background image

I

NTRODUCTORY

 S

ECTION

    

C

HAPTER

 4: G

ETTING

 S

TARTED

58

8

E

6 T

ECHNOLOGIES

, R3000 E

NTERPRISE

 F

ILTER

 U

SER

 G

UIDE

Topic Links

In System, Library, and Reporting screens, the navigation 
panel contains topic links. By clicking a topic link, the 
window for that topic displays in the right panel:

Fig. 1:4-9  Selected topic and its corresponding window

Summary of Contents for Enterprise Filter R3000IR

Page 1: ...R3000 Enterprise Filter 8e6R USER GUIDE Model R3000IR Release 2 0 00 Version No 1 02...

Page 2: ...ii 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE...

Page 3: ...kes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular pur pose 8e6 Technologies shall not be liable for any error or...

Page 4: ...iv 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE...

Page 5: ...ions 11 Operational Modes 11 Invisible Mode 12 Router Mode 14 Firewall Mode 15 Group Types 17 Global Group 17 IP Groups 18 Filtering Profile Types 19 Static Filtering Profiles 20 Master IP Group Filte...

Page 6: ...om Using IM P2P 32 Block IM for a Specific Entity 32 Block P2P for a Specific Entity 33 Chapter 3 Synchronizing Multiple Units 34 R3000 Synchronization 34 Synchronization Setup 36 Setting up a Source...

Page 7: ...e 48 Log On 48 Last Library Update message 51 Navigation Tips 53 Access Main Sections 53 Help Features 55 Access Help Topics 55 Tooltips 56 Screen and Window Navigation 57 Topic Links 58 Select Sub to...

Page 8: ...80 Options page 82 Option 2 83 Option 3 84 ShutDown window 85 Shut Down the Server 85 Reboot window 86 Reboot the Server 87 Network 89 LAN Settings window 90 Specify LAN Settings 91 NTP Servers window...

Page 9: ...Whether a Profile is Active 112 Admin Audit Trail window 115 Admin Audit Trail 115 Specify FTP Criteria 116 FTP the Log on Demand 116 View 117 View the Log of Administrator Changes 117 Alert 118 Alert...

Page 10: ...iew the Sync Status of the Target Server 148 Mode 150 Operation Mode window 151 Set the Operation Mode 152 Specify the Listening Device 152 Specify the Block Page Device 152 Invisible Option Specify t...

Page 11: ...ailure Detection window 176 X Strikes Blocking 177 X Strikes Blocking window 177 Configuration 178 Set up Blocking Criteria 178 Reset All Workstations 179 Lock Page 179 Overblocking or Underblocking 1...

Page 12: ...Edit Entries 205 Preview Sample Warning Page 205 Profile Control window 208 Edit Entries 209 Chapter 2 Group screen 210 Global Group 212 Range to Detect window 213 Add a Segment to the Network 214 Ran...

Page 13: ...Service Ports 255 Minimum Filtering Bypass Options 257 Specify Minimum Filtering Bypass Options 258 Refresh All 259 Refresh All Main Branches 259 IP 260 Add Group 261 Add a Master IP Group 261 Refres...

Page 14: ...odule 285 Enable Customer Feedback Module 285 Category Weight System 288 Category Weight System window 288 View the Current Selections 289 Method for Weighting Library Categories 289 Weighting Library...

Page 15: ...ord Deletions 308 Reload the Library 308 Chapter 4 Reporting screen 309 Report Configuration 310 Report Configuration window 310 Transfer Logs to the ER 310 Real Time Probe 311 Real Time Probe window...

Page 16: ...fresh 335 Refresh the Master IP Group Member 335 Master IP Group 336 Group window 337 Change the Group Administrator Password 337 Members window 338 Add the IP Address of the Member 339 Add the MAC Ad...

Page 17: ...ofiles 367 Download Profile 368 Add Sub Group 369 Add an IP Sub Group 369 Add Individual IP 370 Add an Individual IP Member 370 Delete Group 371 Delete a Master IP Group Profile 371 Paste Sub Group 37...

Page 18: ...Library Category 396 Add or Remove URLs or Wildcard URLs 397 Add a URL to the Library Category 397 Add a Wildcard URL to the Library Category 398 Remove a URL from the Library Category 399 Upload a M...

Page 19: ...porate Headquarters USA 413 8e6 Taiwan 413 Support Procedures 414 Product Warranties 415 Standard Warranty 415 Technical Support and Service 416 Extended Warranty optional 417 Extended Technical Suppo...

Page 20: ...sole 430 2 Exclude filtering server for block page IP 430 Part II Customize the Block Page 431 1 Set up a Web server 431 2 Create a customized block page 431 Show 8e6 s information in the block page o...

Page 21: ...bile Client Installed on a Mobile PC 457 Network Operations Overview 458 8e6 Mobile Client on the Network 458 8e6 Mobile Client 458 Enterprise Reporter 459 Mobile Server Section 460 Initial Setup 460...

Page 22: ...ed in 482 Save settings 482 Mobile Client Deployment to Windows Computers 483 Deployment to a group 483 Installation on a single computer 486 Mobile Client Removal from Computers 487 Uninstallation fr...

Page 23: ...tures of the R2000 series products the R3000 provides expanded library categories instant message and peer to peer blocking user authenti cation and a newly designed Graphical User Interface GUI Admin...

Page 24: ...e configura tions that will enable the R3000 to filter the entire network Group Administrator Section This section includes information for administrators authorized by the global administrator to man...

Page 25: ...er guide How to Use this User Guide Conventions The following icons are used throughout this user guide NOTE The note icon is followed by italicized text providing additional information about the cur...

Page 26: ...mand checkbox a small square in a dialog box window or screen used for indi cating whether or not you wish to select an option This object allows you to toggle between two choices By clicking in this...

Page 27: ...r purpose grid an area in a frame that displays rows and columns of data as a result of various processes This data can be reorganized in the Administrator GUI by changing the order of the columns lis...

Page 28: ...screen that contains a down arrow to the right When you click the arrow a menu of items displays from which you make a selection radio button a small circular object in a dialog box window or screen...

Page 29: ...ed If a sub topic is selected the window for that sub topic displays in the right panel of the screen or a pop up window or an alert box opens as appro priate text box an area in a dialog box window o...

Page 30: ...ollapsed By double clicking the item a minus sign replaces the plus sign and any entity within that branch of the tree displays An item in the tree is selected by clicking it window a window displays...

Page 31: ...3000 Authentication User Guide at http www 8e6 com docs r3000_auth2 pdf for information on setting up and using authentication synchronize multiple R3000 units so that all servers will be updated with...

Page 32: ...et Explorer IE 5 5 or later JavaScript enabled Java Virtual Machine Java Plug in use the version specified for the R3000 software version NOTE R3000 administrators must be set up with software instal...

Page 33: ...LOGIES R3000 ENTERPRISE FILTER USER GUIDE 11 Chapter 1 Filtering Operations Operational Modes Based on the setup of your network the R3000 can be configured to use one of these operational modes for f...

Page 34: ...t stopping each IP packet on the same Ethernet segment The unit will only intercept a session if an inappropriate request was submitted by a client In this scenario the R3000 returns a message to the...

Page 35: ...s request a block message 4 is sent to the user plus a terminate message 4 is sent to the Internet server An R3000 set up in the invisible mode can also work in the router mode Figure 1 1 2 illustrate...

Page 36: ...t a request is inappropriate a block page is returned to the client to replace the actual requested Web page or service Since only outgoing packets need to be routed and not return packets the R3000 o...

Page 37: ...ode With the R3000 set up in this mode the unit will filter all requests If the request is appropriate the original packet will pass unchanged If the request is inappropriate the original packet will...

Page 38: ...rver contains unfiltered bad cached pages since no request can pass until it is filtered Figure 1 1 5 illustrates an example of a firewall mode setup in which requests are always sent to the caching s...

Page 39: ...IP group to be maintained NOTES If authentication is enabled the global administrator can also access the NT and LDAP branches of the tree If multiple R3000 units are set up on the network and the sy...

Page 40: ...vidual IP members The global administrator adds master IP groups adds and maintains override accounts at the global level and estab lishes and maintains the minimum filtering level The group administr...

Page 41: ...he default filtering profile posi tioned at the base of the hierarchical tree structure used by end users who do not belong to a group IP group master group master group filtering profile used by end...

Page 42: ...maintained by the group administrator This filtering profile is used by members of the group including sub group and individual IP group members and is customized to allow deny users access to URLs o...

Page 43: ...ports that are configured to be blocked A URL can be specified for use instead of the standard block page when users attempt to access material set up to be blocked Various filter options can be enabl...

Page 44: ...the minimum filtering level rules specify which library categories should be blocked left open assigned a warn setting or white listed filter options specify which features will be enabled X Strikes...

Page 45: ...under the heading Category Groups excluding the Custom Categories group Updates to these categories are provided by 8e6 on an ongoing basis and administra tors also can add or delete individual URLs...

Page 46: ...Protocol HTTP Network News Transfer Protocol NNTP Secured HTTP Transmission HTTPS and Secure Shell SSH Rules A rule is comprised of library categories to block leave open assign a warn setting or inc...

Page 47: ...port is given a block setting users will be denied access to the URL set up as blocked open if a category or the filter segment detected on the network is given an open pass setting users will be allo...

Page 48: ...al profile b A master IP group time profile takes precedence over the master IP group profile 4 For IP sub group members a An IP sub group filtering profile takes precedence over the master IP group s...

Page 49: ...unt was set up in the global group tree NOTE An override account set up in the master group section of the console takes precedence over an override account set up in the global group section of the c...

Page 50: ...e R3000 is to log the activity of users on the Internet Information captured in the R3000 log files are transferred to the Enterprise Reporter ER where they are normalized and then inserted into a MyS...

Page 51: ...s can be set up to block the use of IM services specified in the library category When the IM module is loaded on the server the R3000 compares packets on the network with IM libraries stored on the R...

Page 52: ...00 checks the user s profile to see whether the user s connec tion to the P2P service should be blocked and then performs the appropriate action Setting up IM and P2P IM and P2P are set up in the Syst...

Page 53: ...gory will be blocked NOTE If IM and or P2P was set up to be blocked while a user s IM and or P2P session was in progress the user will not be blocked from using that service until he she logs off the...

Page 54: ...up to be blocked Block Specified Entities from Using IM P2P Block IM for a Specific Entity To block IM for a specified group or user the Instant Messaging option in the Filter window must be activated...

Page 55: ...option in the Filter window must be activated the PR2PR library category must be set up to be blocked for that entity the global filtering profile should not have P2P blocked unless blocking all P2P t...

Page 56: ...user s PC accesses on the network that user s Internet usage is appropriately filtered and blocked The act of configuring multiple R3000 servers to share the same user profile information is known as...

Page 57: ...figuration change is made on the source R3000 unit that change is sent to all target R3000 units that have been identified by the source unit via the Synchronization Setup window of the R3000 console...

Page 58: ...try identifies the location of each target unit on the network WARNING If an R3000 server is set up in the Source mode with a Network Address Translation NAT device between the source and target serve...

Page 59: ...pdate the change is applied locally Once locally applied on the source server this update is sent to all target R3000 units Each target server will then immediately apply this filtering change The res...

Page 60: ...n the source server this update will be placed in a queue for submission to target R3000 servers The source server will then send the information in the queue to all target servers Each target server...

Page 61: ...l memory When a change is made to the library a new library must be loaded into memory with the changes So the delay between the library change taking place is the net of the amount of time it takes t...

Page 62: ...is from the source R3000 For purpose of differentiation these items will be referred to as functionally synchronized for purposes of this user guide These func tionally synchronized items will be avai...

Page 63: ...additions deletions Keywords in URL additions deletions Functionally Synchronized Items Common Customization Block Page Authentication settings Authentication Form Customization Lock Page Customizati...

Page 64: ...GUIDE Non synchronized Items Filter control settings Virtual IP and Authentication IP addresses IP addresses Default routes Patch application Synchronization settings Filter Mode NIC Configuration Bac...

Page 65: ...library additions deletions Search Engine keyword additions deletions Keywords in URL additions deletions Functionally Synchronized Items Category Weight System additions deletions Non synchronized It...

Page 66: ...eletions changes filter changes profile activation deactivation Filter control settings Virtual IP and Authentication IP addresses IP addresses Default routes Patch application Synchronization setting...

Page 67: ...hat the source server will need to be replaced due to hardware failure In cases in which the source R3000 server is out of commis sion for an extended period of time this server should be replaced as...

Page 68: ...r s configuration to a safe storage place until it is needed 4 In the LAN Settings window accessible via System Network set up IP addresses to be the same as on the source server that is being replace...

Page 69: ...is whole again and should operate normally Set up a New Source Server from Scratch In the event that you do not have a reliable backup file that can be used for establishing a new source server you m...

Page 70: ...it can be accessed via an IP address on your network NOTE If you do not have the R3000IR Quick Start Guide contact 8e6 Technologies immediately to have a copy sent to you Using the Administrator Conso...

Page 71: ...This window displays minimized when the Login dialog box opens 4 When the Login dialog box opens enter your Username and Password Fig 1 4 2 Login dialog box TIP The default Username is admin and the...

Page 72: ...inistrator console Fig 1 4 3 Welcome screen On this screen the R3000 Version Number displays in the Product frame and dates for the Last Patch Update and Last Library Update display in the R3000 Enter...

Page 73: ...the dialog box and opens an alert box indicating that it will take a few minutes to perform the library update Click OK to close the alert box and to execute the command to update the libraries After...

Page 74: ...4 4 Welcome screen Last Library Update text Click the checkbox Do not show Old Library Warning dialog box in future to disable the Last Library Update message pop up box After the libraries are update...

Page 75: ...ilter or block specified Internet content for each user based on the applied filtering profile Group clicking this button displays the main screen for the Group section Windows in the Group section ar...

Page 76: ...GETTING STARTED 54 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Help clicking this button displays the Help screen This screen includes navigational tips and a link to the PDF copy of this Use...

Page 77: ...pics and tooltips Access Help Topics Each of the main section screens contains a link beneath the banner When that link is clicked a separate browser window opens with Help Topics for that section Fig...

Page 78: ...the icon additional information about that window can be obtained by hovering over that icon with your mouse or by pressing the F1 key on your keyboard Hover Display The yellow tooltip box displays w...

Page 79: ...on All screens are divided into two panels a navigation panel to the left and a window in the panel to the right Windows display in response to a selection made in the navigation panel In the Administ...

Page 80: ...ES R3000 ENTERPRISE FILTER USER GUIDE Topic Links In System Library and Reporting screens the navigation panel contains topic links By clicking a topic link the window for that topic displays in the r...

Page 81: ...Select Sub topics Some topics in System and Library screens consist of more than one window For these topics clicking a topic link opens a menu of sub topics Fig 1 4 10 Sub topics menu When a sub top...

Page 82: ...and Library screens Fig 1 4 11 Tree menu A tree is comprised of a hierarchical list of items An entity associated with a branch of the tree is preceded by a plus sign when that branch of the tree is...

Page 83: ...ics and sub topics Topics in the tree list display by default when the tree is opened Examples of tree list topics are circled in Fig 1 4 12 When a tree list topic is selected and clicked a menu of su...

Page 84: ...console there are windows with tabs When selecting a window with tabs from the navigation panel the main tab for that window displays Entries made in a tab must be saved on that tab if the tab include...

Page 85: ...s and shortcuts is provided to help you use windows in the Administrator console with greater efficiency Navigation Path The navigation path displays at the top of each window Fig 1 4 14 Navigation pa...

Page 86: ...m while pressing the Ctrl key on your keyboard Shift Key To select a block of items from a list box click the first item and then press the Shift key on your keyboard while clicking the last item Once...

Page 87: ...ed These windows include Block Page Route Table window from the System section and Range to Detect and Members windows from the Group section Fig 1 4 15 IP Calculator pop up window This window is used...

Page 88: ...lick Calculate to display different Min Host and Max Host results 2 After making a note of the information in this pop up window click Close to close the IP Calculator Log Off To log off the Administr...

Page 89: ...ent workstations To attain this objective the global administrator performs the following tasks provides a suitable environment for the server including high speed File Transfer Protocol FTP link to t...

Page 90: ...r based on an applied filtering profile Fig 2 1 1 System screen A list of main topics displays in the navigation panel at the left of the screen Main topics in this section include the following Contr...

Page 91: ...tomization windows cannot be edited and the following topics and any asso ciated sub topics are not available Block Page Authentication Authentication Radius Authentication Settings X Strikes Blocking...

Page 92: ...NOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Control Control includes options for controlling basic R3000 server functions Click the Control link to view a menu of sub topics Filter Block Page Authenti...

Page 93: ...tering is used for specifying whether this server being configured will filter traffic on the network Service Blocking is used for specifying whether this server being configured will log and block In...

Page 94: ...er being configured is set up in the Target mode to synchronize both profile and library setting changes TIP See the Introductory Section for overviews on the following topics IM and P2P Chapter 2 Log...

Page 95: ...ck the On radio button for the selected option s If Instant Messaging is enabled IM activity for all users will be logged after IM pattern files are downloaded TIP To block specified users from access...

Page 96: ...frame Select from the following settings for the HTTPS Filtering Level None if you do not want the R3000 to filter HTTPS sites Low if you want the R3000 to filter HTTPS sites without having the R3000...

Page 97: ...rn Blocking By default Proxy Pattern Blocking is disabled Click On to block the usage of clients such as Google Web Acceler ator and various proxy pattern types on end user worksta tions that bypass f...

Page 98: ...setting has All Target s Filtering On Disable Filtering on Target Servers To disable All Target s Filtering click the Off radio button Each target server on the network will not filter the Range to De...

Page 99: ...lays when Block Page Authentication is selected from the Control menu This feature is used for entering criteria the R3000 server will use when validating a user s account Information entered selected...

Page 100: ...Options field 1 In the Re authentication Options field of the Details frame all block page options are selected by default except for Web based Authentication Choose from the following options by cli...

Page 101: ...roups and Exception URL window for IP groups 2 If the Re authentication option was selected in the Logon Script Path field PDCSHARE scripts displays by default In this field enter the path of the logo...

Page 102: ...e By default the following data displays in the User Machine frame of the block page User Machine field The username displays for the NT LDAP user This field is blank for the IP group user IP field Th...

Page 103: ...ock page under the following conditions For further options click here This phrase and link is included if any option was selected at the Re authentica tion Options field Clicking this link takes the...

Page 104: ...link in the block page For further options click here Fig 2 1 6 Options page The following items previously described for the Block page display in the upper half of the Options page HELP link User Ma...

Page 105: ...e authentication Options Re authentication or Web based Authentication was selected If the user believes he she was incorrectly blocked from a specified site or service he she should re start his her...

Page 106: ...content blocked at the global or IP group level The user should enter his her Username and Password and then click Override to open the Profile Control pop up window Fig 2 1 8 Profile Control pop up...

Page 107: ...utDown window The ShutDown window displays when ShutDown is selected from the Control menu This window is used for powering off the server Fig 2 1 9 ShutDown window Shut Down the Server In the ShutDow...

Page 108: ...STEM SCREEN 86 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Reboot window The Reboot window displays when Reboot is selected from the Control menu This window is used for reconnecting the serve...

Page 109: ...eboot R3000 dialog box 2 Click Yes to close the dialog box and to launch the Server Status message box informing you that the server is now disconnected Fig 2 1 12 Server Status disconnect message Whe...

Page 110: ...box closes and the R3000 ready alert box opens Fig 2 1 14 R3000 ready alert box The Server connected alert box also opens informing you that the server is connected and that you must restart the serve...

Page 111: ...0 ENTERPRISE FILTER USER GUIDE 89 Network Network includes options for configuring the R3000 server on the network Click the Network link to view a menu of sub topics LAN Settings NTP Servers Regional...

Page 112: ...ECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu This window is used for configuring network conn...

Page 113: ...k interface card to be used on the network TIP Be sure to place the LAN1 and LAN2 IP addresses in different subnets In the Primary IP field of the DNS frame the default IP address is 4 2 2 1 Enter the...

Page 114: ...s used for specifying IP addresses of servers running Network Time Protocol NTP software NTP is a time synchronization system for computer clocks throughout the Internet The R3000 will use the actual...

Page 115: ...R3000 cannot access the primary time NTP server specified IP addresses are used in the order in which they display in the list box Add an NTP Server To add an NTP server 1 Enter the IP address in the...

Page 116: ...ISE FILTER USER GUIDE Regional Setting window The Regional Setting window displays when Regional Setting is selected from the Network menu This window is used for specifying the time zone to be used b...

Page 117: ...s 2 At the Location pull down menu select the time zone for the specified region If necessary select a language set from the Language pull down menu to specify that you wish to display that text in th...

Page 118: ...is used for building and maintaining a list of destina tion based routers the server will use for communicating with other segments of the network You need to set up a route table only if your local...

Page 119: ...s of the portal to which packets will be transferred to and from the Internet TIP Click Calculator to open the IP Calculator pop up window Use this calculator to calculate IP ranges without any overla...

Page 120: ...avigation panel This window is used for adding and maintaining global administrator accounts Fig 2 1 21 Administrator window TIP The default Username is admin and the Password is user3 8e6 recommends...

Page 121: ...field 3 Make the same entry again in the Confirm Password field 4 Click Add to include the username in the Current User list box Edit a Global Administrator Account To change a global administrator s...

Page 122: ...GUIDE Diagnostics Diagnostics includes options for setting up or running processes for maintaining the server Click the Diagnostics link to view a menu of sub topics System Command View Log File Trou...

Page 123: ...nd window The System Command window displays when System Command is selected from the Diagnostics menu This window is used for viewing server statistics and for performing diagnostic tests on the serv...

Page 124: ...ocesses ifconfig NIC configura tion netstat active connections netstat routing table free current memory usage iostat CPU usage sar system performance and recent logins NOTE See Command Selections for...

Page 125: ...able to help you diagnose the problem with your network configuration This diagnostic tool records each hop the data packet made identifying the IP addresses of gateway computers where the packet stop...

Page 126: ...uration NIC Configuration is used for verifying the server s network interface configuration at bootup When Execute is clicked information about the NIC mode and RX packets and TX packets displays in...

Page 127: ...gnostic tool shows information on resources being used When Execute is clicked the pop up window shows averages on various statistics These results can be stored in a compact binary format and then vi...

Page 128: ...TERPRISE FILTER USER GUIDE View Log File window The View Log File window displays when View Log File is selected from the Diagnostics menu This window is used for viewing the most recent log file resu...

Page 129: ...ror log used only if an Alternate IP Address is being used in the Block Page Route frame of the Operation Mode window This log only displays information if the IP address used for sending block pages...

Page 130: ...NISTRATOR SECTION CHAPTER 1 SYSTEM SCREEN 108 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Fig 2 1 26 View Log File Results window 4 Click the X in the upper right corner of the pop up window t...

Page 131: ...as normal Fig 2 1 27 Troubleshooting Mode window WARNING This tool utilizes system resources impacting the R3000 s performance When you click Enable the R3000 will stop filtering the network After yo...

Page 132: ...AN1 4 At the Promiscuous Mode field the default choice on or off displays based on the operation mode that was selected The promiscuous mode is a mode of operation in which each data packet that is se...

Page 133: ...ctive Profile Lookup window The Active Profile Lookup window displays when Active Profile Lookup is selected from the Diagnostics menu This window is used for verifying whether a user has an active pr...

Page 134: ...ss field enter the IP address or MAC address of the end user 2 Click Lookup to verify whether or not a user profile is active for that IP MAC address If the user s profile is active a pop up box opens...

Page 135: ...gainst the organization s policies The end user can view the URL after seeing a warning message and agreeing to its terms Block URLs in this category will be blocked NOTE If a category group does not...

Page 136: ...irect URL optional the URL that will be used for redirecting the user away from a page that is blocked if established Filter Options optional filter options to be used in the user s profile X Strikes...

Page 137: ...ays when Admin Audit Trail is selected from the Diagnostics menu This window is used for specifying FTP criteria so that a log of server changes made by an administrator will be sent to the FTP server...

Page 138: ...assive is selected by default indicating that transfers will be made via unre stricted outgoing network connections Click Active if transfers will be initiated by the server 4 Type in the Username to...

Page 139: ...the log click the View tab Fig 2 1 31 Admin Audit Trail window View tab Click View Log to display data on recent activity For each change made on the server the log will contain the date and time the...

Page 140: ...00 ENTERPRISE FILTER USER GUIDE Alert Alert includes options for setting up alert emails that notify designated individuals of problems on the network Click the Alert link to view a menu of sub topics...

Page 141: ...ts who will receive automated notifications if problems on the network are detected during the R3000 s self monitoring process Fig 2 1 33 Alert window The following processes are monitored by the R300...

Page 142: ...ent the hard drive from reaching 100 percent utilization Log File Transmission If the R3000 is unable to send log files as scheduled to the 8e6 Enterprise Reporter the log files are placed in a queue...

Page 143: ...ending alert email messages to designated administrators enter the email address of the R3000 in the From Email Address field 5 Click Apply to apply your settings Modify Alert Settings 1 Make any of t...

Page 144: ...ing settings for the Simple Mail Transfer Protocol that will be used for sending email alert messages to specified adminis trators Fig 2 1 34 SMTP Server Settings window Enter Edit SMTP Server Setting...

Page 145: ...into the SMTP server This action activates the fields below Make the following entries a Enter the Username b Enter the Password and make the same entry in the Confirm Password field 5 Click Apply to...

Page 146: ...STEM SCREEN 124 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Patch Patch includes options for uploading software updates Click the Patch link to view a menu of sub topics Patch and Patch Update...

Page 147: ...on panel This window is used for viewing informa tion about software updates previously applied to the server and for viewing information about software updates currently available Fig 2 1 37 Patch wi...

Page 148: ...notes about software updates can be obtained Read Information about a Software Update In either the Available Patches frame or the History of Patches frame the Date Name and Synopsis are included for...

Page 149: ...to the Available Patches frame and select the soft ware update to be applied NOTES Software updates must be applied to the server in sequential order Be sure port 8082 is open on your network 2 Click...

Page 150: ...oftware update has been successfully applied go to the View Log File window and select Patch Log patch log See View Log File window for more infor mation 5 Click OK to close the alert box and to proce...

Page 151: ...dow in this chapter for information on performing a backup Undo an Applied Software Update NOTE Only the most recently applied software update can be uninstalled WARNING If a software update is uninst...

Page 152: ...selected from the Patch menu This window is used for viewing the software update log that provides the status on the R3000 s software update activity including checks for new software updates and dow...

Page 153: ...on how to download the log file to your worksta tion if using Windows XP 2 Click OK to close the alert box Two pop up boxes open A second alert box asks you to confirm that the file was successfully...

Page 154: ...ur worksta tion After the file has completely downloaded the Download complete dialog box opens Fig 2 1 46 Download Complete box 4 You can now open this file open the folder where the file was saved o...

Page 155: ...ate log file has been downloaded to your workstation you can view its contents 1 Find the log file in the folder and right click on it to open the pop up menu Fig 2 1 47 Folder containing downloaded f...

Page 156: ...NOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 3 If using WinZip click I Agree to open the window containing the zip file Fig 2 1 49 WinZip window 4 Right click the zip file to open the pop up menu and c...

Page 157: ...correctly formatted in WinZip s View window if you wish to save or print the contents of this file 1 Click Clipboard Copy wait for the dialog box to open and confirm that the text has been copied to...

Page 158: ...ill be a stand alone box or whether it will send profile library setting changes to or receive such setting changes from another R3000 If the R3000 is set up to either send or receive profile library...

Page 159: ...is window is used for establishing the function of the R3000 especially if there is more than one R3000 on the network When there are multiple R3000 servers it is important to set up one as a source s...

Page 160: ...iltered and blocked NOTE With synchronization activated changes made to the library will be transmitted from the source server to the target server s but will not be automatically applied Changes are...

Page 161: ...eld by default All is selected This choice includes both profile and library setting changes Choose Library if only library category additions deletions including search engine keywords and URL keywor...

Page 162: ...the server being configured 6 Click Add Target IP to include this IP address and corresponding Location information if applicable in the list box The following optional steps can be performed Follow s...

Page 163: ...s from a previous date in time are restored to the source server and each target server needs to have these same library configurations as well Sync All should be clicked after entries are made in the...

Page 164: ...hanges from the source server only WARNING If an R3000 server is set up in the Target mode with a NAT device between the target and source server be sure that ports 26262 and 26268 are open on the tar...

Page 165: ...IP address must be used instead of the source server s own IP address 3 Click Test Source to open an alert box that provides the server mode status for the IP address you entered 4 Click OK to close...

Page 166: ...ilable only if this server currently being configured is either set up in the Source mode or Target mode If set up in the Source mode this window is used for veri fying that profile updates are being...

Page 167: ...curring and FAULT if the target server cannot be reached or if there is a problem with synchronization The Last Sync Date column displays the date and time synchro nization last occurred for the targe...

Page 168: ...e displays in the Sync Status column for a target server items still remain in the queue waiting to be synced To view items in the queue for a specified target server 1 In the Current Queue column for...

Page 169: ...ick Details to open the History of Target pop up window 2 Select the maximum Last Number of Lines from the pull down menu 100 200 300 400 500 for the most recent synchronization history that you wish...

Page 170: ...he Target mode the R3000 System Time displays above the Target Sync Status frame This is the current date and time from the R3000 server using the YYYY MM DD and HH MM SS format and includes the UTC c...

Page 171: ...whether or not there is a connection to the source server Last Successful Sync The date and time of the last successful synchronization displays History Log Click the Details button to open the Histo...

Page 172: ...8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Mode Mode includes options for configuring the R3000 to filter the network Click the Mode link to view a menu of sub topics Operation Mode and Proxy...

Page 173: ...ion Mode window The Operation Mode window displays when Operation Mode is selected from the Mode menu This window is used for specifying the operational mode in which the R3000 will filter the network...

Page 174: ...If using the router or firewall mode you may need to select the network card that will be used to listen to as opposed to send traffic on the network Specify the Block Page Device In the Block Page D...

Page 175: ...ll always be sent to the MAC address of a specified host usually the R3000 gateway Using this option choose from either of the two Block Page Route To selections Default Gateway this option indicates...

Page 176: ...e Account Exception URL NT LDAP Authentication and the Warn filter setting An end user with categories blocked in his her profile will be blocked from categories with a Warn setting instead of receivi...

Page 177: ...en Proxy Environment Settings is selected from the Mode menu This window is used for specifying whether the R3000 is in a proxy environment and if the default Web server port number 80 will be enabled...

Page 178: ...t 1 Click the On radio button This selection indicates that the R3000 will perform a reverse lookup on packets to detect the source address and origin of packets 2 Click Apply to apply your setting Us...

Page 179: ...to view a menu of sub topics Enable Disable Authentication Authentication Settings and Authentication SSL Certificate Fig 2 1 63 System screen Authentication menu NOTES Information about these sub to...

Page 180: ...from the navigation panel This window lets you specify the speed for the R3000 s Network Interface Card settings so that the R3000 can communicate with the network switch or hub Fig 2 1 64 NIC Mode w...

Page 181: ...a network interface s Media Independent Interface MII unit Ethtool is a diag nostic and tuning tool that examines and tunes the NIC Modify the NIC Mode Setting WARNING If changing the NIC mode be sure...

Page 182: ...tatus Up or Down displays to the right of the Interface status NIC Mode Speeds Chart Below is a chart of NIC speeds for various R3000 models Model LAN1 LAN2 Standard R3000 10 100 10 100 R3000M 10 100...

Page 183: ...ore is selected from the navigation panel This window is used for saving configuration settings and or custom library additions deletions on or off the server and for restoring these settings modifica...

Page 184: ...r When the character displays in place of the cursor you can expand the width of the column You also can use the scrollbar beneath the grid to view information to the right of the last column Backup P...

Page 185: ...p file 4 Type in a descriptive Comment about that file 5 Click OK to close the dialog box and to open the Wait alert box that informs you it may take some time to back up configurations based on the a...

Page 186: ...load to open the alert box containing a message on how to download the log file to your worksta tion if using Windows XP 3 Click OK to close the alert box In the File Download dialog box that opens cl...

Page 187: ...TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 165 After the file has completely downloaded the Download complete dialog box opens Fig 2 1 70 Download complete box You can now open this file open the...

Page 188: ...ded in the Backup Configurations grid you must upload it to the server WARNING Be sure the file you are restoring uses the same version of the software currently used by the R3000 Administrator consol...

Page 189: ...e uploaded CONFIG_ONLY LIBRARY_ONLY or both CONFIG_AND_LIBRARY 6 Click Upload File to upload this file to the server If the file is successfully uploaded the pop up window s banner name says Upload Su...

Page 190: ...w details on backup and or restoration activities 1 Click Log to open the Backup Restore Log pop up box Fig 2 1 73 Backup Restore pop up box The pop up box includes rows of data about backup and resto...

Page 191: ...R 1 SYSTEM SCREEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 169 Reset Reset window The Reset window displays when Reset is selected from the navigation panel This option is not available on...

Page 192: ...isplays when Radius Authentication Settings is selected from the naviga tion panel This window is used for controlling filtering levels of dial up users Fig 2 1 75 Radius Authentication Settings windo...

Page 193: ...use Radius click the On radio button This action displays the Radius Authentication Settings frame Specify Radius Authentication Settings 1 In the Radius Server field 1 2 3 9 displays by default Ente...

Page 194: ...n causes the Use R3000 IP as Source IP field to display greyed out 5 In the Reply Mode field specify whether the server that sent a request should receive a response To enable the Reply Mode option Cl...

Page 195: ...NISTRATOR SECTION CHAPTER 1 SYSTEM SCREEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 173 Disable Radius To disable the Radius feature 1 At the Radius Mode field click the Off radio button 2 C...

Page 196: ...ion panel This feature lets the global adminis trator use a third party Simple Network Management Protocol SNMP product for monitoring and managing the working status of the R3000 s filtering on a net...

Page 197: ...as the Community token for public access This is the password that the manage ment R3000 console would use when requesting access Create Build the Access Control List 1 In the Enter new IP to add fie...

Page 198: ...SE FILTER USER GUIDE Hardware Failure Detection Hardware Failure Detection window The Hardware Failure Detection window displays when Hardware Failure Detection is selected from the navigation panel T...

Page 199: ...g is selected from the navigation panel This feature lets a global administrator set criteria for blocking a user s access to unacceptable Internet sites and locking a user s workstation after the use...

Page 200: ...ck On 2 Enter the Maximum Strikes Before Locking the Workstation This is the number of attempts a user can make to access an unacceptable site before that user is prevented from using the Internet The...

Page 201: ...the standard lock out block page will display To specify a different page click Custom URL and enter the URL in the text box 7 Click Save to save your configuration settings Reset All Workstations The...

Page 202: ...ded for a total of X amount of time in which X represents the number of minutes hours the user will be locked out from Internet usage on that workstation NOTE This message may differ depending on whet...

Page 203: ...ify the configuration settings Sample Settings Maximum strikes 5 Time span for the maximum number of strikes 5 minutes Within a five minute period if a user accesses five sites that contain blocked ma...

Page 204: ...IDE If these configuration settings do not block users often enough the time span for the maximum number of strikes may need to be reduced the maximum number of strikes may need to be reduced Email Al...

Page 205: ...number of minutes within the 24 hour period that should elapse between email alerts For example by entering 300 in this field and 30 in the previous field if there are any email alerts they will be s...

Page 206: ...email alerts 2 Click Add to include the email address in the Current Email Alerts list box NOTE The maximum number of email alert recipients is 50 If more than 50 recipients need to be included 8e6 re...

Page 207: ...to display Logon Accounts Fig 2 1 82 X Strikes Blocking window Logon Accounts tab Set up Users Authorized to Unlock Workstations 1 Enter the User ID of a staff member who is authorized to unlock work...

Page 208: ...ed user s account 1 Select the User ID from the Current Accessible Users list box 2 Click Disable to move the User ID to the Current Un Accessible Users list box Delete a Logon Account To delete a use...

Page 209: ...kes Blocking window Categories tab Set up Categories to Receive Strikes or No Strikes 1 Select library categories from the No Strike Categories list box 2 Click the right arrow to move the selected li...

Page 210: ...r Option enabled Go to X Strikes Unlock Workstation GUI When the global administrator clicks Go to X Strikes Unlock Workstation GUI either the Re login window or the X Strikes Unlock Workstation pop u...

Page 211: ...and Expire Date Time of currently locked workstations Fig 2 1 85 X Strikes Unlock Workstation window NOTE An authorized staff member can click a link in an email alert or type in http x x x x 88 XStr...

Page 212: ...ter the email address in the Email Address to be Subscribed Unsubscribed text box 2 Click Subscribe Remove an Email Address from the Alert List To remove an administrator s email address from the noti...

Page 213: ...administrator specify the number of minutes for the interval of time in which a warning page will redisplay for the end user who accesses a URL in a library category with a Warn setting for his her pr...

Page 214: ...d is set up in the Target mode to synchronize both profile and library setting changes See the Warn Page Customization window in this chapter for information on customizing text in the warning page th...

Page 215: ...riggers the associated pop up window to open Click the Customization link to view a menu of sub topics Common Customization Authentication Form Lock Page Block Page Warn Page and Profile Control NOTE...

Page 216: ...splays when Common Customization is selected from the Customization menu This window is used for specifying elements to be included in block and or lock pages and or the authentica tion request form t...

Page 217: ...y in block pages Blocked URL Display if enabled displays Blocked URL followed by the blocked URL in block pages Copyright Display if enabled displays 8e6 R3000 copyright information at the footer of b...

Page 218: ...ectly blocked The associated email address specified in the Submission Email Address field described below is accessible to the end user by clicking the click here link NOTE If enabling the Submission...

Page 219: ...ou customize text in the lock page end users will see when attempting to access Internet content blocked for their profiles and their workstations are currently locked Entries saved in this window dis...

Page 220: ...ny entries made in these fields will display centered in the customized lock page using the Arial font type 2 At the Explanation Display field by default On is selected This setting displays the reaso...

Page 221: ...lays By default the following standard links are included in the lock page HELP Clicking this link takes the user to 8e6 s Tech nical Support page that explains why access to the site or service may h...

Page 222: ...if you want to display customized text and include a customized link in the block page end users will see when attempting to access Internet content blocked for their profiles Entries saved in this wi...

Page 223: ...cription field enter a static text message to be displayed beneath the block page header In the Link Text field enter text for the link s URL and in the Link URL field enter the corresponding hyper li...

Page 224: ...ser s IP address displays Category field The name of the library category that blocked the user s access to the URL displays If the content the user attempted to access is blocked by an Exception URL...

Page 225: ...b section for information on options that display in the Options window To submit this blocked site for review click here This phrase and link is included if an email address was entered in the Submis...

Page 226: ...lets you customize text in the pop up window end users will see if attempting to access a URL in a library category set up with a Warn setting for his her profile Entries saved in this window display...

Page 227: ...beneath the warning page header In the Link Text field enter text for the link s URL and in the Link URL field enter the corresponding hyper link in plain text using the http or https syntax Any entri...

Page 228: ...AP user This field is blank for the IP group user IP field The user s IP address displays Category field The name of the library category that warned the user about accessing the URL displays Blocked...

Page 229: ...for the first time the user saw the warning window and clicked Continue and Warned for each subsequent time the warning window opened for the user and he she clicked Continue Cancel Clicking this butt...

Page 230: ...pop up window end users with override accounts will see when logging into their override accounts Such accounts give authorized users access to Internet content blocked for other end users Entries sav...

Page 231: ...In the Header field enter a static header to be displayed at the top of the profile control pop up window In the Warning Text field enter a static text message to be displayed at the bottom of the pop...

Page 232: ...ofiles for IP NT LDAP groups and their members Fig 2 2 1 Group screen For the IP group branch the global administrator creates master IP groups For each master IP group the designated group administra...

Page 233: ...lection to display the list of groups domains previously added to that branch Keep double clicking items in the tree list to view additional items Click an entity in the tree list to view a menu of to...

Page 234: ...to view a menu of sub topics Range to Detect Rules Global Group Profile Over ride Account Upload Download Global Profile Minimum Filtering Level and Refresh All Fig 2 2 2 Group screen Global Group men...

Page 235: ...lobal Group menu This window is used for defining segments of network traffic to be detected by the R3000 in the invisible or router mode Service ports that should be open ignored by the R3000 are als...

Page 236: ...rk or modify or remove existing segments The Current Ranges list box includes a list of segments previ ously added using this feature The Mandatory Settings box provides examples of settings that can...

Page 237: ...king this button takes you to the Range to Detect Setup Wizard Follow the instructions in the Range to Detect Setup Wizard sub section to complete the addition of the segment on the network Advanced S...

Page 238: ...t Setup Wizard The Wizard is comprised of six steps An entry is required in Step 1 but not in Steps 2 5 Settings made using the Wizard are saved in Step 6 Step 1 In this step you define the source IP...

Page 239: ...l IP use this field to enter a single IP address 2 Click Add to include the segment in the list box above NOTE To modify the segment select it from the list box and click Modify to move the segment to...

Page 240: ...ddress es to be filtered NOTE By making entries in Destination IP fields traffic will be restricted to the range specified in the Source IP and Destination IP frames This reduces the load on the R3000...

Page 241: ...CHAPTER 2 GROUP SCREEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 219 Step 3 Optional In this step you define the source IP address es to be excluded from filtering Fig 2 2 7 Range to Detect...

Page 242: ...be excluded from filtering Any entries from the list box in Step 1 automatically display in the list box above NOTE By making entries in Destination IP fields traffic will be restricted to the range...

Page 243: ...port numbers to be excluded from filtering Fig 2 2 9 Range to Detect Setup Wizard window Step 5 1 In the Individual Port field enter the port number to be excluded from filtering 2 Click Add to includ...

Page 244: ...ries and make modifications if necessary Fig 2 2 10 Range to Detect Setup Wizard window Step 6 1 Review the contents in all list boxes 2 Perform one of the following actions click the Modify button to...

Page 245: ...main Range to Detect Settings window where the segment you entered now displays in the Current Ranges list box Range to Detect Advanced Settings Click the Advanced Settings button to display the Range...

Page 246: ...ge to Detect Settings window see Fig 2 2 3 select the segment from the Current Ranges list box 2 Click Modify to go to the second page see Fig 2 2 4 3 Click one of the following buttons to select the...

Page 247: ...ing a filtering profile for an entity Fig 2 2 12 Rules window By default Rule1 BYPASS displays in the Current Rules pull down menu The other three choices in this pull down menu are Rule2 BLOCK Porn R...

Page 248: ...green circle in the Pass column TIP In the Category Groups tree double click the group enve lope to open that segment of the tree and to view library catego ries belonging to that group To change the...

Page 249: ...ltiple categories can be assigned the same filter setting by clicking each category while pressing the Ctrl key on your keyboard and then double clicking in the appropriate column Blocks of categories...

Page 250: ...he Global Group menu This window is used for viewing creating the global default filtering profile that will be used by all users on the network unless a unique filtering profile is created for an ent...

Page 251: ...rnog raphy and Pornography Adult Content indicating that the end user can access URLs in all other library categories This filter setting is designated by the check mark inside a green circle in the P...

Page 252: ...block setting and other library categories have a warn setting there would be no category group filter setting since all library categories do not have the same filter setting TIPS Multiple categorie...

Page 253: ...CREEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 231 Port Port displays when the Port tab is clicked This tab is used for blocking access to specified ports for the global filtering profile F...

Page 254: ...block a service port from being accessed by global filtering profile users 1 Enter the port number in the Port field 2 Click Add Each port number you add displays in the Block Port s list box 3 Click...

Page 255: ...URL tab is clicked This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked for the global filtering profile Fig 2 2 15 Glo...

Page 256: ...text box Users will be redirected to the designated page at this URL instead of the block page 2 Click Apply to apply your settings Filter Options Filter Options displays when the Filter Options tab...

Page 257: ...ol URL Keyword Filter Control If URL Keyword Filter Control is selected the Extend URL Keyword Filter Control option can be selected 2 Click Apply to apply your settings X Strikes Blocking With the X...

Page 258: ...nvi ronment as it will cause overblocking An inappropriate image will only be blocked if that image is included in 8e6 s library or is blocked by Google and Yahoo If this option is used in conjunction...

Page 259: ...tom library categories NOTES Search engine keyword filtering relies on an exact keyword match For example if the word sex is set up to be blocked but sexes is not set up to be blocked a search will be...

Page 260: ...ded after the character in a URL NOTE To set up URL keywords in a URL Keywords window see the following sections of this user guide for the specified library type 8e6 Supplied Categories see Chapter 3...

Page 261: ...ays when Override Account is selected from the Global Group menu This window is used for creating an override account that allows an NT LDAP or IP group user to bypass settings at the minimum filterin...

Page 262: ...s installed on his her workstation Add an Override Account To create an Override Account profile 1 In the Account Details frame enter the username in the Name field 2 Enter the Password 3 Make the sam...

Page 263: ...ate the category profile 1 Select a filtering rule from the available choices in the Available Filter Levels pull down menu This action automatically populates the Pass Allow Warn and or Block columns...

Page 264: ...oup library category to move the check mark to that column Pass URLs in this category will pass to the end user Allow URLs in this category will be added to the end user s white list Warn URLs in this...

Page 265: ...lick Close to close the pop up window and to return to the Override Account window Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he she attempts t...

Page 266: ...tead of the block page 2 Click Apply to apply your settings to the override account profile 3 Click the Filter Options tab to continue creating the over ride account profile or click Close to close th...

Page 267: ...e enforced if the user performs a Google or Yahoo Web search or Image search WARNING If this option is used in conjunction with the X Strikes Blocking feature and the user is performing an inappropria...

Page 268: ...of a browser window if that keyword has been set up to be blocked the user will be denied access to that site or service URL keywords are entered in the URL Keywords window of 8e6 supplied library ca...

Page 269: ...new Password 4 Make the same entry again in the Confirm Password field 5 Click View Modify to open the pop up window 6 Click Apply 7 Click Close to close the pop up window Modify an Override Account...

Page 270: ...ION CHAPTER 2 GROUP SCREEN 248 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Delete an Override Account To delete an override account 1 In the Current Accounts frame select the username from the...

Page 271: ...wnload IP Profile window The Upload Download IP Profile window displays when Upload Download Global Profile is selected from the Global Group menu This window is used for uploading or down loading a t...

Page 272: ...ext file of user group profiles must be entered in a specific format NOTE For examples of entries to include in a profile file go to http www 8e6 com r3000help files 2group_ipprofiles html Once the fi...

Page 273: ...wnload Profile If profiles have been created and or uploaded to the server 1 Click Download File to open a browser window containing the profiles Fig 2 2 23 Download IP Profiles window The contents of...

Page 274: ...orts These settings can be bypassed if a user has an over ride account NOTE See the Override Account window in this chapter and in Chapter 1 of the Group Administrator Section for more informa tion ab...

Page 275: ...ld Pornography and Pornography Adult Content are assigned a Block filter setting and all other active library categories are set to Pass Filter settings are designated by the check mark inside a green...

Page 276: ...s in this category will pass to the end user Block URLs in this category will be blocked TIPS Multiple categories can be assigned the same filter setting by clicking each category while pressing the C...

Page 277: ...ing access to specified ports at the minimum filtering level Fig 2 2 25 Minimum Filtering Level window Port tab Create Edit a List of Service Ports All service ports are filtered by default To block a...

Page 278: ...HNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 3 Click Apply to apply your settings at the minimum filtering level To remove a port number from the list box 1 Select the port number 2 Click Remove 3 Cli...

Page 279: ...tab is used for specifying whether users in a master IP group will be allowed to bypass the minimum filtering level with an override account or an exception URL Fig 2 2 26 Minimum Filtering Level wind...

Page 280: ...be able to access content blocked at the minimum filtering level 2 Click Save to apply your settings To allow users to bypass exception URLs set up to be blocked at the minimum filtering level 1 In t...

Page 281: ...l Group menu click Refresh All to refresh the main branches of the tree This action should be performed whenever authentication has been enabled or disabled If authentication is enabled when Refresh A...

Page 282: ...SCREEN 260 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE IP IP includes options for adding a master IP group and to refresh the tree list Click the IP link to view a menu of sub topics Add Group...

Page 283: ...contain spaces The first character cannot be a digit The following characters cannot be used in the name period comma colon semi colon exclamation point question mark ampersand asterisk quotation mar...

Page 284: ...USER GUIDE NOTE Information on defining the group and its members and establishing their filtering profiles can be found in the Group Administrator Section of this user guide Refresh Refresh IP Groups...

Page 285: ...ating or modifying filtering profiles Fig 2 3 1 Library screen A list of main topics displays in the navigation panel at the left of the screen Updates Library Lookup Customer Feed back Module Categor...

Page 286: ...Categories to view 8e6 supplied library categories for that group Click a library category topic to view a menu of sub topics for that library category item Library Details URLs URL Keywords and Searc...

Page 287: ...SER GUIDE 265 Updates Updates includes options for making configurations for library category activities Click the Updates link to view a menu of sub topics Configuration Manual Update Addi tional Lan...

Page 288: ...s window is used for making settings to allow the R3000 to receive 8e6 supplied library category updates on a daily basis Fig 2 3 3 Configuration window Select the Transfer Protocol 1 Choose either th...

Page 289: ...server environment This selection activates the fields in this frame 2 By default proxy company com displays as the host name of the Proxy Server Enter the host name for the proxy server in this fiel...

Page 290: ...Manual Update is selected from the Updates menu This window is used for updating specified 8e6 supplied library categories on demand from the update server if the R3000 has not received daily updates...

Page 291: ...to replace the core library files Patch Update Select this option to download new software updates for the R3000 if available Any soft ware updates that are downloaded can be found in the System secti...

Page 292: ...ted from the Updates menu This window is used for including additional 8e6 supported languages in library downloads Fig 2 3 5 Additional Language Support window Select Additional Languages 1 Make a se...

Page 293: ...efault None selection To make an optional selection for a primary language choose the language from the Optional Select Primary Language pull down menu TIP To move a language selection back to the Uns...

Page 294: ...IDE Library Update Log window The Library Update Log window displays when Library Update Log is selected from the Updates menu This window is used for viewing transfer activity of library updates from...

Page 295: ...og Messages for information about messages that display in the log file Download Log View Print Contents Download the Log 1 Click Download Log to open the alert box containing a message on how to down...

Page 296: ...oading the zip file to your worksta tion After the file has completely downloaded the Download complete dialog box opens Fig 2 3 9 Download Complete box 4 You can now open this file open the folder wh...

Page 297: ...file has been downloaded to your workstation you can view its contents 1 Find the log file in the folder and right click on it to open the pop up menu Fig 2 3 10 Folder containing downloaded file 2 C...

Page 298: ...inZip click I Agree to open the window containing the zip file Fig 2 3 12 WinZip window 4 Right click the zip file to open the pop up menu and choose View to open the View dialog box Fig 2 2 13 View d...

Page 299: ...isplaying correctly formatted in WinZip s View window if you wish to save or print the contents of this file 1 Click Clipboard Copy wait for the dialog box to open and confirm that the text has been c...

Page 300: ...HAPTER 3 LIBRARY SCREEN 278 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 3 Paste the contents from the clipboard into the Notepad file Fig 2 3 15 Notepad The correctly formatted Notepad file ca...

Page 301: ...ncy Update Log window The Emergency Update Log window displays when Emer gency Update Log is selected from the Updates menu This window is used for viewing transfer activity of emergency software upda...

Page 302: ...o close the alert box Two pop up boxes open A second alert box asks you to confirm that the file was successfully saved to your machine Click OK in this box after the download is completed In the File...

Page 303: ...ibrary Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel This window is used for verifying whether a URL or search engine keywor...

Page 304: ...in http 209 247 228 221 octal format e g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 decimal value format e g http 118001...

Page 305: ...ric characters 2 Click Lookup to display results in the Result Category list box showing the long name of all categories that contain the search engine keyword phrase Remove a Search Engine Keyword To...

Page 306: ...er Feedback Module is selected from the navigation panel This window is used for enabling the Customer Feed back Module feature in which the most frequently visited non categorized URLs in your R3000...

Page 307: ...applies when this feature is enabled Disable Customer Feedback Module 1 At the Customer Feedback Module Auto Learning Feature field click Off to indicate that you wish to disable the Customer Feedback...

Page 308: ...t is possible that some personal information may be contained in the URLs collected by the Customer Feed back Module and sent to 8e6 Technologies At no time will any personal information collected be...

Page 309: ...o activate the Customer Feedback Module will be transmitted back to 8e6 Technologies once you click the Accept button 4 After reading this text if you agree with the terms click in the checkbox to act...

Page 310: ...Category Weight System window displays when Cate gory Weight System is selected from the navigation panel This feature lets you choose which category will be logged and reported for a URL request that...

Page 311: ...ts in multiple categories the highest operational prece dence would be logged If a URL exists in a category that is Always Allowed as well as a category set to be Blocked for that user Always Allowed...

Page 312: ...to the No Weight Categories list box Once the Weight Categories list box is populated with categories you wish to include select a category and use the arrow keys to weight it against other categorie...

Page 313: ...00 ENTERPRISE FILTER USER GUIDE 291 NNTP Newsgroup NNTP Newsgroup window The NNTP Newsgroup window displays when NNTP News group is selected from the navigation panel This window is used for adding or...

Page 314: ...lert box will open to inform you that it exists Remove a Newsgroup from the Library To remove a newsgroup from the library 1 In the Newsgroup frame enter the Newsgroup address 2 Click Remove After all...

Page 315: ...mprised of 8e6 supplied library categories 8e6 supplied library categories are updated regularly with new URLs via Traveler 8e6 s executable program that supplies updates to the R3000 Category Groups...

Page 316: ...n be saved is 250 This figure includes both 8e6 supplied catego ries and custom categories Double click Category Groups to open the tree and to display category groups Double click a category group s...

Page 317: ...etails window The Library Details window displays when Library Details is selected from the library category s menu of sub topics This window is a view only window Fig 2 3 24 Library Details window Vi...

Page 318: ...removing a URL from a library category A URL can contain a domain name such as playboy in http www playboy com or an IP address such as 209 247 228 221 in http 209 247 228 221 A wildcard asterisk sym...

Page 319: ...Library Category To view a list of all URLs that either have been added or deleted 1 Click the View tab 2 Make a selection from the pull down menu for Addition List Deletion List Wildcard Addition Lis...

Page 320: ...IP address e g 209 247 228 221 in http 209 247 228 221 octal format e g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 deci...

Page 321: ...hat you wish to add to the category 4 Click Apply Action NOTE Wildcard URL query results include all URLs containing text following the period after the wildcard symbol For example an entry of beer co...

Page 322: ...ard URL List frame as pertinent 3 Click Remove to display the associated URLs in the list box below 4 Select the URL s that you wish to remove from the cate gory 5 Click Apply Action Reload the Librar...

Page 323: ...L keywords from a library category A library category uses URL keywords to block a user s access to Internet addresses containing keywords included in its list Fig 2 3 27 URL Keywords window NOTE If t...

Page 324: ...such as http www essex com View a List of URL Keywords To view a list of all URL keywords that either have been added or deleted 1 In the View Keyword Addition Deletion List frame make a selection fr...

Page 325: ...le on the server by clicking the Append or Overwrite radio button Upload a List of URL Keyword Additions To upload a text file with URL keyword additions 1 Click Upload To Addition File to open the Up...

Page 326: ...eyword pop up window see Fig 2 3 28 2 Click Browse to open the Choose file window 3 Select the file to be uploaded 4 Click Upload File to upload this file to the server Reload the Library After all ch...

Page 327: ...dow is used for adding and removing search engine keywords phrases to and from a library category A library category uses search engine keywords to block searches on subjects containing keywords inclu...

Page 328: ...blocked categories For example if all searches on gin are set up to be blocked users will not be able to run a search on a subject such as cotton gin However if the word sex is set up to be blocked a...

Page 329: ...Add Del Keyword frame specify whether the contents of this file will add to the current file or overwrite the current file on the server by clicking the Append or Overwrite radio button Upload a List...

Page 330: ...ad Library Keyword pop up window see Fig 2 3 28 2 Click Browse to open the Choose file window Select the file to be uploaded 3 Click Upload File to upload this file to the server Reload the Library Af...

Page 331: ...el at the left of the screen click Report Configuration to perform an on demand log transfer to the Enterprise Reporter ER Real Time Probe to display windows for configuring and maintaining real time...

Page 332: ...be found in the Enterprise Reporter User Guide Report Configuration Report Configuration window The Report Configuration window displays when Report Configuration is selected from the navigation pane...

Page 333: ...e Probe Real Time Probe window The Real Time Probe window displays when Real Time Probe is selected from the navigation panel This feature lets the probe administrator monitor a user s Internet usage...

Page 334: ...probes 2 Enter the Maximum Probes that can be Scheduled equal to or less than the maximum probes that can run at the same time The default setting is 5 probes 3 Enter the Maximum Run Time in Minutes...

Page 335: ...REPORTING SCREEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 313 Remove IPs from the White List 1 Select the IP address es from the Current White list of IPs list box 2 Click Delete to remove...

Page 336: ...play Email Report Fig 2 4 4 Real Time Probe window Report Recipients tab Specify Email File Criteria 1 Click the radio button corresponding the to the Email Format to be used for the file Plain Text o...

Page 337: ...ick Add to include the email address in the Current List of Completed Reports to be Emailed list box NOTE The maximum number of report recipients is 50 If more than 50 recipients need to be included 8...

Page 338: ...s tab to display Logon Accounts Fig 2 4 5 Real Time Probe window Logon Accounts tab Set up Users Authorized to Create Probes 1 Enter the User ID of a staff member who is authorized to create real time...

Page 339: ...ed user s account 1 Select the User ID from the Current Accessible Users list box 2 Click Disable to move the User ID to the Current Un Accessible Users list box Delete a Logon Account To delete a use...

Page 340: ...dministrator clicks Go to Real Time Probe Reports GUI either the Re login window or the Real Time Probe Reports pop up window opens Re login window The Re login window opens if the user s session need...

Page 341: ...11 showing the global administrator information on all active probes NOTE An authorized staff member can click a link in an email alert or type in http x x x x 88 RtProbe jsp in the address field of...

Page 342: ...er the characters to be included in the User Name s to be probed The entry in this field is case sensitive This selection generates a report with data for all usernames containing the consecutive char...

Page 343: ...characters will be accepted for the IP Address User Name or URL 4 If you wish to send the completed report to a specified email address enter the Email Address to Mail the Completed Report 5 Specify t...

Page 344: ...RISE FILTER USER GUIDE View Real Time Probe Details Click the View tab to view details about active probes Fig 2 4 8 Real Time Probe Reports View tab The Display Name shows the name assigned to the pr...

Page 345: ...n Progress clicking View opens the Real Time Information box Fig 2 4 9 Real Time Information box This box displays the number of minutes left for the probe to run Run Time Left and user details for ea...

Page 346: ...button is avail able instead of the Stop button Clicking Email opens the Email option dialog box in which you specify an email address to send the completed report see Email option Click Close to clo...

Page 347: ...Infor mation box via the Stop button Clicking Delete opens the following dialog box asking if you want to delete the probe Fig 2 4 11 Probe Properties deletion box Click Yes to delete the probe and re...

Page 348: ...om the navigation panel This window is used for viewing and analyzing system usage data for a specified time period within the past 14 days The following data can be analyzed for the given time period...

Page 349: ...choices select either Recent Trend or one of the Daily Peaks dates 2 Click View to open a separate browser window containing the specified graph Recent Trend The Recent Trend graph includes the follow...

Page 350: ...3000 ENTERPRISE FILTER USER GUIDE Daily Peaks The Daily Peaks graph includes the following information date and Number of Hits per Second at Peak Time for a given Time using the HH MM format Fig 2 4 1...

Page 351: ...mat Shadow Log Format window The Shadow Log Format window displays when Shadow Log Format is selected from the navigation panel If the R3000 s reporting device is the 8e6 Enterprise Reporter ER this w...

Page 352: ...nd higher is compatible with R3000 software version 2 0 and higher and the ER table structure in software release 3 75 and higher up until 4 1 is compatible with R3000 software version 1 9 and higher...

Page 353: ...og structure Post 1 9 log format option If this R3000 currently has the 1 9 or higher software update applied the Post 1 9 log option should be selected since the ER 3 75 or higher software update use...

Page 354: ...and group members Chapter 2 includes information on creating and maintaining Custom Categories for libraries The group administrator performs the following tasks defines members of a master IP group a...

Page 355: ...bers and define and maintain members filtering profiles A member is associated with an IP or MAC address and may contain a netmask within a valid IP address range Fig 3 1 1 Group screen The navigation...

Page 356: ...the IP branch of the tree to open it and to display the master IP group Double click the master IP group to open it and to display any IP sub groups and or individual IP members previously set up in t...

Page 357: ...OUP SCREEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 335 IP Refresh Refresh the Master IP Group Member Click Refresh whenever a change has been made to the master IP group or member level of...

Page 358: ...s setting up an override account and or exception URLs to bypass global settings and uploading or downloading IP profiles Click the master IP group s link to view a menu of sub topics Group Details Me...

Page 359: ...ails is selected from the menu This window is used for viewing the Group Name and for changing the password of the group adminis trator Fig 3 1 4 Group window Change the Group Administrator Password I...

Page 360: ...ow displays when Members is selected from the menu This window is used for adding and managing members of a master IP group For the invisible and router modes a member is comprised of an associated IP...

Page 361: ...f the IP address range 2 Click Add to include the IP address entry in the Current Members list box TIP Click Calculator to open the IP Calculator and calculate IP ranges without any overlaps Enter the...

Page 362: ...elected from the menu This window is used for creating an override account that allows an end user from a master IP group to bypass settings at the minimum filtering level A user with an override acco...

Page 363: ...r with an override account can authenticate if a pop up blocker is installed on his her workstation Add an Override Account To create an Override Account profile 1 In the Account Details frame enter t...

Page 364: ...te the category profile 1 Select a filtering rule from the available choices in the Available Filter Levels pull down menu This action automatically populates the Pass Allow Warn and or Block columns...

Page 365: ...oup library category to move the check mark to that column Pass URLs in this category will pass to the end user Allow URLs in this category will be added to the end user s white list Warn URLs in this...

Page 366: ...Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he she attempts to access a site or service set up to be blocked Fig 3 1 8 Override Account pop up w...

Page 367: ...ck the checkbox es corresponding to the option s to be applied to the override account filtering profile X Strikes Blocking With the X Strikes Blocking option enabled if the user attempts to access in...

Page 368: ...arch Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled search engine keywords can be set up to be blocked When the user enters a keyword in the search engine i...

Page 369: ...t an Override Account Change the Password To change an override account s password 1 In the Current Accounts frame select the username from the list box 2 In the Account Details frame enter the userna...

Page 370: ...ername from the list box 2 Click View Modify to open the pop up window 3 Click the tab in which to make modifications Rule Redi rect Filter Options 4 Make your edits in this tab and in any other tab i...

Page 371: ...iltering profile Click the following tabs in this window Category Redirect URL and Filter Options Entries in these tabs comprise the profile string for the group Category Profile Category Profile disp...

Page 372: ...tion automatically populates the Pass Allow Warn and or Block columns in the Rule Details frame with filter settings for each category group library category in the Category Groups tree TIP In the Cat...

Page 373: ...gory will be blocked TIPS Multiple categories can be assigned the same filter setting by clicking each category while pressing the Ctrl key on your keyboard and then double clicking in the appropriate...

Page 374: ...t URL tab is clicked This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked at the group level Fig 3 1 11 Group Profile w...

Page 375: ...onding text box Users will be redirected to the designated page at this URL instead of the block page 2 Click Apply to apply your settings Filter Options Filter Options displays when the Filter Option...

Page 376: ...on setting up the X Strikes Blocking feature Google Yahoo Safe Search Enforcement With the Google Yahoo Safe Search Enforcement option enabled Google and Yahoo s strict SafeSearch Filtering option wi...

Page 377: ...sex However if the word gin is set up to be blocked a search on cotton gin will be blocked since the word gin is blocked To set up search engine keywords in a Search Engine Keywords window for Custom...

Page 378: ...locked users will be denied access to URLs that are not even within blocked catego ries For example if all URL keywords containing sex are blocked users will not be able to access a non pornographic s...

Page 379: ...verride account to allow a user to bypass group settings and minimum filtering level settings if allowed Block URL frame To block the group s access to a URL 1 In the Block URL field enter the URL 2 C...

Page 380: ...R3000 ENTERPRISE FILTER USER GUIDE Time Profile window The Time Profile window displays when Time Profile is selected from the group menu This window is used for setting up or modifying a filtering pr...

Page 381: ...d to open the pop up window containing the Current Time Profiles time range as well as tabs to be used for specifying the components of the time profile 3 Click each of the tabs Rule Redirect Filter O...

Page 382: ...egory Profile The Rule tab is used for creating the categories portion of the time profile Fig 3 1 15 Time Profile pop up window Rule tab NOTE See the Override Account window Category Profile sub sect...

Page 383: ...d for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked Fig 3 1 16 Time Profile pop up window Redirect URL tab NOTE See the Override Acco...

Page 384: ...ilter Options tab is used for specifying which filter option s will be applied to the time profile Fig 3 1 17 Time Profile pop up window Filter Options tab NOTE See the Override Account window Filter...

Page 385: ...ettings in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator Users with an override accoun...

Page 386: ...ck URLs list box To allow the URL to be accessed by the group again 1 Select the URL from the Block URLs list box 2 Click Remove To allow a URL that is blocked at the minimum filtering level to be acc...

Page 387: ...t Time Profiles list box 2 Click View Modify to open the pop up window 3 Click the tab in which to make modifications Rule Redi rect Filter Options Exception 4 Make your edits in this tab and in any o...

Page 388: ...oad Download IP Profile window The Upload Download IP Profile window displays when Upload Download IP Profile is selected from the group menu This window is used for uploading or downloading a text fi...

Page 389: ...containing the IP profiles to be uploaded This text file of user group profiles must be entered in a specific format NOTE For examples of entries to include in a profile file go to http www 8e6 com r...

Page 390: ...load Profile If profiles have been created and or uploaded to the server 1 Click Download Profile to open a browser window containing the profiles Fig 3 1 21 Download IP Profiles window The contents o...

Page 391: ...annot contain spaces The first character cannot be a digit The following characters cannot be used in the name period comma colon semi colon exclamation point question mark ampersand asterisk quotatio...

Page 392: ...box Fig 3 1 23 Create Individual IP box 2 Enter the Member Name for the Individual IP address NOTES The name of the individual IP address must be less than 20 characters cannot be IP NT or LDAP and c...

Page 393: ...ding an Individual IP member to the tree list the user will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window The minimum filt...

Page 394: ...e same configuration settings as one that already exists A sub group can be pasted or copied to a group if the Copy Sub Group function was first performed at the sub group level Paste a Copied IP Sub...

Page 395: ...Sub Group Sub Group includes options for creating and maintaining the filtering profile for the sub group Click the sub group s link to view a menu of sub topics Sub Group Details Members Sub Group Pr...

Page 396: ...0 ENTERPRISE FILTER USER GUIDE Sub Group IP Group window The Sub Group IP Group window displays when Sub Group Details is selected from the menu This window is used for viewing and adding or editing d...

Page 397: ...Sub Group Details frame cannot be edited The following infor mation displays Sub Group Name IP Range Member IP address and netmask or IP address range and MAC Address es if using the mobile mode Add I...

Page 398: ...entered IP address with netmask or IP address range TIP Use the IP Range pull down menu to view the IP address es that can be entered in these fields 2 Corresponding to the selected radio button enter...

Page 399: ...77 Members window The Members window displays when Members is selected from the menu This window is used for modifying the sub group s Member IP address if using the invisible or router mode If using...

Page 400: ...p s Members window display in the MAC Address frame Specify whether or not to add remove MAC addresses to from the sub group To add MAC addresses to the sub group select each sub group by highlighting...

Page 401: ...ion URL window The Exception URL window displays when Exception URL is selected from the sub group menu This window is used for blocking sub group members access to specified URLs and or for letting s...

Page 402: ...e Copy Sub Group function is used for expediting the process of creating sub groups if the sub group to be added has the same configuration settings as one that already exists Copy an IP Sub Group To...

Page 403: ...ividual IP Individual IP includes options for creating and maintaining the filtering profile for the Individual IP member Click the individual IP member s link to view a menu of sub topics Members Ind...

Page 404: ...odifying the indi vidual IP member s IP address if using the invisible or router mode If using the mobile mode the member s MAC address can be selected for inclusion in the sub group Fig 3 1 30 Member...

Page 405: ...Filter Options Exception URL window The Exception URL window displays when Exception URL is selected from the individual IP member menu This window is used for blocking the member s access to speci f...

Page 406: ...384 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Delete Individual IP Delete an Individual IP Member To delete an individual IP member choose Delete Individual IP from the individual IP member...

Page 407: ...es for a group Library categories are used when creating or modifying filtering profiles Fig 3 2 1 Library screen A list of main topics displays in the navigation panel at the left of the screen Main...

Page 408: ...selected from the navigation panel This window is used for verifying whether or not a URL or search engine keyword or keyword phrase exists in a library category Fig 3 2 2 Library Lookup window NOTE...

Page 409: ...g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 decimal value format e g http 1180014290 escaped hexadecimal format e g ht...

Page 410: ...ch engine keyword or keyword phrase has been included in any library category 1 In the Search Engine Keyword Lookup frame enter the Search Engine Keyword or keyword phrase up to 75 alphanumeric charac...

Page 411: ...lick the Custom Categories link to view a menu of topics Add Cate gory and Refresh Fig 3 2 3 Custom Categories menu NOTE Since custom categories are not created by 8e6 updates cannot be provided Maint...

Page 412: ...Category dialog box Fig 3 2 4 Create Category dialog box The Group Name field displays Custom Categories greyed out 2 In the Description field enter from three to 20 charac ters for the long name of...

Page 413: ...first custom category you are adding you may need to double click Custom Categories to open the tree list NOTE The category must have URLs URL keywords and or search keywords added to its profile in...

Page 414: ...ustom Categories tree list Click the custom library category link to view a menu of sub topics Library Details URLs URL Keywords Search Engine Keywords and Delete Category Fig 3 2 5 Library screen cus...

Page 415: ...E 393 Library Details window The Library Details window displays when Library Details is selected from the library category s menu of sub topics This window is used for editing the long name of the cu...

Page 416: ...ILTER USER GUIDE View Edit Library Details The following display and cannot be edited Custom Cate gories Group Name and library category Short Name 1 The long Description name displays and can be edit...

Page 417: ...stom library category s master URL list or master wildcard URL list A URL can contain a domain name such as playboy in http www playboy com or an IP address such as 209 247 228 221 in http 209 247 228...

Page 418: ...y Category To view a list of all URLs that either have been added or deleted from the master URL list or master wildcard URL list 1 Click the View tab 2 Make a selection from the pull down menu for Ma...

Page 419: ...s also can be entered in this field IP address e g 209 247 228 221 in http 209 247 228 221 octal format e g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long forma...

Page 420: ...hat you wish to add to the category 4 Click Apply Action NOTE Wildcard URL query results include all URLs containing text following the period after the wildcard symbol For example an entry of beer co...

Page 421: ...rary Category To remove a URL or wildcard URL from the library category 1 Click the Action tab 2 Enter the URL in the Edit URL List frame or Edit Wild Card URL List frame as pertinent 3 Click Remove t...

Page 422: ...tions 1 Click Upload Master to open the Upload Custom Library URL pop up window Fig 3 2 9 Upload Custom Library URL window 2 Click Browse to open the Choose file pop up window 3 Select the file to be...

Page 423: ...okup Options URLs contained in the file are listed under the column for either Valid URL or Invalid URL 5 If the file contains invalid URLs click Back to return to the Upload URL window Another attemp...

Page 424: ...esses that correspond to URLs in the uploaded file will not be performed b Click Upload to open the Upload Successful pop up window NOTE In order for the URLs to take effect library categories must be...

Page 425: ...he server it will first be vali dated 4 Click Upload File to display the results of the library file content validation in the Library File Content IP Lookup Options pop up window Fig 3 2 12 Library F...

Page 426: ...p up window NOTE In order for the URLs to take effect library categories must be reloaded Reload the Library After all changes have been made to library windows click Reload Library to refresh NOTE Si...

Page 427: ...rd from a custom library category s master list A library category uses URL keywords to block a user s access to Internet addresses containing keywords included in its list Fig 3 2 13 URL Keywords win...

Page 428: ...s a non pornographic site such as http www essex com View a List of URL Keywords To view a list of all URL keywords that either have been added or deleted 1 In the View Keyword Addition Deletion List...

Page 429: ...to open the Choose file window 3 Select the file to be uploaded 4 Click Upload File to upload this file to the server NOTE A URL keywords text file must contain one URL keyword per line WARNING The t...

Page 430: ...hen Search Engine Keywords is selected from the custom library category s menu of sub topics This window is used for adding and removing search engine keywords and phrases to and from a custom library...

Page 431: ...even in blocked categories For example if all searches on gin are set up to be blocked users will not be able to run a search on a subject such as cotton gin However if the word sex is set up to be b...

Page 432: ...lick Upload Master to open the Upload Library Keyword pop up window see Fig 3 2 14 2 Click Browse to open the Choose file window 3 Select the file to be uploaded TIP A search engine keyword text file...

Page 433: ...EEN 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 411 Delete Category Delete a Custom Category To delete a custom library category choose Delete Cate gory from the menu This action removes the l...

Page 434: ...contact us by phone by email or in writing Hours Regular office hours are from Monday through Friday 8 a m to 5 p m PST After hours support is available for emergency issues only Requests for assistan...

Page 435: ...bers 8e6 Corporate Headquarters USA 828 West Taft Avenue Orange CA 92865 4232 USA Local 714 282 6111 Fax 714 282 6116 Domestic US 1 888 786 7999 International 1 714 282 6111 8e6 Taiwan RM B2 13F No 49...

Page 436: ...problem and attempt to resolve the issue directly If your issue needs to be escalated you will be given a ticket number for reference and a senior level technician will contact you to resolve the issu...

Page 437: ...ies 8e6 Technologies warrants that the 8e6 product s do es not infringe on any third party copyrights or patents This warranty shall not apply to the extent that infringement is based on any misuse or...

Page 438: ...ician can be reached by voice line Technical support information Online http www 8e6 com support html Toll Free 888 786 7999 press 3 Telephone 1 714 282 6111 press 3 E mail support 8e6 com Have the fo...

Page 439: ...will be furnished as necessary to maintain the proper operational condition of the product s If parts are discontinued from production during the Warranty Period immediate replacement product s or ha...

Page 440: ...es to Block or Open c Filter Mode 2 Redirect URL optional 3 Filter Options optional For IP profiles the code 0x1 should be placed at the end of a profile string with all filter options disabled Rule C...

Page 441: ...nd of the profile string this code indicates that all other catego ries should be open J Positioned before the category categories defined as open J J First J positioned before the category categories...

Page 442: ...tabase categories html Filter Option codes 0x1 Exception URL Query always enabled 0x2 X Strikes Blocking 0x4 Google Yahoo Safe Search Enforcement 0x100 Search Engine Keyword 0x200 URL Keyword 0x400 By...

Page 443: ...ied time via the Configuration window See the Library screen s Configuration window and Manual Update window in the Global Group Section for more information about updating 8e6 supplied library catego...

Page 444: ...is running cannot start another traveler Installscript is running cannot start another traveler Traveler_Full_Download is running cannot start another traveler System Command Execution Run system com...

Page 445: ...ed files Processing downloaded files Fail Decrypting file Decryption success A problem occurred while deleting filename HTTPS download complete filename For HTTPS downloads Successfully downloaded fil...

Page 446: ...occurred during the Traveler process Connection is lost Finished updating library Fail to download all libraries Failed to sort the library files Started reloading library Finished reloading library...

Page 447: ...aveler encounters an exception Alert emails could not be read email alert configuration file does not exist Reloading library encounters an exception Send alert encountered an exception Traveler exits...

Page 448: ...iled to download deleted category Failed to download category library Successfully downloaded category library Fail to unzip category Weekly Update has completed Summary Messages Failed to download Fi...

Page 449: ...load full library keyword library all categories Successfully download category deletion library Fail to download category deletion library Trial itotal Fail to download category deletion library Comp...

Page 450: ...sfully downloaded category Fail to download category Search Engine Keyword Library Update has successfully completed Patch Update Download patch Downloading patch Dated patchdate The patch has been do...

Page 451: ...ons page Part I Modify the R3000 1 Enable block page redirection Select either of the following options to modify the R3000 Option 1 lets you modify the back end and Option 2 lets you modify the R3000...

Page 452: ...s the block page must be placed at the default HTTP port which is 80 Since the console may not allow certain characters e g _ if such characters are used in the URL a modified name must be used instea...

Page 453: ...block page must be accessible via this link http server for block_page port for block page blockpage Show 8e6 s information in the block page optional The following information is passed to the block...

Page 454: ...the custom ized block page Examples include 1 HTML using Java Script to parse post form data 2 CGI written in Perl 3 CGI written in C See the Reference portion of this appendix for coding details NOTE...

Page 455: ...str indexOf start if i 0 len str length substr str substr i start length len start length j substr indexOf end if j 0 result substr substring 0 j else if j 0 len substr length result substr substr 0 l...

Page 456: ...t block action http R3000 IP 81 cgi block cgi document block submit script head body form method post name block input type hidden name SITE value _BLOCK_SITE_ input type hidden name URL value input t...

Page 457: ...tomized block page Replace the R3000 IP with the real IP before using This script provide data to the options CGI through query string Revision 1 Date 03 08 2004 method ENV REQUEST_METHOD if method po...

Page 458: ...eal IP before using This script uses Java Script to post form data to options CGI Revision 1 Date 03 08 2004 method ENV REQUEST_METHOD if method post i string STDIN else string ENV QUERY_STRING url 1...

Page 459: ...e URL value url n print input type hidden name CAT value cat n print input type hidden name USER value user n print input type hidden name STEP value STEP2 n print br R3000 Customized Block Page CGI w...

Page 460: ...ction prototypes void printhtml void unescape_url char url char x2c char what char makeword char line char stop void plustospace char str char fmakeword FILE f char stop int cl int to_upper char strin...

Page 461: ...ay set a variety of global variables to be used by other areas of the program data_size atoi getenv CONTENT_LENGTH for index 0 data_size feof stdin index entries index val char fmakeword stdin data_si...

Page 462: ...szIP printf input type hidden name URL value s n szURL printf input type hidden name CAT value s n szCategory printf input type hidden name USER value s n szUserName printf input type hidden name STE...

Page 463: ...what 0 0 digit 16 digit what 1 A what 1 0xdf A 10 what 1 0 return digit char makeword char line char stop int x 0 y char word char malloc sizeof char strlen line 1 for x 0 line x line x stop x word x...

Page 464: ...f if ll wsize word ll 1 0 wsize 102400 word char realloc word sizeof char wsize 1 cl if word ll stop feof f cl if word ll stop ll word ll 0 return word ll to_upper Change the string to upper case int...

Page 465: ...APPENDIX C 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 443 void getquery char paramd char paramv if paramd NULL paramv NULL else paramv char strtok paramd void getnextquery char paramv paramv...

Page 466: ...n his her workstation will need to temporarily disable pop up blocking in order to authenticate him herself via the Options page Fig D 1 Options page This appendix provides instructions on how to use...

Page 467: ...e button this action opens the override account pop up window Add Override Account to the White List If the override account window was previously blocked by the Yahoo Toolbar it can be moved from the...

Page 468: ...3 Allow pop ups from source 3 Select the source from the Sources of Recently Blocked Pop Ups list box to activate the Allow button 4 Click Allow to move the selected source to the Always Allow Pop Ups...

Page 469: ...imultaneously clicking the Override button this action opens the override account pop up window Add Override Account to the White List To add the override account window to the white list so that it w...

Page 470: ...chSafe toolbar lets you toggle between enabling pop up blocking popups blocked and disabling pop up blocking Popup protection off by clicking the pop up icon 1 In the IE browser go to the SearchSafe t...

Page 471: ...Preferences dialog box 2 Go to the Category list box and select Privacy Security Popup Windows to display the Popup Windows page Fig D 6 Mozilla Firefox Popup Windows Preferences 3 With the Block unr...

Page 472: ...nable the pop up blocking feature in the IE browser Use the Internet Options dialog box 1 From the IE browser go to the toolbar and select Tools Internet Options to open the Internet Options dialog bo...

Page 473: ...ocker this menu selec tion changes to Turn Off Pop up Blocker and activates the Pop up Blocker Settings menu item You can toggle between the On and Off settings to enable or disable pop up blocking Te...

Page 474: ...to the toolbar and select Tools Pop up Blocker Pop up Blocker Settings to open the Pop up Blocker Settings dialog box Fig D 9 Pop up Blocker Settings 2 Enter the Address of Web site to allow and clic...

Page 475: ...Pop up Blocker Settings to open the Pop up Blocker Settings dialog box see Fig D 9 2 In the Notifications and Filter Level frame click the checkbox for Show Information Bar when a pop up is blocked 3...

Page 476: ...s Site this action opens the Allow pop ups from this site dialog box Fig D 12 Allow pop ups dialog box 5 Click Yes to add the override account to your white list and to close the dialog box NOTE To vi...

Page 477: ...the road uploaded to the R3000 set in the mobile mode and Mobile Client software installed on end users workstations 8e6 Mobile Client ensures Internet activity of all end users located outside the or...

Page 478: ...r higher Macintosh OS X Version 10 4 running Safari Firefox 1 0 or higher or IE 6 0 or higher JavaScript enabled Pop up blocking software if installed must be disabled Network Requirement High speed c...

Page 479: ...two components are installed the following scenario occurs on the network 1 The end user logs into his her mobile PC located outside of the organization and then makes a URL request 2 The Mobile Clie...

Page 480: ...g appliance and an 8e6 ER Enter prise Reporter reporting appliance on the network Fig E 1 2 Diagram showing 8e6 Mobile Client with R3000 and ER 8e6 Mobile Client 1 A URL request is made from an end us...

Page 481: ...site is disallowed the Mobile Client software blocks the connection to the Web server Enterprise Reporter A The mobile R3000 appliance sends logs to the local Enterprise Reporter ER for processing B...

Page 482: ...000 Quick Start Guide the booklet packaged with your R3000 unit This guide explains how to configure the server so that it can be accessed via an IP address on your network NOTE If you do not have the...

Page 483: ...le mode for filtering mobile PCs 1 In the Mode frame select Mobile to display frames used for configuring the R3000 in the mobile mode Fig E 2 1 Operation Mode window Mobile mode 2 In the Listening De...

Page 484: ...me Profile Override Account Exception URL NT LDAP Authentication and the Warn filter setting An end user with categories blocked in his her profile will be blocked from categories with a Warn setting...

Page 485: ...IP group Members window is used for adding mobile PC MAC addresses MAC addresses are used for obtaining mobile PC members filtering profiles Fig E 2 2 Members window master IP group with MAC addresse...

Page 486: ...t Members list box select the MAC address from the list box and then click Remove Select MAC Addresses for a Sub Group In the mobile mode the sub group Members window is used for selecting MAC address...

Page 487: ...her or not to add remove MAC addresses to from the sub group To add MAC addresses to the sub group select each sub group by highlighting it in the Available MAC s list box and then clicking the left a...

Page 488: ...window is used for viewing this sub group s MAC addresses previously added in the sub group s Members window Fig E 2 4 Sub Group IP Group window view MAC Addresses MAC addresses display in the Member...

Page 489: ...mber When using the mobile mode the Individual IP s Member window is used for selecting the member s MAC address for inclusion in the sub group Fig E 2 5 Member window with MAC Address 1 In the Modify...

Page 490: ...Download IP Profile window Fig E 2 6 Global Group s Upload Download IP Profile window WARNING Any existing profiles will be overwritten by the contents of the uploaded file If the end user has both a...

Page 491: ...AF 33 E1 A J CHAT R GPORN I 1 1 Using this example in the master IP group s profile file the following entries would be made for the end user whose username is rreynolds rreynolds 150 100 30 2 A J CH...

Page 492: ...end user workstations and uninstall the Mobile Client The 8e6 Mobile Client Windows Deployment Kit is comprised of the following resources Unconfigured packages containing the Mobile Client software...

Page 493: ...rver into your machine 2 Open the 8e6MobileClient folder and find the msi file for the 8e6 Mobile Client application NOTE If you do not have this CD ROM or the 8e6MobileClient folder does not contain...

Page 494: ...the Security Warning dialog box opens Fig E 3 3 Security Warning dialog box 5 Click Run to close the Security Warning dialog box and to launch the 8e6 Mobile Client Windows Deployment Kit Installatio...

Page 495: ...473 Fig E 3 5 Destination Folder step of wizard 7 Specify the destination folder to be used and then click Next to go to the page that confirms the installation process is ready to begin Fig E 3 6 In...

Page 496: ...TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE Fig E 3 7 Installation process in progress The following page displays when the installation process is complete Fig E 3 8 Installation complete 9 Click...

Page 497: ...e 8e6 Mobile Client Configuration Editor can be found at Start Programs 8e6 Mobile Client Deployment Kit Mobile Client Configuration Editor Fig E 3 9 8e6 Mobile Client Configuration Editor Upon first...

Page 498: ...for Macintosh OS X machines 3 Click Open to load the specified file As a result of this action the path and filename of the opened package displays at the bottom of the window and some fields and chec...

Page 499: ...APPENDICES SECTION APPENDIX E 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 477 Fig E 3 11 Windows package opened Fig E 3 12 Macintosh package opened...

Page 500: ...dialog box Fig E 3 13 Add Remove Mobile Filter Host s 2 In the IP or Host Name field enter the public IP address or hostname of your mobile filter host 3 By default 443 displays in the Port field and...

Page 501: ...ield enter the public IP address or hostname of your internal filter host 3 By default 81 displays in the Port field and should not be modified unless the R3000 is using a different port 4 Click Add t...

Page 502: ...IP address or host name of your proxy server 2 In the Port field enter the port number for this proxy server Fig E 3 15 Proxy address fields 3 If authentication is required for the Mobile Client to co...

Page 503: ...default This setting indicates that if the Mobile Client cannot detect the mobile R3000 all URLs requested by the end user will be blocked Uncheck this box if the end user s workstation should be per...

Page 504: ...ime of the installation and thus will be presented with a reboot prompt By checking the Force auto reboot even if user is logged in during installation checkbox the reboot prompt is suppressed and an...

Page 505: ...name 8e6MobileClient 8e6client msi 2 Create a new Group Policy Object GPO a in the GPMC select Group Policy Management Forest Domains domain name Group Policy Objects b Right click and choose New then...

Page 506: ...ations but not servers There are two types of filters Security filters and WMI filters To create a Security filter a Select the new policy link Note the Security Filtering section in the Scope panel t...

Page 507: ...its policies by running gpup date exe NOTE By default Windows periodically refreshes the group policy automatically Using gpupdate allows you to force an immediate refresh for test purposes this is n...

Page 508: ...orkstation Fig E 3 17 Begin Mobile Client installation After the application has been installed the workstation automatically shuts down and restarts if the Force auto reboot even if user is logged in...

Page 509: ...is deployed on the workstation the Mobile Client will be uninstalled from end users machines NOTE The Remover does not require configuration prior to distri bution You will probably want to change th...

Page 510: ...t dialog box Fig E 3 19 Uninstall 8e6 Mobile Client dialog box 3 Click UNINSTALL to close the Uninstall 8e6 Mobile Client dialog box and to open the Uninstall dialog box Fig E 3 20 Second Uninstall di...

Page 511: ...e Uninstall dialog box In this example 23526528 6 Click the Generate button to display the generated six character Uninstall key Fig E 3 22 Generate a key Copy this Uninstall key In this example 0d72d...

Page 512: ...FILTER USER GUIDE Fig E 3 23 Uninstall the Mobile Client 8 Click OK to begin the uninstallation process When the Mobile Client has been uninstalled a message displays asking you to restart the machin...

Page 513: ...unique library category that is created by an administrator and can include URLs URL keywords and search engine keywords to be blocked Group adminis trators create and manage custom library categories...

Page 514: ...this feature of the R3000 groups and or individual client machines can be set up to block the use of IM services specified in the library category invisible mode An R3000 set up in the invisible mode...

Page 515: ...rofile is used and the minimum filtering level does not apply to that user name resolution A process that occurs when the R3000 attempts to resolve the IP address of the authentication server with the...

Page 516: ...atabase used for vali dating users peer to peer P2P involves communication between computing devices desktops servers and other smart devices that are linked directly to each other Using this feature...

Page 517: ...that a request is inappropriate a block page is returned to the client to replace the actual requested Web page or service rule A filtering component comprised of library categories set up to be bloc...

Page 518: ...at a scheduled time URL An abbreviation for Uniform Resource Locator the global address of Web pages and other resources on the Internet A URL is comprised of two parts The first part of the address s...

Page 519: ...APPENDICES SECTION APPENDIX F 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE 497 white list A list of approved library categories for a speci fied entity s filtering profile...

Page 520: ...APPENDICES SECTION APPENDIX F 498 8E6 TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE...

Page 521: ...min Audit Trail window 115 Administrator menu 98 Administrator window 98 alert box terminology 4 Alert menu 118 Alert window 119 always allowed 25 definition 491 authentication 157 Authentication menu...

Page 522: ...88 Category Weight System window 288 checkbox terminology 4 Common Customization window 194 Configuration window 266 contact e mail addresses 119 Control menu 70 CPU Usage diagnostic tool 105 Ctrl key...

Page 523: ...g 25 definition 491 Filter window 71 filtering 420 category codes 420 hierarchy diagram 27 profile components 22 profile types 19 rules 26 search engine keyword 237 static profiles 20 URL keyword 238...

Page 524: ...hoo Safe Search Enforcement global group filter option 236 grid terminology 5 group create IP group 261 delete profile 371 global 17 IP 18 260 types of 17 group administrator 1 2 definition 492 group...

Page 525: ...lorer 10 invisible mode 12 definition 492 diagram 12 diagram with port monitoring 13 IP group 18 260 335 category profile 349 create 261 diagram 18 J Java Plug in 10 Java Virtual Machine 10 JavaScript...

Page 526: ...y categories 23 8e6 supplied 293 category codes list 420 custom 389 definition 492 Library Details window 295 393 Library Lookup menu 281 386 Library Lookup window 281 386 Library screen 53 Library Up...

Page 527: ...st 305 definition 493 Member window Individual IP MAC address 467 Member window Individual IP 382 Members window 338 377 mobile mode 463 464 Minimum Filtering Categories categories profile 252 minimum...

Page 528: ...P Newsgroup menu 291 NNTP Newsgroup window 291 NTP Servers window 92 O open setting 25 definition 494 Operation Mode window 151 mobile mode 461 Options page 82 override account 340 AdwareSafe popup bl...

Page 529: ...pop up blocking disable 444 pop up box window terminology 6 port profile global 231 255 minimum filtering level 255 Process list diagnostic tool 103 Product Warranties section 415 profile global grou...

Page 530: ...altime traffic logs 107 re authentication block page authentication 78 Reboot window 86 Recent Logins diagnostic tool 105 Recent Trend 327 redirect URL global group 233 refresh the GUI 64 Regional Set...

Page 531: ...stom category 408 self monitoring process 119 service port 24 definition 495 Setup window 137 Shadow Log Format window 329 Shift key 64 ShutDown window 85 SMTP definition 495 SMTP Server Settings wind...

Page 532: ...mance diagnostic tool 105 system requirements 10 456 System screen 53 T Target mode 35 142 technical support 412 text box terminology 7 time profile add 359 definition 496 delete 365 modify 365 profil...

Page 533: ...iltering 238 URL Keywords window 301 8e6 supplied category 301 custom category 405 URL definition 496 URLs window 296 8e6 supplied category 296 custom category 395 Usage Graphs window 326 usage logs 1...

Page 534: ...TECHNOLOGIES R3000 ENTERPRISE FILTER USER GUIDE window terminology 8 Windows 2000 456 Windows XP 456 workstation requirements 10 456 X X Strikes Blocking global group filter option 235 X Strikes Block...

Reviews: