Skip to main content

User FAQ


Q. How do I log in?

  • Log in using your basic credentials (ID/password) or SSO (company account integration).
  • After a certain period of inactivity, you will be automatically logged out, and upon logging back in, you will return to the previous path.

Q. What is the difference between the address bar (URL input field) and app access?

  • AppClick on the icon of the business system (e.g., ERP, groupware) registered by the administrator to access it.
  • Address bar (URL): Directly enter the web address to access.
  • Both methods operate based on the conditional policies set by the administrator.

Q. Why does a blocking screen appear on some sites?

  • The access URL is subject to policy.BlockIt will be displayed when it is set.
  • In addition to the basic guidance text, company-specific text/images may be included.

Q. Can file downloads/uploads be blocked?

  • Yes, it is blocked/allowed/conditionally allowed according to the policy.

  • Example:

    • Block"Download is prohibited by policy."
    • Conditional Allowance: Download after PDF conversion, download after CDR (decontamination), etc.

Q. What is the reason the clipboard is not working?

  • In the RBI environment, copy/paste between PC and remote browser can be restricted by policy.
  • When blocked, the message "Clipboard usage is prohibited by policy." will be displayed.

Q. The abnormal access guide page appears and service access is unavailable. How can I resolve this?

If the session is not maintained properly due to browser or network environment issues, a "Abnormal Access" guidance page may be displayed.
Please check the items below and reconnect.

1) If you are using the Chrome browser

  1. Open Chrome settings
    • Settings > Privacy and Security > Site Settings
  2. SHIELD Gate URL selection
  3. 'Local Network Access (or Local Network Access)'itemAllowto change
  4. Reconnection

2) If you are using the Microsoft Edge browser

  1. Open Edge settings
    • Settings > Cookies and Site Permissions (or 'Site Permissions')
  2. SHIELD Gate URL selection
  3. 'Local Network Access (or Local Network Access)'permissionAllowto change
  4. Reconnection

3) If it is not a local network access permission issue

  1. Go to the SHIELD Gate home and reconnect.
    • The session information from your previous connection is no longer valid, so please reconnect.

* The menu location and names may vary by browser.
If the problem persists after changing the settings, please contact the administrator.


Q. How do I use desktop access (including WOL)?

  • Select from the pre-registered desktop list → Remote access available.
  • The turned-off PC is**WOL(Wake On LAN)**It can be turned on with a feature and is restricted according to the administrator policy.

What to do when a Q download error code appears?

  • E101: Network error
  • E201: Policy-based blocking
  • E301: CDR demilitarization failure
    • Check the response for each error code in the guide.

Q. Are there cases where the text I entered gets blocked?

  • Yes.Regular Expression Based Sensitive Information Checkis applied.
  • A blocking notification page will be displayed when entering specific patterns such as resident registration numbers or account numbers as set by the administrator.


Administrator FAQ

Q. How are policy priorities applied?

  • Conditional policies are**The lower the priority number, the sooner it is applied.**It is possible.
  • In case of a conflict, the more restrictive policy will be applied ultimately.

Q. How does the URL policy inspection rule work?

SHIELD Gate isStrict URL/Wildcard Rulesis applied.

  • Protocol Required Distinction: http://Wowhttps://is a separate policy

  • Automatic handling of slashes (/): at the very end/is automatically deleted.

  • www processingIn the protocol URL, www is automatically treated the same, while wildcard URLs are distinguished.

  • Using Wildcards:

    • front(*example.com) only allowed
    • middle(exam*ple.com) Not possible
    • end(domain.comThe system automatically __PH_0__*Add

Example:

등록: *naver.com  → 저장: *naver.com*
매칭: news.naver.com, blog.naver.com
비매칭: naver.co.kr, navernews.com

Q. How is web category-based blocking managed?

  • SHIELD Gate isInternal Category DBClassifies and controls URLs based on __PH_0__.

  • The DB is periodically expanded/updated.

  • The administrator incorrectly classifies theCompany-specific DBIt can be modified in __PH_0__.

  • Priority:

    1. Client Custom DB
    2. Original Category DB
    3. New URL → Update DB after classification

Q. Is keyword-based control possible?

  • Yes. Not the entire URL,Inclusion of specific keywordsYou can apply the policy.
    • You can configure it in the Input Sensitive Information Management menu.
  • For example: in the URL __PH_0__shoppingApply blocking policy when included.

Q. How can I control sensitive information using regular expressions?

  • When a regular expression is registered on the admin page, it checks whether the text entered by the user on the web matches the regular expression.
  • Input blocking and log recording during matching

Q. Is it possible to copy policies and set expiration dates?

  • It is possible to register a new policy by duplicating the existing conditional policy.
  • for each policy**Usage status · Validity period (Start ~ Expiration date)**Configurable.
  • Includes expiration imminent/expired status display feature.

Q. How do I configure the PAC file?

  • The administrator uploads the PAC file → SHIELD Gate isAutomatic Generation of Deployment URL.
  • Use this URL when deploying to the customer environment.
  • When replacing the PAC file, the address remains unchanged, and only the new file is reflected.

Q. Is the block page customizable?

  • Yes. You can reflect the logos, phrases, and images of each company.
  • You can configure it in the Admin Page > Security Screen Settings - Block Screen Settings menu.

Q. How is SHIELDrive (storage) operated?

  • File Storage + Edge ServerInfrastructure
  • Deleted files can be restored from the recycle bin.
  • Permanent deletion is irreversible.

Q. What is the automatic logout policy?

  • Inactive state (no mouse, keyboard, or scroll events) 기준
  • Can be set from 10 minutes to 12 hours.

Q. What should be noted when operating the policy?

  • Caution Against Wildcard Abuse: Possible unintended blocking occurs
  • Protocol (http/https) distinction is required.: Special caution when accessing the internal network