<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet content filtering solutions for business - WFilter Blog &#187; How to filter internet access</title>
	<atom:link href="http://blog.wfilterngf.com/?cat=23&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://blog.wfilterngf.com</link>
	<description>Internet content filter and firewall solutions for business network.</description>
	<lastBuildDate>Thu, 28 Aug 2025 05:37:57 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.5</generator>
	<item>
		<title>How to diagnose the causes of traffic blocking in WFilter?</title>
		<link>http://blog.wfilterngf.com/?p=669</link>
		<comments>http://blog.wfilterngf.com/?p=669#comments</comments>
		<pubDate>Thu, 28 Aug 2025 05:37:57 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[How to filter internet access]]></category>
		<category><![CDATA[Network management]]></category>

		<guid isPermaLink="false">http://blog.wfilterngf.com/?p=669</guid>
		<description><![CDATA[To diagnose the causes of traffic blocking in WFilter, please try below steps: 1. Check the blocking events Click bandwidth number of the client device in &#8220;Realtime bandwidth&#8221;, you will be able to see the live connections and blocking events. When an internet activity is blocked, a new blocking event will be added. So, if [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>To diagnose the causes of traffic blocking in WFilter, please try below steps:</p>
<p>1. Check the blocking events</p>
<p>Click bandwidth number of the client device in &#8220;Realtime bandwidth&#8221;, you will be able to see the live connections and blocking events.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2025/08/1.png"><img class="alignnone  wp-image-670" alt="1" src="http://blog.wfilterngf.com/wp-content/uploads/2025/08/1.png" width="1874" height="766" /></a></p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2025/08/2.png"><img class="alignnone size-full wp-image-671" alt="2" src="http://blog.wfilterngf.com/wp-content/uploads/2025/08/2.png" width="1593" height="751" /></a></p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2025/08/3.png"><img class="alignnone size-full wp-image-672" alt="3" src="http://blog.wfilterngf.com/wp-content/uploads/2025/08/3.png" width="1523" height="657" /></a></p>
<p>When an internet activity is blocked, a new blocking event will be added. So, if there is no blocking event, it means no internet access policy is applied.</p>
<p>&#8220;Rule&#8221; indicates the violated internet access policy rule. &#8220;Remarks&#8221; has the blocking reason.</p>
<p>2.  Check the policy testing</p>
<p>In &#8220;Utils&#8221;-&gt;&#8221;Policy Testing&#8221;, you can test internet access of a certain IP. So you can disgnose the blocking reason.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2025/08/4.png"><img class="alignnone size-full wp-image-673" alt="4" src="http://blog.wfilterngf.com/wp-content/uploads/2025/08/4.png" width="1318" height="834" /></a></p>
<p>3. Check &#8220;Security&#8221; history</p>
<p>&#8220;IPS(intrusion prevention system)&#8221;, &#8220;AI Defense&#8221; also can block internet access in some circumstances. So please also check history of &#8220;IPS&#8221;, &#8220;IOCs&#8221; and &#8220;AI Defense&#8221; to see whether the client is blocked.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=669</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to whitelist websites in WFilter?</title>
		<link>http://blog.wfilterngf.com/?p=636</link>
		<comments>http://blog.wfilterngf.com/?p=636#comments</comments>
		<pubDate>Fri, 13 Mar 2020 06:44:54 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[How to filter internet access]]></category>

		<guid isPermaLink="false">http://blog.wfilterngf.com/?p=636</guid>
		<description><![CDATA[In WFilter NG firewall, whitelist a website is very simple. You simply need to put the domain in the allowed list of &#8220;web filter&#8221;. Screenshot as below: However, real world webpages can be complicated. For example, webpage A also includes resources from website B. So webpage A can not display correctly unless website B is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>In WFilter NG firewall, whitelist a website is very simple. You simply need to put the domain in the allowed list of &#8220;web filter&#8221;. Screenshot as below:</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist01.png"><img class="alignnone size-full wp-image-637" alt="whitelist01" src="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist01.png" width="1224" height="707" /></a></p>
<p>However, real world webpages can be complicated. For example, webpage A also includes resources from website B. So webpage A can not display correctly unless website B is also whitelisted.</p>
<p>To find out the domains of website B, you have to solutions:</p>
<p><strong>Solution one: check the blocking events in WFilter.</strong></p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist02.png"><img alt="whitelist02" src="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist02.png" width="1850" /></a></p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist03.png"><img class="alignnone size-full wp-image-638" alt="whitelist03" src="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist03.png" width="1719" height="793" /></a></p>
<p>In &#8220;realtime bandwidth&#8221;, click the bandwidth number of the testing client. You will be able to check the &#8220;blocking events&#8221;. All recent blocked domains/IP will be listed. So, you can find out the external domains.</p>
<p><strong>Solution two: check network activites in browser.</strong></p>
<p>By press F12, you will be able to check network activites of your browser. So you know which resources/urls are not loaded.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist04.png"><img class="alignnone size-full wp-image-640" alt="whitelist04" src="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist04.png" width="1321" height="888" /></a></p>
<p>With the above two solutions, you can find the extra domains to be whitelisted. You need to add these domains to the allowed list in web filter.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist05.png"><img class="alignnone size-full wp-image-643" alt="whitelist05" src="http://blog.wfilterngf.com/wp-content/uploads/2020/03/whitelist05.png" width="1232" height="710" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=636</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Web filtering software solution for network.</title>
		<link>http://blog.wfilterngf.com/?p=587</link>
		<comments>http://blog.wfilterngf.com/?p=587#comments</comments>
		<pubDate>Wed, 18 Sep 2019 04:39:39 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[How to block websites]]></category>
		<category><![CDATA[How to filter internet access]]></category>

		<guid isPermaLink="false">http://blog.wfilterngf.com/?p=587</guid>
		<description><![CDATA[To filter websites of local network clients, you can have several options. First check the features of your internet router/gateway. If you have a powerful router/gateway, you can directly do monitoring/filtering in the router itself. You also can try pass-by filtering software solutions. For example, WFilter internet content filter, by setting up a mirroring port [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>To filter websites of local network clients, you can have several options.</p>
<ol>
<li>First check the features of your internet router/gateway. If you have a powerful router/gateway, you can directly do monitoring/filtering in the router itself.</li>
<li>You also can try pass-by filtering software solutions. For example, <a href="http://www.wfiltericf.com/wfilter.htm" target="_blank">WFilter internet content filter</a>, by setting up a mirroring port in your switch, you can get powerful internet monitoring and filtering with the WFilter program.</li>
</ol>
<p>Network diagram:</p>
<p><img alt="" src="http://www.wfiltericf.com/support/WFilter_4_1/Doc/images/passby_switch_topology.png" /></p>
<p>WFilter is a windows software program. You can install it in any windows pc, when the wfilter pc is connected to the mirroring port of your switch, you will be able to monitor/filter all network clients.</p>
<p>In WFilter, you can setup internet filtering(application control) and website filtering policies.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2019/09/webfilter01.png"><img class="alignnone size-full wp-image-588" alt="webfilter01" src="http://blog.wfilterngf.com/wp-content/uploads/2019/09/webfilter01.png" width="1419" height="795" /></a></p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2019/09/webfilter02.png"><img class="alignnone size-full wp-image-589" alt="webfilter02" src="http://blog.wfilterngf.com/wp-content/uploads/2019/09/webfilter02.png" width="1508" height="853" /></a></p>
<p>You also can block websites by categories, for examples, porn/malicius/streaming sites can all be blocked by one click.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2019/09/webfilter03.png"><img class="alignnone size-full wp-image-590" alt="webfilter03" src="http://blog.wfilterngf.com/wp-content/uploads/2019/09/webfilter03.png" width="1657" height="731" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=587</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to block facebook videos streaming with WFilter NG firewall?</title>
		<link>http://blog.wfilterngf.com/?p=330</link>
		<comments>http://blog.wfilterngf.com/?p=330#comments</comments>
		<pubDate>Thu, 09 Feb 2017 08:22:55 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[How to filter internet access]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=330</guid>
		<description><![CDATA[Sometimes, you might want to block facebook video streaming to save your bandwidth. There is predefined protocol named &#8220;facebook videos&#8221; in WFilter, which can help you to block facebook video by a few clicks. Here is the protocol description: facebook videos protocol and ports. In another post, I&#8217;ve demonstrated how to block facebook videos with [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Sometimes, you might want to block facebook video streaming to save your bandwidth. There is predefined protocol named &#8220;facebook videos&#8221; in WFilter, which can help you to block facebook video by a few clicks. Here is the protocol description: <a href="http://www.wfiltericf.com/protocols/view.php?proto=facebook_video" target="_blank">facebook videos protocol and ports</a>.</p>
<p>In another post, I&#8217;ve demonstrated <a href="http://blog.wfilterngf.com/?p=128" target="_blank">how to block facebook videos with WFilter Enterprise</a>. In this post, I will guide you to block facebook videos with &#8220;WFilter NG firewall&#8221;, which is <a href="http://www.wfilterngf.com" target="_blank">a linux NG firewall designed for business networks</a>.</p>
<p>1. New a block facebook policy in &#8220;App Control&#8221;.<a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video01.png"><img class="alignnone size-full wp-image-331" alt="blockfb_video01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video01.png" /></a></p>
<p>2. Set &#8220;facebook videos&#8221; to &#8220;Deny&#8221; in &#8220;streaming&#8221;.<br />
<a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video02.png"><img class="alignnone size-full wp-image-333" alt="blockfb_video02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video02.png" /></a></p>
<p>3. That&#8217;s all. Now facebook videos will be blocked.<br />
<a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video1.png"><img class="alignnone size-full wp-image-332" alt="blockfb_video1" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video1.png" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video2.png"><img class="alignnone size-full wp-image-334" alt="blockfb_video2" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/blockfb_video2.png" /></a></p>
<p>Please note, because short/small videos come from a same source as images, so blocking of facebook video does not short video cuts. Only medium or large size videos can be blocked. </p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=330</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to block hotspot shield VPN in network with WFilter NG firewall?</title>
		<link>http://blog.wfilterngf.com/?p=324</link>
		<comments>http://blog.wfilterngf.com/?p=324#comments</comments>
		<pubDate>Tue, 07 Feb 2017 09:29:38 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[How to filter internet access]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=324</guid>
		<description><![CDATA[Hotspot shield is a popular VPN service, with free version available.  When launched, it will try to connect a lot TLS sites for traffic relaying. If you do packet sniffer with wireshark, you will see  traffic  from famous sites like &#8220;google.com, baidu.com&#8230;&#8221;. But in fact, it&#8217;s hotspot vpn traffic in the camouflage of normal TLS. Anyway, [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Hotspot shield is a popular VPN service, with free version available.  When launched, it will try to connect a lot TLS sites for traffic relaying. If you do packet sniffer with wireshark, you will see  traffic  from famous sites like &#8220;google.com, baidu.com&#8230;&#8221;. But in fact, it&#8217;s hotspot vpn traffic in the camouflage of normal TLS.</p>
<p>Anyway, our team has worked out a protocol pattern to block Hotspot shield traffic completely in your network. WFilter identifies Hotspot via signature matching, so no matter in which transfer type or client version, all Hotspot traffic can be blocked. Here is a protocol description of hotspot shield VPN: <a href="http://www.wfiltericf.com/protocols/view.php?proto=hotspot" target="_blank">protocol and port range of Hotspot shield.</a></p>
<p>Below are the steps with WFilter NG firewall:</p>
<p>1. New a &#8220;block hotspot&#8221; app control policy.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/block_hotspot_01.png"><img class="alignnone size-full wp-image-325" alt="block_hotspot_01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/block_hotspot_01.png" width="1143" height="654" /></a></p>
<p>2. Set &#8220;Hotspot shield&#8221; to &#8220;Deny&#8221;.<a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/block_hotspot_02.png"><img class="alignnone size-full wp-image-326" alt="block_hotspot_02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/block_hotspot_02.png" width="926" height="584" /></a></p>
<p>3. That&#8217;s all. Now hotspot shield will never be able to connect.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/hotspot_blocked.png"><img class="alignnone size-full wp-image-328" alt="hotspot_blocked" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/hotspot_blocked.png" width="567" height="426" /></a></p>
<p>4. The blocking event in WFilter NG firewall.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/02/block_hotspot_03.png"><img alt="block_hotspot_03" src="http://blog.wfilterngf.com/wp-content/uploads/2017/02/block_hotspot_03.png" /></a></p>
<p>Please note: all WFilter products can support blocking of hotspot shield, including <a href="http://www.wfilterngf.com">WFilter NG firewall </a>and <a href="http://www.wfiltericf.com/WFilter.htm">WFilter Enterprise</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=324</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>TradeManager Black &amp; white list is now supported in WFilter 4.1</title>
		<link>http://blog.wfilterngf.com/?p=149</link>
		<comments>http://blog.wfilterngf.com/?p=149#comments</comments>
		<pubDate>Wed, 02 Jul 2014 06:34:10 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Block Messenger]]></category>
		<category><![CDATA[How to filter internet access]]></category>

		<guid isPermaLink="false">http://blog.imfirewall.us/TradeManager+Black+White+List+Is+Now+Supported+In+WFilter+41.aspx</guid>
		<description><![CDATA[The following example will show you how to use TradeManger black list. 1. New a blocking level named &#8220;trademanager&#8221; 2. Configure the black list Notice: you should add &#8220;aliint&#8221; before your account, and save the configuration. 3. Apply the blocking level 4. Check blocking of TradeManager 5. Check real-time block As you can see in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The following example will show you how to use TradeManger black list.</p>
<p>1. New a blocking level named &#8220;trademanager&#8221;</p>
<p><img border="0" src="http://blog.wfilterngf.com/content/binary/alibb1.jpg"></p>
<p>2. Configure the black list </p>
<p>Notice: you should add &#8220;aliint&#8221; before your account, and save the configuration.</p>
<p><img border="0" src="http://blog.wfilterngf.com/content/binary/alibb2.jpg"><br /><img border="0" src="http://blog.wfilterngf.com/content/binary/alibb3.jpg"></p>
<p>3. Apply the blocking level</p>
<p><img border="0" src="http://blog.wfilterngf.com/content/binary/alibb4.jpg"></p>
<p>4. Check blocking of TradeManager</p>
<p><img border="0" src="http://blog.wfilterngf.com/content/binary/alibb5.jpg"></p>
<p>5. Check real-time block</p>
<p><img border="0" src="http://blog.wfilterngf.com/content/binary/alibb6.jpg"></p>
<p>As you can see in the above example, TradeManager accounts in the black list will not be able to login.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=149</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WFilter 4.1 version is coming.</title>
		<link>http://blog.wfilterngf.com/?p=160</link>
		<comments>http://blog.wfilterngf.com/?p=160#comments</comments>
		<pubDate>Mon, 30 Sep 2013 10:39:23 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[How to filter internet access]]></category>
		<category><![CDATA[How to monitor internet bandwidth]]></category>

		<guid isPermaLink="false">http://blog.imfirewall.us/WFilter+41+Version+Is+Coming.aspx</guid>
		<description><![CDATA[Finally, WFilter 4.1 version is coming to the beta testing after two years of development. Now let me show you the exciting new features in this new version. 1. More deployment solutions More deployment solutions are added, especially for wifi networks. We also added solutions to monitor by mac address in multiple segments networks. In [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Finally, WFilter 4.1 version is coming to the beta testing after two years of development. Now let me show you the exciting new features in this new version.</p>
<h1>1. More deployment solutions</h1>
<p>More deployment solutions are added, especially for wifi networks. We also added solutions to monitor by mac address in multiple segments networks. In WFilter 4.0 version, only &#8220;by ip address&#8221; mode is supported, the new version will retrieve mac address information from your core switch via SNMP.</p>
<h1>2. More monitored content</h1>
<p>Added support for ip protocols and ip fragment. For web monitoring, WFilter new version will record browser type(userAgent) as well.</p>
<h1>3. Faster UI speed</h1>
<p>We adopted fastcgi technology in the new 4.1 version, which makes great improvement on UI loading speed. Monitoring performance is also improved.</p>
<h1>4. New UI design</h1>
<p>Added &#8220;common&#8221; menu for you to define common used menus, so you can open a page within one click.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/menu_4_1.png" border="0"></p>
<p>We also re-designed the &#8220;online computers&#8221; page.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/allonline_devices_4_1.png" border="0"><br />
<img src="http://blog.wfilterngf.com/content/binary/allonline_connections_4_1.png" border="0"></p>
<h1>5. New &#8220;Protocols&#8221; system </h1>
<p>With this &#8220;protocols&#8221; system, you can download and share protocols within a few clicks. You will never have the pain to configure new protocols any more.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/protocols_4_1.png" border="0"></p>
<h1>6. New &#8220;Plugins&#8221; system </h1>
<p>We integrated a set of tools for network monitoring and management, which is still growing. You can get plugins for network discovery, wfilter management and other related features.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/plugins_4_1.png" border="0"></p>
<h1>7. New &#8220;web content push&#8221; feature</h1>
<p>This feature enables you to push web content without a real blocking. You can define time interval, web push triggers for this content to appear regular in client computers.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/webcontent_push_4_1.png" border="0"></p>
<h1>8. More flexible policy settings</h1>
<p>With the last version, it&#8217;s easier to assign policy for new detected devices, and set default OU policy for new detected AD users.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/user_table_4_1.png" border="0"></p>
<p>New version downloading URL: <a href="http://www.wfiltericf.com/trial/WFilter_en_4_1.zip">WFilter 4.1</a></p>
<p>Please notice: WFilter 4.1 version is still in beta testing, and some features are not fully tested. This version is only for preview and testing purpose. So if you already have a stable WFilter 4.0 running, it&#8217;s not wise to replace it with this beta version.</p>
<p></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=160</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to monitor and filter internet activities of PPPOE users?</title>
		<link>http://blog.wfilterngf.com/?p=164</link>
		<comments>http://blog.wfilterngf.com/?p=164#comments</comments>
		<pubDate>Tue, 02 Jul 2013 06:13:03 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Block Messenger]]></category>
		<category><![CDATA[Chat Monitor]]></category>
		<category><![CDATA[Content Filter]]></category>
		<category><![CDATA[How to block internet]]></category>
		<category><![CDATA[How to filter internet access]]></category>
		<category><![CDATA[How to monitor internet bandwidth]]></category>
		<category><![CDATA[How to monitor internet usage]]></category>
		<category><![CDATA[Internet Monitoring]]></category>

		<guid isPermaLink="false">http://blog.imfirewall.us/How+To+Monitor+And+Filter+Internet+Activities+Of+PPPOE+Users.aspx</guid>
		<description><![CDATA[PPPOE is widely used for user authentication and traffic accounting. However, it&#8217;s a little difficult to monitor and filter PPPOE clients&#8217; internet usage and behavior. In this example, we will demonstrate you to monitor and filter PPPOE clients with WFilter Free. Please notice that only non-encrypted and uncompressed PPPOE traffic can be supported. So the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>PPPOE is widely used for user authentication and traffic accounting. However, it&#8217;s a little difficult to monitor and filter PPPOE clients&#8217; internet usage and behavior. </p>
<p>In this example, we will demonstrate you to monitor and filter PPPOE clients with WFilter Free. Please notice that only non-encrypted and uncompressed PPPOE traffic can be supported. So the first step is to configure your PPPOE server for non-encryption and non-compression.</p>
<h2>1. PPPOE server settings</h2>
<p>Let&#8217;s take windows 2003 and RouteOS for examples.</p>
<h4>1). 2003 Server Configuration</h4>
<p>If you are using windows 2003 server as the PPPOE server, please follow below steps to configure:</p>
<p>In &#8220;Properties&#8221; of the &#8220;Routing and Remote Access&#8221;, disable &#8220;software compression&#8221; and &#8220;LCP&#8221; in the &#8220;PPP&#8221; tab.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_01.png" border="0"></p>
<p>Edit &#8220;remote access policy&#8221; for &#8220;no encryption&#8221; in &#8220;Edit Profile&#8221;. <font color="#FF0000">Notice: The default two policies shall all be modified.</font></p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_02.png" border="0"><br />
<br />
<img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_03.png" border="0"></p>
<h4>2). ROS Configuration</h4>
<p>If you are using routeOS as PPPOE server, please follow these steps to disable compression and encryption:</p>
<p>In &#8220;PPP&#8221; tab of &#8220;Profiles&#8221;, click &#8220;Protocols&#8221; and disable compression and encryption.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_ZH_24.png" border="0"></p>
<h2>2. Monitor PPPOE clients in WFilter</h2>
<h3>2.1) Choose the internal adapter</h3>
<p>Now WFilter is able to parse PPPOE traffic. In this example, we just install WFilter free in the windows 2003 PPPOE server.</p>
<p>You need to choose the internal adapter as the &#8220;monitoring adapter&#8221; in &#8220;System Settings&#8221;-&gt;&#8221;Monitoring Settings&#8221; of WFilter.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_04.png" border="0"><br />
<img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_05.png" border="0"></p>
<h3>2.2). Setup client policy</h3>
<p>Add a block policy to block web surfing.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_06.png" border="0"><br />
<img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_07.png" border="0"></p>
<p>Apply this policy to PPPOE clients&#8217; ip ranges</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_08.png" border="0"><br />
<img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_09.png" border="0"></p>
<h3>2.3). Check Blocking</h3>
<p>PPPOE clients get blocked.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_10.png" border="0"></p>
<p>Blocking events in WFilter.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/PPPOE_en_11.png" border="0"></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=164</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WFilter deployment with a network tap.</title>
		<link>http://blog.wfilterngf.com/?p=170</link>
		<comments>http://blog.wfilterngf.com/?p=170#comments</comments>
		<pubDate>Wed, 27 Mar 2013 09:22:52 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[How to filter internet access]]></category>
		<category><![CDATA[How to monitor internet usage]]></category>
		<category><![CDATA[Internet Monitoring]]></category>

		<guid isPermaLink="false">http://blog.imfirewall.us/WFilter+Deployment+With+A+Network+Tap.aspx</guid>
		<description><![CDATA[1. What is network tap? Network tap is also a good way to monitor network traffic. Comparing to &#8220;port mirroring&#8221; switch, it has several advantages: Handy and flexible, requires no power supply. Once a network tap is in place, the network can be monitored without interfering with the network itself. Low cost, you even can [&#8230;]]]></description>
				<content:encoded><![CDATA[<h1>1. What is network tap?</h1>
<p><a href="http://en.wikipedia.org/wiki/Ethernet_tap" target="_blank">Network tap</a> is also a good way to monitor network traffic. Comparing to &#8220;port mirroring&#8221; switch, it has several advantages:</p>
<ol>
<li>Handy and flexible, requires no power supply.</li>
<li>Once a network tap is in place, the network can be monitored without interfering with the network itself.</li>
<li>Low cost, you even can dry it by yourself.</li>
</ol>
<p>Guide to make a network tap can be found at below links:</p>
<ol>
<li><a href="http://greatscottgadgets.com/throwingstar/" target="_blank">Throwing Star LAN Tap</a></li>
<li><a href="http://www.enigmacurry.com/category/diy/" target="_blank">Building an Ethernet Tap</a></li>
<li><a href="http://ossmann.blogspot.ca/2011/02/throwing-star-lan-tap.html" target="_blank">Throwing Star LAN Tap</a></li>
<li><a href="http://thnetos.wordpress.com/2008/02/22/create-a-passive-network-tap-for-your-home-network/" target="_blank">Create a passive network tap for your home network</a></li>
</ol>
<p>The disadvantages of network tap:</p>
<ol>
<li>Can not monitor gigabit networks. Requires &#8220;filterable tap&#8221;.</li>
<li>The monitoring port does not allow outgoing traffic. Therefore you need three network cards in the monitoring computer, two for monitoring, another for communication.</li>
</ol>
<p>This blog will guide you to deploy WFilter with &#8220;Throwing Star LAN Tap&#8221;.</p>
<h1>2. Deploy the LAN Tap.</h1>
<p>First, you need to attach three network cards in the monitoring computer. </p>
<p><img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_01.jpg" border="0" height="83" width="625"></p>
<p>In this example, this lan tap is connected between the router and first switch(J1 and J2). Monitoring ports J3 and J4 are connected to two adapters of the monitoring computer.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_00.jpg" border="0" height="400" width="587"></p>
<p>Actually it does not require ip address for the monitoring adapters. In this example, we assign &#8220;192.168.1.181&#8243;, &#8220;192.168.1.182&#8243; to the two monitoring adapters(Assigning an ip address makes it easier for us to identify the adapter in WFilter). The third adapter is assigned with &#8220;192.168.2.189&#8243;.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_04.jpg" border="0"></p>
<h1>3. Setup WFilter</h1>
<p>Check the two monitoring adapters in &#8220;System Settings&#8221;-&gt;&#8221;Monitoring Settings&#8221;. The blocking adapter shall be choosed as the third adapter for sending blocking packets.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_05.jpg" border="0"></p>
<p>Now we&#8217;re able to monitor client computers. You will notice that one monitoring adapter only get incoming packets, while another adapter only get outgoing packets. This is how network tap is designed.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_06[1].jpg" border="0"><br />
<img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_07.jpg" border="0"></p>
<p>Client computers also can be blocked.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NetWorkTap_12.jpg" border="0"></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=170</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to block stock market trading programs in network?</title>
		<link>http://blog.wfilterngf.com/?p=182</link>
		<comments>http://blog.wfilterngf.com/?p=182#comments</comments>
		<pubDate>Tue, 28 Aug 2012 07:23:50 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[How to filter internet access]]></category>

		<guid isPermaLink="false">http://blog.imfirewall.us/How+To+Block+Stock+Market+Trading+Programs+In+Network.aspx</guid>
		<description><![CDATA[Employees can spend hours on reading market data and online stock trading. To keep productivity, it is necessary to block online trading traffic during working hours. This tutorial will guide you to block &#8220;Nest trader&#8221; and &#8220;(IIFL) Trader Terminal&#8221; traffic in your network. Since WFilter does not have these two protocols supported in default, you [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Employees can spend hours on reading market data and online stock trading. To keep productivity, it is necessary to block online trading traffic during working hours.</p>
<p>This tutorial will guide you to block &#8220;Nest trader&#8221; and &#8220;(IIFL) Trader Terminal&#8221; traffic in your network.</p>
<p>Since WFilter does not have these two protocols supported in default, you need to add customize protocols in &#8220;System Settings&#8221;-&gt;&#8221;Customize Protocols&#8221;.</p>
<h1>1. Block IIFL trade terminal </h1>
<p>1). Add a new protocol named &#8220;IIFL Trader&#8221;, choose a protocol type.</p>
<p>2). Add a new pattern, choose pattern &#8220;Type&#8221; as &#8220;TLS&#8221;.  Set pattern content as &#8220;swaraj\.indiainfoline\.com&#8221;.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/IIFL_Trader_001.JPG" border="0"></p>
<p>3). Check &#8220;Block IIFL Trader&#8221; in your blocking policy.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/IIFL_Trader_002.JPG" border="0"></p>
<p>4). Now IIFL trader can be blocked.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/IIFL_Trader_004.JPG" border="0"></p>
<h1>2. Block &#8220;Nest trader&#8221;</h1>
<p>1). Add a new protocol named &#8220;Nest Trader&#8221;, choose a protocol type.</p>
<p>2). Add a new pattern, choose pattern &#8220;Type&#8221; as &#8220;TCP SEND&#8221;.  Set pattern content as &#8220;^\x00\x00\x00\x13\x52\x55\x00\x0f\x6c\x69\x63\x65\x6e\x73\x65\x5f\x63\x68\x65\x63\x6b\x65\x72&#8243;.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NestTrader_001.JPG" border="0"></p>
<p>3). Check &#8220;Block Nest Trader&#8221; in your blocking policy.</p>
<p><img src="http://blog.wfilterngf.com/content/binary/NestTrader_002.JPG" border="0"></p>
<p>4). Done. Now Nest trader will also be blocked.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=182</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
