M86 Security 350 Installation Manual page 5

Web filter and reporter
Hide thumbs Also See for 350:
Table of Contents

Advertisement

Step 4: Generate SSL Certificate. ................................................................................ 44
Generate a Self-Signed Certificate for the WFR .................................................................... 44
IE Security Certificate Installation Procedures ....................................................................... 45
Accept the Security Certificate in IE ................................................................................ 45
Windows XP or Vista with IE 8 or 9............................................................................ 45
Windows 7 with IE 8 or 9............................................................................................ 49
Map the WFR's IP Address to the Server's Host Name .................................................. 50
Step 5: Test Filtering on the Web Filter. ..................................................................... 53
Step 6: Set Library Updates. ........................................................................................ 54
Activate the Web Filter ...........................................................................................................54
Log in to the Web Filter .......................................................................................................... 55
Perform a Complete Library Update ...................................................................................... 56
Monitor the Library Update Process ....................................................................................... 57
Step 7: Set Self-Monitoring. ......................................................................................... 58
Step 8: Verify Web Filter Log Transfer........................................................................ 61
Step 9: Set up an SWG to use with this WFR. ............................................................ 62
Add an SWG Device to the Device Registry .......................................................................... 62
SWG Log Transfer Setup ....................................................................................................... 63
SWG Configuration for Software Version 10.0 ................................................................ 63
Configure SWG to Send Logs to the SR.................................................................... 63
Policy Settings............................................................................................................ 64
SWG Configuration for Software Version 9.2.5 . .............................................................. 65
Configure SWG to Send Logs to the SR.................................................................... 65
Policy Settings ...........................................................................................................66
Single Sign-On Access, Default Username/Password. ............................................. 67
Access WFR Applications from the SR User Interface .......................................................... 67
Default Usernames and Passwords ....................................................................................... 67
................................................................................................68
Web Filter Usage Scenarios......................................................................................... 71
I. Threats/Liabilities ............................................................................................................... 72
A. Category block ...........................................................................................................72
B. Rule block .................................................................................................................. 72
C. X-Strike on blocked categories .................................................................................. 72
D. Custom Lock, Block, Warn, X Strikes, Quota pages .................................................. 73
E. URL Keywords ...........................................................................................................73
F. Search Engine Keywords ........................................................................................... 73
G. Custom Category (blocked) . ...................................................................................... 74
H. Minimum Filtering Level ............................................................................................. 74
I. Override Account bypass ............................................................................................ 74
J. Exception URL bypass . ............................................................................................... 75
K. Proxy Patterns .............................................................................................................75
L. File type blocking .........................................................................................................75
II. Bandwidth/Productivity ...................................................................................................... 76
A. Time Quota/Hit Quota ................................................................................................ 76
B. Overall Quota .............................................................................................................76
C. Time Based Profiles ................................................................................................... 76
M86 S
I
G
ECURITY
NSTALLATION
UIDE
...............................................69
C
ONTENTS
v

Advertisement

Table of Contents
loading

This manual is also suitable for:

550

Table of Contents