M86 Security MSA Installation Manual

Ir
Hide thumbs Also See for MSA:
Table of Contents

Advertisement

Quick Links

M86 IR
INSTALLATION GUIDE
Model: MSA
Software Versions: Web Filter 5.0.00, ER 6.0.10
Document Version: 02.01.12

Advertisement

Table of Contents
loading

Summary of Contents for M86 Security MSA

  • Page 1 M86 IR INSTALLATION GUIDE Model: MSA Software Versions: Web Filter 5.0.00, ER 6.0.10 Document Version: 02.01.12...
  • Page 2 Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connec- tion with the furnishing, performance, or use of this manual or the examples herein.
  • Page 3: Table Of Contents

    ONTENTS M86 IR I ...................1 NTRODUCTION About this Document...................... 1 Conventions Used in this Document................2 ..................3 ERVICE NFORMATION M86 Technical Support Call Procedures..............3 ..............4 RELIMINARY ETUP ROCEDURES Unpack the Unit from the Carton................... 4 Select a Site for the Server..................... 5 Rack Mount the Server.
  • Page 4 ONTENTS Time Zone regional setting ....................27 Non-Quick Start procedures or settings ................28 Reboot system ......................28 Change Quick Start password ................... 28 Reset admin console account ..................28 System Status screen ......................29 Log Off, Disconnect the Peripherals ..................29 Physically Connect the IR to the Network ................
  • Page 5 ONTENTS II. Bandwidth/Productivity ...................... 63 A. Time Quota/Hit Quota ....................63 B. Overall Quota ......................63 C. Time Based Profiles ....................63 D. Warn option with low filter settings ................64 E. Warn-strike ......................... 64 F. P2P patterns ....................... 64 G. IM patterns ......................... 65 H.
  • Page 6 ONTENTS Summary Report ......................86 Detail Report ......................86 ..87 MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION Evaluation Mode Pop-Ups.................... 87 Administrator Console, Expiration Screen..............87 ER Web Client, ER Server Information Window............88 LED I ..............89 NDICATORS AND UTTONS Diagrams and Descriptions ....................
  • Page 7: M86 Ir Introduction

    M86 IR I NTRODUCTION Thank you for choosing to install the M86 Security IR (Web Filter with Integrated Reporter). This product combines the Web Filter with the Enterprise Reporter (ER) to track end user Internet activity and generate reports that assist administrators in developing policies and targeting sites to be filtered, in order to maximize band- width utilization and productivity.
  • Page 8: Conventions Used In This Document

    CAUTION: The “caution” icon is followed by information warning you that a situation has the potential to cause bodily harm or death. IMPORTANT: The “important” icon is followed by information M86 Security recommends that you review before proceeding with the next action.
  • Page 9: Service Information

    Any initial hardware setup problem that cannot be resolved at your internal organi- zation should be referred to an M86 Security solutions engineer or technical support representative. For technical assistance or warranty repair, please visit http://www.m86security.com/support/ .
  • Page 10: Reliminary Etup Rocedures

    Carefully unpack the unit from the carton and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to M86 Security. The carton should contain the following items: • 1 IR unit •...
  • Page 11: Select A Site For The Server

    RELIMINARY ETUP ROCEDURES ELECT A ITE FOR THE ERVER Select a Site for the Server The server operates reliably within normal office environmental limits. Select a site that meets the following criteria: • Clean and relatively free of excess dust. •...
  • Page 12: Rack Mount The Server

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount the Server Rack Setup Precautions WARNING: Before rack mounting the server, the physical environment should be set up to safely accommodate the server. Be sure that: • The weight of all units in the rack is evenly distributed. Mounting of the equip- ment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading.
  • Page 13: Rack Mount Instructions

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions Optional: Install the Chassis Rails NOTE: If your chassis does not come with chassis rails, please follow the procedure listed on the last page of this sub-section to install the unit directly into the rack. CAUTION: Please make sure that the chassis covers and chassis rails are installed on the chassis before you install the chassis into the rack.
  • Page 14 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Locate the three holes on each side of the chassis and locate the three corre- sponding holes on each of the inner rail. 4. Attach an inner rail to each side of the chassis and secure the inner rail to the chassis by inserting three Type G screws through the holes on each side of the chassis and the inner rail.
  • Page 15: Optional: Install The Traditional Up Racks

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Traditional UP Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
  • Page 16 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 8. You will need to release the safety taps on both sides of the chassis in order to completely remove the chassis out of the rack. M86 S ECURITY NSTALLATION UIDE...
  • Page 17: Optional: Install The Open Racks

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Open Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
  • Page 18 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Attach the front (short) bracket to the front end of the rack, and secure it to the rack with two Type H screws and Type I washers as shown below. (See the previous page for descriptions of Type H and Type I hardware components.) 4.
  • Page 19 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 6. Slide the inner rails which are attached to the chassis into the outer rails on the rack. M86 S ECURITY NSTALLATION UIDE...
  • Page 20: Install The Chassis Into The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack CAUTION: Before installing the chassis into the rack: • Make sure that the rack is securely anchored onto an unmovable surface or structure before installing the chassis into the rack. •...
  • Page 21: Check The Power Supply

    • In geographic regions that are susceptible to electrical storms, M86 Security highly recommends plugging the AC power cord for the server into a surge suppressor.
  • Page 22: General Safety Information

    WARNING: If the server is used in a manner not specified by the manufacturer, the protection provided by the server may be impaired. WARNING: M86 Security is not responsible for regulatory compliance of any server that has been modified. Altering the server’s enclosure in any way other than the installation operations specified in this document may invalidate the server’s safety certifications.
  • Page 23: Ac Power Cord And Cable Precautions

    RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION AC Power Cord and Cable Precautions WARNING: • The AC power cord for the server must be plugged into a grounded, power outlet. • Do not modify or use a supplied AC power cord if it is not the exact type required in the region where the server will be installed and used.
  • Page 24: Motherboard Battery Precautions

    RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION Motherboard Battery Precautions CAUTION: The battery on the motherboard should not be replaced without following instruc- tions provided by the manufacturer. Only qualified service personnel should replace batteries. The battery contains energy and, as with all batteries, a malfunction can cause heat, smoke, or fire, release toxic materials, or cause burns.
  • Page 25: Install The Server

    1: S NSTALL THE ERVER ETUP ROCEDURES NSTALL THE ERVER Step 1: Setup Procedures This step requires you to link the workstation to the IR. You have the option of using the text-based Quick Start setup procedures described in Step 1A, or the Adminis- trator console setup procedures described in the Appendix.
  • Page 26: Step 1A: Quick Start Setup Procedures

    (see Fig. 2). Fig. 1 - Portion of MSA chassis rear Fig. 2 - Diagram of MSA chassis front panel, power button at far right Once the IR is powered up, proceed to the instructions for HyperTerminal Setup Procedures.
  • Page 27: Hyperterminal Setup Procedures

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES HyperTerminal Setup Procedures If using a serial console, follow these procedures on a Windows XP machine to create a HyperTerminal session. NOTE: HyperTerminal is no longer included with Windows as of Microsoft’s Vista system. Please note on Microsoft’s Web page “What happened to HyperTerminal?”...
  • Page 28 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES B. In the Connection Description dialog box, enter any session Name, and then click OK to open the Connect To dialog box: C. At the Connect using field, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, displaying the Port Settings tab: D.
  • Page 29 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES F. In the HyperTerminal session window, go to File > Properties to open the Prop- erties dialog box, displaying the Connect To and Settings tabs: G. Click the Settings tab, and at the Emulation menu select “VT100”. H.
  • Page 30: Login Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Login screen The login screen displays after powering on the IR unit using a monitor and keyboard, or creating a HyperTerminal session. NOTES: If using a HyperTerminal session, the login screen will display with black text on a white background.
  • Page 31: Quick Start Menu: Administration Menu

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Quick Start menu: administration menu A. At the Press the number of your selection prompt, press 2 to select the “Quick Start Setup” process. The Quick Start menu takes you to the following configuration screens to make entries for configuring the IR: •...
  • Page 32: Change Filtering Mode

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Change filtering mode A. From the Quick Start menu, press 3 to go to the Filter mode configuration screen. B. Select a filter mode (Invisible, Router, or Firewall) using up-arrow and down- arrow keys.
  • Page 33: Configure Host Name

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Configure host name A. From the Quick Start menu, press 8 to go to the Configure host name screen. B. At the Enter host name prompt, type in the host name and press Enter. C.
  • Page 34: Non-Quick Start Procedures Or Settings

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Non-Quick Start procedures or settings The options described below do not pertain to the quick start setup process. Reboot system A. From the Quick Start menu, press B to go to the Reboot confirmation screen. B.
  • Page 35: System Status Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES System Status screen The System Status screen contains the following information: • Serial Number assigned to the chassis • Operation Mode specified in screen 3 (Change filter mode) • Capturing Interface specified in screen 4 or 5 (Configure network interface LAN1 or LAN2) •...
  • Page 36: Physically Connect The Ir To The Network

    Internet traffic you wish to filter. E. Repeat sub-steps B and C for the IR’s LAN 2 port. Portion of MSA chassis rear F. Wait until the reboot process has completed, indicated by the drive light staying off for 30 seconds.
  • Page 37: Access The Ir Online

    • Is the administrator workstation able to ping the IR’s LAN 1 IP address? • If pinging the IP address of the IR is unsuccessful, try restarting the network service or rebooting the IR. • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. M86 S...
  • Page 38: Accept The Security Certificate In Firefox

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Accept the Security Certificate in Firefox A. If using a Firefox browser, in the page “This Connection is Untrusted,” click the option I Understand the Risks: B. In the next set of instructions that display, click Add Exception...: Clicking Add Exception opens the Add Security Exception window: M86 S ECURITY...
  • Page 39 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES C. In the Add Security Exception window, click Get Certificate and wait a few seconds until the security certificate is obtained by the server. D. With the checkbox Permanently store this exception selected (or grayed- out), click Confirm Security Exception to open the Welcome window of the IR user interface: NOTE: You will need to add a security exception for the Web Filter, Enterprise Reporter...
  • Page 40: Temporarily Accept The Security Certificate In Ie

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Temporarily Accept the Security Certificate in IE A. If using an IE browser, in the page “There is a problem with this website's secu- rity certificate.”, click Continue to this website (not recommended): Selecting this option displays the IR splash page with the address field and the Certificate Error button to the right of the field shaded a reddish color: B.
  • Page 41: Accept The Security Certificate In Safari

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Accept the Security Certificate in Safari A. If using a Safari browser, the window explaining "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
  • Page 42: Accept The Security Certificate In Chrome

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Accept the Security Certificate in Chrome A. If using a Chrome browser, in the page “This is probably not the site you are looking for!” click the button Proceed anyway: Clicking this button launches the IR splash page: NOTE: The Security Certificate must be accepted each time a new browser is launched.
  • Page 43: Step 2: Log In Web Filter, Generate Ssl Certificate

    2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Step 2: Log in Web Filter, Generate SSL Certificate This step requires you to log in to the Web Filter and generate a self-signed certif- icate for the IR to ensure secure exchanges between the appliance and your browser.
  • Page 44: Generate Ssl Certificate

    2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Generate SSL Certificate A. Navigate to System > UI SSL Certificate to open the SSL Certificate window: B. Click Generate Certificate to open the box that asks if you wish to continue, which would restart your server.
  • Page 45 2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE D. After the certificate is generated, you will be prompted to click OK and close your browser. Wait a few minutes before attempting to access the user inter- face.
  • Page 46: Ie Security Certificate Installation Procedures

    2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE IE Security Certificate Installation Procedures Access the IR splash page A. Launch an Internet Explorer 8 browser window. B. Type in https://x.x.x.x:1443 in the address field (in which ‘x.x.x.x’ represents the LAN 1 IP address assigned to the IR).
  • Page 47 2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Figure A2: Windows XP, IE 8 B. Click Certificate Error to open the Certificate Invalid box: Figure B: Windows XP, IE 8 C. Click View certificates to open the Certificate window that includes the host name you assigned to the IR: M86 S ECURITY...
  • Page 48 2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Figure C: Windows XP, IE 8 D. Click Install Certificate... to launch the Certificate Import Wizard: Figure D: Windows XP, IE 8 E. Click Next > to display the Certificate Store page: Figure E: Windows XP, IE 8 M86 S ECURITY...
  • Page 49 2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE F. Choose the option “Place all certificates in the following store” and then click Browse... to open the Select Certificate Store box: Figure F: Windows XP, IE 8 G.
  • Page 50: Windows 7 With Ie 8 Or 9

    2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map the IR’s IP address to its host name. Proceed to Map the IR’s IP Address to the Server’s Host Name.
  • Page 51: Map The Ir's Ip Address To The Server's Host Name

    2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map the IR’s IP address to its host name. Proceed to Map the IR’s IP Address to the Server’s Host Name.
  • Page 52 2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE C. Enter a line in the hosts file with the IR’s IP address and its host name—the latter entered during the Configure host name screen of the Quick Start Setup Procedures (Step 1A), or the Network: LAN Settings steps from the Console Setup Procedures (in the Appendix)—and then save and close the file.
  • Page 53: Step 3: Test Filtering

    • http://test.8e6.net • http://test.marshal8e6.com.tw • http://testsite.marshal.com B. You should receive a block page for each URL tested. If you do not, contact an M86 Security solutions engineer or technical support representative. M86 S ECURITY NSTALLATION UIDE...
  • Page 54: Step 4: Set Library Updates

    Web Filter library updates. Library updates are crit- ical for filtering as new sites are added to the M86 Security library each day. To activate updates, visit the M86 Security Web site and enter the activation code that was issued to you by e-mail (also included on the product invoice).
  • Page 55 4: S NSTALL THE ERVER IBRARY PDATES C. In the Manual Update to M86 Supplied Categories window, click the radio button corresponding to Full URL Library Update. D. Click Update Now to begin the update process. M86 S ECURITY NSTALLATION UIDE...
  • Page 56: Monitor The Library Update Process

    Obtain the latest M86 IR Web Filter User Guide at http://www.m86security.com/ support/R3000/documentation.asp For troubleshooting tips, visit http://www.m86security.com/software/8e6/ts/ r3000.html IMPORTANT: M86 Security recommends reviewing the Best Filtering Practices section to implement setup procedures for the filtering scenarios described within that section. M86 S ECURITY...
  • Page 57: Step 5: Change The Er Admin User Name And Password, Set Self-Monitoring

    5: C ER A NSTALL THE ERVER HANGE THE DMIN AME AND ASSWORD ONITORING Step 5: Change the ER Admin User Name and Password, Set Self-Monitoring After configuring the Web Filter, click the Quit button at the top of the screen to exit the Web Filter Administrator console.
  • Page 58: Change User Name And Password

    5: C ER A NSTALL THE ERVER HANGE THE DMIN AME AND ASSWORD ONITORING NOTE: If using the ER in the Evaluation Mode, the ER Status pop-up window opens when accessing the Server Status screen. See the M86 IR Enterprise Reporter Administrator User Guide for information about the Evaluation Mode.
  • Page 59: Set Self-Monitoring

    5: C ER A NSTALL THE ERVER HANGE THE DMIN AME AND ASSWORD ONITORING D. In the Confirm Password field, re-enter the password. E. Click Save. Set Self-Monitoring A. From the Server pull-down menu, choose Self-Monitoring to display the Self Monitoring screen: B.
  • Page 60: Step 6: Launch The Er Client

    6: L ER C NSTALL THE ERVER AUNCH THE LIENT Step 6: Launch the ER Client A. From the IR splash page, click the button corresponding to Enterprise Reporter: This action opens the ER Web Client login window: NOTE: You will need to follow the procedures for accepting the security certificate for the ER Web Client.
  • Page 61 6: L ER C NSTALL THE ERVER AUNCH THE LIENT D. Click Add User to open the Enter User Permissions dialog box: E. Enter the Username. F. Enter the Password, and Confirm Password. G. Select the User Type (“Admin” or “Sub-Admin”). H.
  • Page 62: Conclusion

    NOTE: If you cannot view reports, or if your specific environment is not covered in the ER Administrator User Guide, contact an M86 Security solutions engineer or technical support representative. Port 22 (SSH) and Port 3306 (SQL) must be open on your network to allow access by remote technical support.
  • Page 63: Best Filtering Practices

    ILTERING RACTICES ILTERING RACTICES This collection of setup and usage scenarios is designed to help you understand and use basic tools in the Web Filter console for configuring the user interface and creating filtering profiles for users in your network. Each scenario is followed by console setup information.
  • Page 64: Threat Class Groups

    LASS ROUPS Threat Class Groups M86 Security’s filtering library currently consists of 104 library filtering categories, each placed in one of the 20 filtering category groups defined in the interface: Adult Content, Bandwidth, Business/Investments, Community/Organizations, Educa- tion, Entertainment, Government/Law/Politics, Health/Fitness, Illegal/Question- able, Information Technology, Internet Communication, Internet Productivity, Internet/Intranet Misc., News/Reports, Religion/Beliefs, Security, Shopping,...
  • Page 65: Threats/Liabilities

    ILTERING RACTICES HREAT LASS ROUPS I. Threats/Liabilities A. Category block Block categories that threaten your network/organization. In pertinent profiles, block access to the Security category group and other categories containing content that threaten your organization. To block categories in a profile, go to: •...
  • Page 66: Custom Lock, Block, Warn, X Strikes, Quota

    ILTERING RACTICES HREAT LASS ROUPS D. Custom Lock, Block, Warn, X Strikes, Quota pages Customize a lock, block, warning, X Strikes, or quota page. Modify page contents to point to a URL within your organization, send a request to your admin- istrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
  • Page 67: Custom Category (Blocked)

    ILTERING RACTICES HREAT LASS ROUPS G. Custom Category (blocked) Add a category to block content that could endanger your network/organiza- tion. Create a custom category with contents tailored to safeguard your organiza- tion. Block this category in appropriate profiles. To set up a custom category and block it, go to: •...
  • Page 68: Exception Url Bypass

    ILTERING RACTICES HREAT LASS ROUPS J. Exception URL bypass Use exception URLs to grant users access to URLs blocked at the root. To grant users access to globally-blocked URLs, enable the exception URL bypass option in the Minimum Filtering Level. For these users, add the exception URLs in their profiles.
  • Page 69: Bandwidth/Productivity

    ILTERING RACTICES HREAT LASS ROUPS II. Bandwidth/Productivity A. Time Quota/Hit Quota Limit time spent in PASSED categories to prevent excessive bandwidth usage and increase productivity. Enable the Quota Settings feature, and configure the Seconds Per Hit. Set up pertinent categories in the user’s profile with quotas so the user is notified and then locked out of those categories after all minutes in the quota have been used.
  • Page 70: Warn Option With Low Filter Settings

    ILTERING RACTICES HREAT LASS ROUPS D. Warn option with low filter settings Warn users before they access unacceptable content that their Internet activities are logged. Set HTTPS filtering at the “low” level, and then configure the number of minutes for the interval the warning page will re-display for any user who attempts to access content deemed unacceptable.
  • Page 71: Im Patterns

    ILTERING RACTICES HREAT LASS ROUPS G. IM patterns Block IM services. Enable Pattern Blocking for all users. In the profile, block Internet Communication > Chat and Instant Messaging (IM) categories. To block IM services, go to: • SYSTEM: System > Control > Filter window •...
  • Page 72: Remote Access Patterns

    ILTERING RACTICES HREAT LASS ROUPS J. Remote Access patterns Block remote access patterns. Enable Pattern Blocking for all users. In the profile, block Internet Productivity > Remote Access category. To block remote access patterns, go to: • SYSTEM: System > Control > Filter window •...
  • Page 73: Rule Block

    ILTERING RACTICES HREAT LASS ROUPS M. Rule block Use a rule to block the Bandwidth category. Create a rule that blocks the Band- width category and apply this rule to pertinent profiles. To create and block a rule for the Bandwidth category, go to: •...
  • Page 74: Custom Block/Warn/X Strikes/Quota

    ILTERING RACTICES HREAT LASS ROUPS P. Custom Block/Warn/X Strikes/Quota pages Customize a block, warning, X Strikes, or quota pages. Modify page contents to point to a URL within your organization, send a request to your administrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
  • Page 75: Warn-Strike With Higher Thresholds

    ILTERING RACTICES HREAT LASS ROUPS B. Warn-strike with higher thresholds Warn users before they access unacceptable content and may be locked out of the Internet. Set HTTPS filtering at the “high” level, configure Warning settings, and enable X Strikes Blocking. In the end user’s profile, set the Warn categories, and enable X Strikes Blocking.
  • Page 76: Overall Quota

    ILTERING RACTICES HREAT LASS ROUPS E. Overall Quota Restrict all quota time in a profile to improve productivity. Cap the amount of time a user spends in all quota-marked categories by enabling the Overall Quota option and specifying the number of minutes the end user can visit quota-marked categories before being notified and then locked out of these categories.
  • Page 77: Custom Block/Warn/X Strikes/Quota

    ILTERING RACTICES HREAT LASS ROUPS H. Custom Block/Warn/X Strikes/Quota pages Customize a block, warning, X Strikes, or quota pages. Modify page contents to point to a URL within your organization, send a request to your administrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
  • Page 78: Ip Exceptions

    ILTERING RACTICES HREAT LASS ROUPS C. IP exceptions Use Exception URLs to grant individuals access to IPs blocked by the Minimum Filtering Level. Enable the option to bypass the Minimum Filtering Level using exception URLs. Enter the exception Internet/intranet IP addresses in the applicable profile.
  • Page 79: Best Reporting Practices

    EPORTING RACTICES HREAT LASS ROUPS EPORTING RACTICES Now that the ER is installed on the network and you have successfully logged into the client, you are ready to generate reports. This section provides an overview on using tools to produce reports that identify potential violators of your acceptable Internet usage policy, so you can take effective action.
  • Page 80: Reporting Scenarios

    EPORTING RACTICES EPORTING CENARIOS Reporting Scenarios This collection of reporting scenarios is designed to help you use the client to create typical snapshots of end user Internet activity. Each scenario is followed by client setup information. Please consult the “How to” section in the index of the ER Web Client User Guide for pages containing detailed, step-by-step instructions on configuring and/or using the tools and features described in that scenario.
  • Page 81: Step B: Further Investigate Using A Summary Drill Down Report

    EPORTING RACTICES EPORTING CENARIOS Step B: Further investigate using a Summary Drill Down Report Now you will use a Drill Down Report to find out which user(s) are visiting sites in the category you’ve targeted for investigation. From the top panel, go to Drill Down Reports > Categories to display the gener- ated Summary Drill Down Report view, ranking categories in order by the most visited: Note that this drill down report view has been generated for today’s activity by...
  • Page 82: Step D: Create A Double-Break Report With Two Sets Of Criteria

    EPORTING RACTICES EPORTING CENARIOS 3. Click Apply to accept your selection and to close the window. The regenerated report now displays yesterday’s data in the Summary Drill Down Report view. In the ER Web Client User Guide index, see: • How to: create a New Report from the current report view Step D: Create a double-break report with two sets of criteria 1.
  • Page 83: Step E: Create A Detail Drill Down Report To Obtain A List Of Urls

    EPORTING RACTICES EPORTING CENARIOS Step E: Create a Detail Drill Down Report to obtain a list of URLs 1. To investigate the activity of a specific user listed in the current Summary Drill Down Report view, select that user’s record and then click the down arrow in the Page Count column at the far right to show results in the Detail Drill Down Report view that now displays: Note that the Detail Drill Down Report view contains columns of information...
  • Page 84: Double-Break Report And Export Report Exercise

    EPORTING RACTICES EPORTING CENARIOS II. Double-break Report and Export Report exercise In this exercise you will learn how to display only the top 10 records of a summary drill down double-break report view, export that report view in the .PDF output format, and then view the results of the generated .PDF file.
  • Page 85: Step B: Modify The Report View To Only Display Top 10 Site Records

    EPORTING RACTICES EPORTING CENARIOS In the ER Web Client User Guide index, see: • How to: generate a Drill Down Report • How to: use filter columns and buttons Step B: Modify the report view to only display top 10 site records 1.
  • Page 86: Step C: Export The Report View In The .Pdf Output Format

    EPORTING RACTICES EPORTING CENARIOS Step C: Export the report view in the .PDF output format 1. To export the current report view in the .PDF format, at the top of the report view click Export Report to open the Export Drill Down Report window: By default, “PDF”...
  • Page 87 EPORTING RACTICES EPORTING CENARIOS In the ER Web Client User Guide index, see: • How to: export a summary Drill Down Report • How to: view and print a Web Client report See also: • How to: export a detail Custom Report •...
  • Page 88: Save And Schedule A Report Exercise

    EPORTING RACTICES EPORTING CENARIOS III. Save and schedule a report exercise In this exercise you will learn how to save a report view and then create a schedule for running a report on a regular basis using criteria specified for that report. While a Summary Drill Down Report is used in this exercise, these steps also apply to a Detail Drill Down Report.
  • Page 89: Step B. Schedule A Recurring Time For The Report To Run

    EPORTING RACTICES EPORTING CENARIOS NOTE: Saved reports can be edited at any time. These reports are accessed by going to Custom Reports, selecting Saved Custom Reports, and then choosing the report from the Report Name drop-down menu. In the ER Web Client User Guide index, see: •...
  • Page 90: Create A Custom Category Group And Generate Reports

    EPORTING RACTICES EPORTING CENARIOS In the ER Web Client User Guide index, see: • How to: schedule a report to run You have now learned how to save a report and schedule a recurring event for running this report. Reports created for a variety of purposes can be scheduled to run on different dates and times to capture records of specified user activity as necessary.
  • Page 91: Step B: Run A Report For A Specified Category Group

    EPORTING RACTICES EPORTING CENARIOS Step B: Run a report for a specified category group 1. To create a report for category group, choose Custom Reports from the top panel. 2. Select Custom Report Wizard. 3. Specify the type of report to be generated: •...
  • Page 92: Step B: Generate A Report For A Custom User Group

    EPORTING RACTICES EPORTING CENARIOS Step B: Generate a report for a custom user group Once the custom user group is recognized by the ER (on the following day), reports can be generated. Summary Report There are two ways to generate a summary report for a custom user group. You can use the Custom Report Wizard option (from Custom Reports), or you can use the Single User Group Drill Down Report option (from Drill Down Reports).
  • Page 93: Important Information About Using The Er In The Evaluation Mode

    MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION VALUATION MPORTANT NFORMATION ABOUT USING THE VALUATION When evaluating the ER and using this product in the evaluation mode, the Expi- ration screen in the Administrator console and the ER Server Statistics window in the client will display and function differently than they do in the activated (stan- dard) mode of the ER (described in the M86 Enterprise Reporter Administrator User Guide and ER Web Client User Guide).
  • Page 94: Er Web Client, Er Server Information Window

    ER W , ER S MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION LIENT ERVER NFORMATION INDOW ER Web Client, ER Server Information Window In the ER Server Information window, the note “*Evaluation Mode Enabled” displays above the ER Activity frame. To the right of this note, the Server Info button displays.
  • Page 95: Led Indicators And Buttons

    LED I NDICATORS AND UTTONS LED I NDICATORS AND UTTONS Diagrams and Descriptions LED indicators and buttons for hardware status monitoring display on the front panel, located on the right side of the chassis (see diagram below). LED Indicator Key Button Key A = Power F = Reset...
  • Page 96: Regulatory Specifications And Disclaimers

    Operation of this equipment in a residential area is likely to cause harmful interfer- ence in which case the user will be required to correct the interference at his own expense. FCC Declaration of Conformity Model: MSA-002-003 M86 S ECURITY NSTALLATION...
  • Page 97: Electromagnetic Compatibility Class A Notice

    EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER Electromagnetic Compatibility Class A Notice Industry Canada Equipment Standard for Digital Equipment (ICES-003) Bureau of Standards Metrology and Inspection (BSMI) - Taiwan M86 S ECURITY NSTALLATION UIDE...
  • Page 98: Ec Declaration Of Conformity

    EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EC Declaration of Conformity European Community Directives Requirement (CE) M86 S ECURITY NSTALLATION UIDE...
  • Page 99: Appendix : Console Setup Procedures

    PPENDIX ONSOLE ETUP ROCEDURES RELIMINARY ETUP PPENDIX ONSOLE ETUP ROCEDURES The steps in this appendix provide an alternative way to install the IR on your network, by using a crossover cable and configuring the application via the user interface. Preliminary Setup Create a “setup workstation”...
  • Page 100: Link The Workstation To The Ir

    D. Power on the server by lowering the bezel and pressing the large button at the right of the front panel: Diagram of MSA chassis front panel, power button at far right The Boot Up Process The boot-up process may take 5 - 10 minutes. When the drive light remains off for 30 seconds, the system is booted up.
  • Page 101: Security Certificate Acceptance Procedures

    PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES Security Certificate Acceptance Procedures A. From the setup workstation, launch an Internet supported browser such as Firefox 3.6, Internet Explorer 7 or 8, or Safari 4.0. B. Type in https://1.2.3.4:1443 in the address field. C.
  • Page 102 PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES C. In the Add Security Exception window, click Get Certificate and wait a few seconds until the security certificate is obtained by the server. D. With the checkbox Permanently store this exception selected, click Confirm Security Exception to open the Welcome window of the IR user interface: NOTE: You will need to add a security exception for the Web Filter, Enterprise Reporter (Web Client), and Enterprise Reporter Administration Module when you attempt to access...
  • Page 103: Temporarily Accept The Security Certificate In Ie

    PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES Temporarily Accept the Security Certificate in IE If using an IE browser, in the page “There is a problem with this website's security certificate.”, click Continue to this website (not recommended): Selecting this option displays the IR splash page with the address field and the Certificate Error button to the right of the field shaded a reddish color: M86 S ECURITY...
  • Page 104: Accept The Security Certificate In Safari

    PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES Accept the Security Certificate in Safari A. If using a Safari browser, the window explaining "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
  • Page 105: Network Setup

    PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP Network Setup For this step, you will need your network administrator to provide you the host name, gateway address, and two unused IP addresses. You will first configure the Web Filter server. Later you will configure the ER server. Access the Web Filter Administrator Console A.
  • Page 106: Network

    PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP Network Click the System link at the top of the screen to go to the System section of the console: In this section of the console you will: • Specify the operation mode the Web Filter will use for filtering the network, listening to traffic, and sending traffic •...
  • Page 107: Network: Operation Mode

    PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP Network: Operation Mode From the navigation panel at the left of the screen, click Mode and choose Opera- tion Mode from the menu: Make the following entries in the Operation Mode window: A. In the Mode frame, select the operational mode the Web Filter will use for filtering: Invisible, Router, Firewall, Mobile, or ICAP.
  • Page 108: Network: Lan Settings

    FILTER.myserver.com (the NetBIOS name must be capitalized). It is important to enter something identifiable, because once the product is registered, this host name is used by M86 Security to recognize your account for library updates. This name needs to be a valid DNS entry.
  • Page 109: Network: Ntp Servers

    PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP F. Enter the Gateway IP address for the default router or firewall that is the main gateway for the entire network. The Web Filter will use this IP address to communicate outside the network. WARNING: Be sure to take note of the LAN 1 and LAN 2 IP addresses and host name you assigned to the Web Filter.
  • Page 110: Network: Regional Setting

    PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP the tertiary server will be used. Network: Regional Setting From the navigation panel, click Network and choose Regional Setting from the menu: Make the following selections in the Regional Setting window: A. At the Region pull-down menu, select your country from the available choices. B.
  • Page 111: Physically Connect The Ir To The Network

    Internet traffic you wish to filter. E. Repeat sub-steps B and C for the IR’s LAN 2 port. Portion of MSA chassis rear F. Wait until the reboot process has completed, indicated by the drive light staying off for 30 seconds.
  • Page 112: Test The Ir Console Connection

    • Did you restart the IR after changing the network settings? • Do you have both LAN ports connected to your network hub? • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. D. Once you are able to access the IR splash page, proceed to Step 2: Log in Web Filter, Generate SSL Certificate from the Install the Server portion of this Instal- lation Guide.
  • Page 113: Index

    NDEX Add to Event Schedule 83 Always Allow Custom Category 71 Bandwidth/Productivity 63 Boot Up 94 BSMI 90 Category block 59 Change Quick Start password 25 Change User Name and Password 52 crossover cable 4 Custom Block/Warn/X Strikes/Quota pages 68 Custom Category (blocked) 61 custom category group 73 Custom Lock, Block, Warn, X Strikes, Quota pages 60...
  • Page 114 IP exceptions 72 Local category adds/deletes 70 Login screen 24 LVD 90 Minimum Filtering Level 61 Mobile Client 101 Modify Report 79 MSA 20 New Report 75 Overall Quota 63 Overheat 89 Override Account bypass 61 Override Accounts 72 P2P patterns 64...
  • Page 115 NDEX Save Report 82 SE Keywords 67 Search Engine Keywords 60 serial port cable 19 shut down 30 Streaming Media patterns 65 Summary Drill Down Report 75 Threats/Liabilities 59 Time Based Profiles 63 Time Quota/Hit Quota 63 UL 90 URL exceptions 71 URL Keywords 60 Warn Feature with higher thresholds 68 Warn option with low filter settings 64...
  • Page 116 NDEX M86 S ECURITY NSTALLATION UIDE...
  • Page 118 M86 Security Corporate Headquarters (USA): 8845 Irvine Center Drive, CA 92618 • Tel: 949.932.1000 or 888.786.7999 Fax: 949.932.1086...

Table of Contents