SlideShare a Scribd company logo
1 of 31
Download to read offline
pfSense Installation and Initial Setup
You can download the installation iso file for CD and img file for USB (Memstick) at www.pfsense.org/downloads.
In this example, I used USB memstick with amd64 architecture.
Upon booting on CD/USB, The following illustrations below are guide about what you are going through
on setting up pfSense Firewall.
 Let autoboot start the boot process or press 1.
 After several scripts are shown it will stop at this point. Press I to install launch the installer or let
the auto boot continue.
 This is the first page of installation. Select accept these settings.
 Click on Quick/Easy install
 Click OK if you don’t need to custom your disk partition
 Select standard kernel so that you can use your VGA and Keyboard
Devices to the console.
 Reboot the machine and when remove the installation media when
the device is shut down.
 Before reboot, you will see the pfSense LAN interface IP address and
the username and password. (used in accessing webGUI)
 LAN IP: 192.168.1.1 User: admin pw: pfsense
The following illustrations found after the installation finished and the machine was rebooted.
 In this example, I assign re1 for WAN and re0 for LAN. Press y to
proceed on setting up VLANs.
 TIP: plug in your LAN interface, disconnect the WAN so that you
can easily determine the re0 and re1 interface on your physical
drive.
 On the box above, I set the WAN interface to re1 and LAN interface
to re0. On the optional interface leave it blank and press enter. The
n click y to proceed.
 The main screen of your pfsense console.
 I have a PPPoE connection provided by Globe. Set your own WAN
connection depending on your type of connection. On Configuring
my WAN interface, I selected PPPoE . Then scroll down until you see
the PPPoE configuration section.
 On this PPPoE section, Fill up the PPPoE Username and Password.
 Set your LAN IP Address then click next
 If you want to change the default password fill up the fields on the
illustration above.
 Click on reload
 Click “here” word on the Click here to continue pfSense
webConfigurator.
 This is your dashboard, you can customize your view here (add
Widgets)
Installing Squid and SquidGuard Package on pfSense
Install the Package
First, install the Squid package.
1. Click System > Packages
2. Click on the Available Packages Tab
3. Scroll down until the "squid" and “squidGuard” package listing is visible
4. Click located to the right of the squid package description
5. Wait for the installer to download, install, and do post-install tasks for squid, such as creating the cache
directories.
6. Refer to image below:
Adding Personal Signed Certificate (to be used in ssl filtering)
Go to System -> Cert. Manager
On Cert Manager select CAs tab then click add.
Fill up necessary fields. Then click save
Configure the Squid Package
 Select services -> Squid Proxy Server
 Tick check to enable the squid proxy
 Tick to keep settings when you reinstall the package.
 Choose LAN interface to proxy LAN
 On the general settings tab, tick check the enable and press enter to start squidguard service.
 On Logging Options section, tick check Enable log GUI, Enable log and Rotation log.
 On Blacklist section, tick check Blacklist to enable it. Then fill up Blacklist URL where you can
download the tar.gz file. (Search for http://www.squidguard.org/blacklists.html for the URLs)
 Select the Blacklist tab then click on download. Wait until the download reach 100%.
 Now go to Times tab, Click add button.
 Fill up preferred schedule, if there is additional time click add on the bottom of the time
table. (Here I created Office Hours Mon-Fri 8am – 5pm With 12pm-1pm lunchbreak and
10am-10:30am and 3:00pm to 3:30pm breaktime.) Then click save when done.
 Click Target categories tab, click add to add a target category. (What to block and what to exempt
IPs and domains.
 Name your category on first field on general settings.
 Fill in the domains that are included in the category. List the domains separated by
space.
 On regular expression text area, fill in the words that are blocked by URL word content. You can
also add file extensions to block download of the file types.
 Click in to Group ACL then click add button. (you can also use the common acl but common ACLs
don’t have option to scheduling.)
 On the name field, type the name of the group. (example is ACTSTECHnetwork because clients
on this network are being controlled.
 On client source field, type the ip range or ip address or subnet for the clients that are included
in this access control group.
 On time field, select the schedule that you created for this group.
 On Target Rules List, click the + button to collapse the list of targets. You can see there are to
columns but the same lists, the left side is to deny a target list on the scheduled time while the
right side is the access when the schedule is idle or not in the schedule.
 On the bottom of the target rules list, allow default access(all).
 Choose ext url redirect (enter URL) as your redirect mode.
 Input the redirect URL to the redirect field.
 Tick check the log to Log this Group.
 Click save Button.

More Related Content

Similar to Pf sense installation and initial setup

2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guide2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guidegunboundz
 
Documentation free nas
Documentation free nasDocumentation free nas
Documentation free nasMoaaz Magdy
 
Documentation freenas
Documentation freenas Documentation freenas
Documentation freenas Moaaz Magdy
 
Lsmw (Legacy System Migration Workbench)
Lsmw (Legacy System Migration Workbench)Lsmw (Legacy System Migration Workbench)
Lsmw (Legacy System Migration Workbench)Leila Morteza
 
How to Block Malicious Address by Using Feed Service?
How to Block Malicious Address by Using Feed Service?How to Block Malicious Address by Using Feed Service?
How to Block Malicious Address by Using Feed Service?İbrahim UÇAR
 
Orangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User ManualOrangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User ManualOrangescrum
 
Installation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows componentsInstallation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows componentsWarda Chaudhry
 
Tutorial Attendance Pingerprint
Tutorial Attendance PingerprintTutorial Attendance Pingerprint
Tutorial Attendance PingerprintAsius
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501TSOLUTIONS
 
SAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdfSAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdfPhani Pavan
 
SAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdfSAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdfPhani Pavan
 
Dating Pro Installation Instructions
Dating Pro Installation InstructionsDating Pro Installation Instructions
Dating Pro Installation InstructionsPilot Group Ltd
 
Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting startedErnesto Celis
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitVishal Kumar
 
Lab 4 Configure End Devices.pdf
Lab 4 Configure End Devices.pdfLab 4 Configure End Devices.pdf
Lab 4 Configure End Devices.pdfHaseebAli795005
 

Similar to Pf sense installation and initial setup (20)

2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guide2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guide
 
Documentation free nas
Documentation free nasDocumentation free nas
Documentation free nas
 
Documentation freenas
Documentation freenas Documentation freenas
Documentation freenas
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
 
Lsmw (Legacy System Migration Workbench)
Lsmw (Legacy System Migration Workbench)Lsmw (Legacy System Migration Workbench)
Lsmw (Legacy System Migration Workbench)
 
How to Block Malicious Address by Using Feed Service?
How to Block Malicious Address by Using Feed Service?How to Block Malicious Address by Using Feed Service?
How to Block Malicious Address by Using Feed Service?
 
How To Install CentOS 7
How To Install CentOS 7How To Install CentOS 7
How To Install CentOS 7
 
Orangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User ManualOrangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User Manual
 
Installation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows componentsInstallation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows components
 
Createlistener
CreatelistenerCreatelistener
Createlistener
 
Tutorial Attendance Pingerprint
Tutorial Attendance PingerprintTutorial Attendance Pingerprint
Tutorial Attendance Pingerprint
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
SAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdfSAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdf
 
SAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdfSAP ABAP lsmw beginner lerning tutorial.pdf
SAP ABAP lsmw beginner lerning tutorial.pdf
 
Install notes!
Install notes!Install notes!
Install notes!
 
soul1_appl-server-instl..ppt
soul1_appl-server-instl..pptsoul1_appl-server-instl..ppt
soul1_appl-server-instl..ppt
 
Dating Pro Installation Instructions
Dating Pro Installation InstructionsDating Pro Installation Instructions
Dating Pro Installation Instructions
 
Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting started
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
 
Lab 4 Configure End Devices.pdf
Lab 4 Configure End Devices.pdfLab 4 Configure End Devices.pdf
Lab 4 Configure End Devices.pdf
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Pf sense installation and initial setup

  • 1. pfSense Installation and Initial Setup You can download the installation iso file for CD and img file for USB (Memstick) at www.pfsense.org/downloads. In this example, I used USB memstick with amd64 architecture. Upon booting on CD/USB, The following illustrations below are guide about what you are going through on setting up pfSense Firewall.  Let autoboot start the boot process or press 1.  After several scripts are shown it will stop at this point. Press I to install launch the installer or let the auto boot continue.
  • 2.  This is the first page of installation. Select accept these settings.
  • 3.  Click on Quick/Easy install  Click OK if you don’t need to custom your disk partition  Select standard kernel so that you can use your VGA and Keyboard Devices to the console.
  • 4.  Reboot the machine and when remove the installation media when the device is shut down.  Before reboot, you will see the pfSense LAN interface IP address and the username and password. (used in accessing webGUI)  LAN IP: 192.168.1.1 User: admin pw: pfsense
  • 5. The following illustrations found after the installation finished and the machine was rebooted.  In this example, I assign re1 for WAN and re0 for LAN. Press y to proceed on setting up VLANs.  TIP: plug in your LAN interface, disconnect the WAN so that you can easily determine the re0 and re1 interface on your physical drive.  On the box above, I set the WAN interface to re1 and LAN interface to re0. On the optional interface leave it blank and press enter. The n click y to proceed.
  • 6.  The main screen of your pfsense console.
  • 7.
  • 8.  I have a PPPoE connection provided by Globe. Set your own WAN connection depending on your type of connection. On Configuring my WAN interface, I selected PPPoE . Then scroll down until you see the PPPoE configuration section.  On this PPPoE section, Fill up the PPPoE Username and Password.
  • 9.  Set your LAN IP Address then click next  If you want to change the default password fill up the fields on the illustration above.  Click on reload
  • 10.  Click “here” word on the Click here to continue pfSense webConfigurator.  This is your dashboard, you can customize your view here (add Widgets)
  • 11. Installing Squid and SquidGuard Package on pfSense Install the Package First, install the Squid package. 1. Click System > Packages 2. Click on the Available Packages Tab 3. Scroll down until the "squid" and “squidGuard” package listing is visible 4. Click located to the right of the squid package description 5. Wait for the installer to download, install, and do post-install tasks for squid, such as creating the cache directories. 6. Refer to image below:
  • 12. Adding Personal Signed Certificate (to be used in ssl filtering) Go to System -> Cert. Manager On Cert Manager select CAs tab then click add.
  • 13. Fill up necessary fields. Then click save
  • 14. Configure the Squid Package  Select services -> Squid Proxy Server  Tick check to enable the squid proxy
  • 15.  Tick to keep settings when you reinstall the package.  Choose LAN interface to proxy LAN
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.  On the general settings tab, tick check the enable and press enter to start squidguard service.  On Logging Options section, tick check Enable log GUI, Enable log and Rotation log.
  • 24.  On Blacklist section, tick check Blacklist to enable it. Then fill up Blacklist URL where you can download the tar.gz file. (Search for http://www.squidguard.org/blacklists.html for the URLs)  Select the Blacklist tab then click on download. Wait until the download reach 100%.  Now go to Times tab, Click add button.
  • 25.  Fill up preferred schedule, if there is additional time click add on the bottom of the time table. (Here I created Office Hours Mon-Fri 8am – 5pm With 12pm-1pm lunchbreak and 10am-10:30am and 3:00pm to 3:30pm breaktime.) Then click save when done.
  • 26.  Click Target categories tab, click add to add a target category. (What to block and what to exempt IPs and domains.  Name your category on first field on general settings.
  • 27.  Fill in the domains that are included in the category. List the domains separated by space.  On regular expression text area, fill in the words that are blocked by URL word content. You can also add file extensions to block download of the file types.  Click in to Group ACL then click add button. (you can also use the common acl but common ACLs don’t have option to scheduling.)
  • 28.  On the name field, type the name of the group. (example is ACTSTECHnetwork because clients on this network are being controlled.  On client source field, type the ip range or ip address or subnet for the clients that are included in this access control group.  On time field, select the schedule that you created for this group.
  • 29.  On Target Rules List, click the + button to collapse the list of targets. You can see there are to columns but the same lists, the left side is to deny a target list on the scheduled time while the right side is the access when the schedule is idle or not in the schedule.
  • 30.  On the bottom of the target rules list, allow default access(all).
  • 31.  Choose ext url redirect (enter URL) as your redirect mode.  Input the redirect URL to the redirect field.  Tick check the log to Log this Group.  Click save Button.