M86 S
ECURITY
U
SER
G
UIDE
iii
C
ONTENTS
..................................................... 1
How to Use this User Guide ....................................................... 2
Organization ...................................................................................... 2
Conventions ...................................................................................... 3
Components and Environment .................................................. 4
Components ...................................................................................... 4
Environment ...................................................................................... 5
Network Requirements ............................................................... 5
Administrator Workstation Requirements ................................... 5
End User Workstation Requirements ......................................... 6
How to Use the WFR on the Web ............................................... 7
Initial Setup ....................................................................................... 7
Access the WFR Welcome Window .................................................. 7
Single Sign-On Access ..................................................................... 9
Access all applications from the SR UI ....................................... 9
Default Usernames and Passwords . ........................................ 10
Technical Support / Product Warranties ......................................... 10
............................. 11
Web Filter ................................................................................... 11
About this Portion of the User Guide ...................................... 11
Terminology .................................................................................... 13
Overview .................................................................................... 18
Chapter 1: Filtering Operations ............................................... 19
Operational Modes .......................................................................... 19
Invisible Mode ........................................................................... 20
Router Mode . ............................................................................ 22
Firewall Mode ........................................................................... 23
Group Types ................................................................................... 25