Filtering by User Consent
77
Consent page URL (Optional Filtering)
When users begins an Internet session on a computer that is not always
filtered, they are shown a consent page and given the option to access
the Internet with or without filtering.
Create this page in HTML. It may contain the text from, or links to your
company’s
Acceptable Use Policy
(
AUP
).
You must include in this page links to two pages contained in the Firewall
which, when selected, tell the Firewall if the user wishes to have filtering
enabled or disabled. The link for unfiltered access must be:
192.168.1.254/iAccept.html
The link for filtered access must be:
192.168.1.254/iAcceptFilter.html
If you have changed the IP address or the Firewall use the IP Address of
the Firewall instead of
192.168.1.254
.
Both the link for filtered access and the link for unfiltered access are case
sensitive.
Enter the URL of the page you have created in the When entering these
addresses you should not enter http:// before the address.
“Consent Accepted” URL (Filtering Off)
When users accept the terms outlined in the Consent page and choose to
access the Internet without the protection of filtering, they are shown a
page to confirm their selection. Type the URL of this page in the
“Consent
Accepted” URL (Filtering Off)
box.
“Consent Accepted” URL (Filtering On)
When users accept the terms outlined in the Consent page and choose to
access the Internet with the protection of filtering, they are shown a page
to confirm their selection. Type the URL of this page in the
“Consent
Accepted” URL (Filtering On)
box.
Mandatory Filtered IP
addresses
When users begin an Internet session on a computer where filtering is
mandatory, as described below, they are shown a consent page.You
DUA1611-0AAA02.book Page 77 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...