9am-5pm
Service Class: Standard Employee
Allow Corporate Resources
Domain: *.company.com
Action: Allow
Priority: 1
Service Class: All
Block File Sharing Sites
Domain: *.dropbox.com, *.wetransfer.com
Action: Block
Exceptions: IT Department
Restrict Webmail Access
Domain: gmail.com, yahoo.com, outlook.com
Action: Block
Exceptions: Allow personal email domain
Using Category-Based Blocking
Available Categories
- Social Networking
- Streaming Media
- File Sharing
- Gambling
- Adult Content
- Malware/Phishing
- Anonymizers/VPN
Creating Category Rules
- Select Use Category option
- Choose category from list
- Set action and priority
- Apply to service classes
Whitelist vs Blacklist Approach
Whitelist (Restrictive)
- Create default DENY all rule (low priority)
- Add ALLOW rules for approved sites (high priority)
- Best for high-security environments
Blacklist (Permissive)
- Default ALLOW all (low priority)
- Add BLOCK rules for prohibited sites
- Best for balanced productivity/security
Testing ACL Rules
Before Deployment
- Create test service class
- Enroll test browser
- Verify rules work as expected
- Check performance impact
After Deployment
- Monitor block events in analytics
- Review user feedback
- Adjust based on false positives
- Document changes
Best Practices
- Use priority levels effectively (1-100)
- More specific rules = higher priority
- Test before wide deployment
- Document business justification
- Review blocked sites quarterly
- Balance security with productivity
- Use time-based rules for flexibility
Monitoring and Reporting
View blocked attempts:
- Analytics Dashboard > Event Log
- Filter: Event Type = Block
- Export reports for compliance