I
NTRODUCTORY
S
ECTION
C
HAPTER
1: F
ILTERING
O
PERATIONS
8
E
6 T
ECHNOLOGIES
, R3000 E
NTERPRISE
F
ILTER
U
SER
G
UIDE
13
When users (Client PCs) make Internet requests, the traffic
flows (1) through the network path without interruption. The
R3000 captures the request as the user’s request (2) leaves
the network. The R3000 then determines the action (3) to
either block or pass the request. If the R3000 determines to
block the user’s request, a block message (4) is sent to the
user plus a terminate message (4) is sent to the Internet
server.
An R3000 set up in the invisible mode can also work in the
router mode. Figure 1:1-2 illustrates an example of a
monitor mode setup, with the R3000 connected to the
managed switching hub. In this setup, the R3000 port is
configured with the port monitoring function enabled, so that
the R3000’s port mirrors the port connected to the router.
Fig. 1:1-2 Invisible mode diagram, with port monitoring
In the invisible mode, the R3000 performs as a standalone
server that can be connected to any network environment.
Summary of Contents for Enterprise Filter Authentication R3000
Page 1: ... R3000 Enterprise Filter USER GUIDE Model R3000 Release 2 1 00 Manual Version 1 02 ...
Page 2: ...ii 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE ...
Page 4: ...iv 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE ...
Page 578: ...APPENDICES SECTION APPENDIX H 554 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE ...
Page 594: ...INDEX 570 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE ...