How to Restrict Internet Access for Specific Users Based on Schedule

User Requirements
 
During business hours (Monday to Friday, 9:00 to 18:00), ordinary employees (IP address range: 192.168.16.2 -192.168.16.99) are only allowed to access certain websites, such as www.uttglobal.com.
 
During rest periods, employees can access the Internet without any restrictions.
 
Directors and managers (IP address range: 192.168.16.100 -192.168.16.120) can access the Internet without any restrictions.
 
Configuration Steps
Login to the Web UI of your device, and then do the following settings.
 
Configuring Schedule
Go to the Security > Schedule > Schedule Settings page to create a schedule for business hours:Monday to Friday, 9:00 to 18:00.
 
 
Note:
1)    The Start Date and End Date specify when the schedule begins and ends. If exceed the specified range, the schedule won’t take effect.
2)    For a schedule, you can configure up to eight time periods to specify further constraints of active time by the days of the week, daily start time and daily end time. The start time and end time of a time period must fall within the same day (all times expressed in 24-hour clockformat).
 
Configuring Address Group
Go to the Security > Address Group > Address Group Settings page to create an address group that contains a range of IP addresses from 192.168.16.2 to 192.168.16.99.
 
 
Configuring Service Group
Go to the Security > Service Group > Service Group Settings page to create a service group: Service Type is URL, and Service Member is www.uttglobal.com.
 
 
Configuring Access Control Rule
Go to the Security > Firewall > ACL Settings page to create two access control rules to meet the requirements. First create a rule to allow the employees to access www.uttglobal.com during businesses hours, next create another rule to block their access to any other Internet services during business hours.
 
Note that the system will automatically generate a default access rule of ¡°pass”, which is used to allow all the IP packets to pass.
 
 
 
Enabling Access Control
Go to the Security > Firewall > Access Control List page to enable access control feature to make access control rules take effect, see the following figure.
 
 

The configuration is now complete, and you can view the access rules in the Access Control List.
Note
1.      To ensure that time based access control works properly, please synchronize the system clock in the System > Time page, see the following figure. It is suggested that you choose SNTP to automatically synchronize time in most cases.
 
 
2.      To prevent the employees from changing their IP addresses to get rid of restrictions, you’d better go to the Security > IP/MAC Binding page to configure IP/MAC address bindings.