Page 3
8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the exam- ples herein.
Page 9
Remove a Segment from the Network ... 212 Add a Rule ... 214 Modify a Rule ... 216 Copy a Rule ... 216 Remove a Rule ... 217 Create, Edit a List of Selected Categories... 219 Create, Edit a List of Service Ports... 222 Default Redirect URL ...
Page 10
ONTENTS NNTP Newsgroup window ... 272 Chapter 4: Reporting screen ... 290 Report Configuration window ... 291 Real Time Probe window ... 297 Add a Newsgroup to the Library... 272 View Library Details ... 276 Add a URL to the Library Category... 279 Reload the Library ...
Page 11
ROUP DMINISTRATOR Introduction ... 311 Chapter 1: Group screen ... 312 IP ... 313 Refresh ... 313 Refresh the Master IP Group, Member ... 313 Change the Group Administrator Password... 315 Add the IP Address of the Member ... 316 Remove a Member from the Group ...
Page 13
Emergency Update ... 407 Appendix C ... 408 Create a Custom Block Page ... 408 Part I: Modify the ProxyBlocker ... 408 1. Enable block page redirection... 408 Option 1: Modify the back end ... 408 2. Exclude filtering <server for block page> IP... 409 Part II: Customize the Block Page ...
Page 14
Set up Pop-up Blocking ... 429 Temporarily Disable Pop-up Blocking ... 430 Appendix E ... 434 Configure ProxyBlocker for ER Reporting ... 434 Entries in the ProxyBlocker Admin console ... 434 Appendix F ... 437 RAID Maintenance ... 437 Part 1: Hardware Components ... 437 Part 2: Server Interface ...
The 8e6 ProxyBlocker User Guide primarily addresses the network administrator designated to configure and manage the 8e6 ProxyBlocker server on the network. This adminis- trator is referred to as the “global administrator” throughout this user guide. In part, this user guide also addresses administrators who manage user groups on the network.
Page 16
ProxyBlocker for use on the network. information for administrators authorized by the global administrator to manage profiles of designated groups and their associated users on the 8e6 ProxyBlocker. Group administrators also have rights to access certain library category functions.
NTRODUCTORY ECTION OW TO SE THIS UIDE How to Use this User Guide Conventions The following icons are used throughout this user guide: NOTE: The “note” icon is followed by italicized text providing additional information about the current subject. TIP: The “tip” icon is followed by italicized text giving you hints on how to execute a task more efficiently.
NTRODUCTORY ECTION OW TO Terminology The following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box • button - an object in a dialog box, •...
Page 19
entry, or displays pertinent information. A text box is a type of field. • frame - a boxed-in area in a dialog box, window, or screen that includes a group of objects such as fields, text boxes, list boxes, buttons, radio buttons, check- boxes, and/or tables.
Page 20
NTRODUCTORY ECTION OW TO • pop-up box or pop-up • pull-down menu - a field in a • radio button - a small, circular object • screen - a main SE THIS UIDE window - a box or window that opens after you click a button in a dialog box, window, or screen.
Page 21
• sub-topic - a subset of a main topic that displays as a menu item for the topic. The menu of sub-topics opens when a perti- nent topic link in the left panel—the navigation panel—of a screen is clicked. If a sub-topic is selected, the window for that sub-topic displays in the right panel of the screen, or a pop-up window or an alert box opens, as appro- priate.
Page 22
NTRODUCTORY ECTION OW TO • tree - a tree displays in the naviga- • window - a window SE THIS UIDE tion panel of a screen, and is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign when the branch is collapsed.
To help you become familiar with the ProxyBlocker and how it functions on the network, Chapter 1 of this section of the User Guide provides an overview on filtering. Chapter 2 gives insight into Web site access logging, and instant messaging and peer-to-peer setup procedures.
• JavaScript enabled • Java Virtual Machine • Java Plug-in (use the version specified for the Proxy- NOTE: 8e6 ProxyBlocker administrators must be set up with soft- ware installation privileges in order to install Java used for accessing the interface.
PERATIONS Chapter 1: Filtering Operations Invisible Mode The ProxyBlocker is set up in the invisible mode, indicating that the unit will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment. The unit will only intercept a session if an inappropriate request was submitted by a client.
Page 26
Blocker determines to block the user’s request, a block message (4) is sent to the user plus a terminate message (4) is sent to the Internet server. In the invisible mode, the ProxyBlocker performs as a stan- dalone server that can be connected to any network envi- ronment.
After the operational filtering mode is configured on the ProxyBlocker, the group type(s) that will be used on the ProxyBlocker must be set up so that filtering can take place. In the Group section of the Administrator console, group types are structured in a tree format in the navigation panel.
Page 28
NTRODUCTORY ECTION HAPTER IP Groups The IP group type is represented in the tree by the IP icon and/or individual IP members The global administrator adds master IP groups, adds and maintains override accounts at the global level, and estab- lishes and maintains the minimum filtering level.
• time profile - used by a sub-group/individual IP group member at a specified time. Other filtering profiles • authentication profile - used by NT and/or LDAP group members. NOTE: For information about authentication filtering profiles, see the 8e6 ProxyBlocker Authentication User Guide. ECHNOLOGIES ROXY LOCKER NTRODUCTORY ECTION...
NTRODUCTORY ECTION HAPTER • override account profile - set up in either the global • lock profile - set up under X Strikes Blocking in the Filter Static Filtering Profiles Static filtering profiles are based on fixed IP addresses and include profiles for master IP groups and their members.
Active filtering profiles include the global group profile, over- ride account profile, time profile, and lock profile. NOTE: For information about authentication filtering profiles, see the 8e6 ProxyBlocker Authentication User Guide. Global Filtering Profile The global filtering profile is created by the global adminis- trator.
NTRODUCTORY ECTION HAPTER Filtering Profile Components Filtering profiles are comprised of the following compo- nents: • library categories - used when creating a rule, minimum • service ports - used when setting up filter segments on • rules - specify which library categories should be •...
Library Categories A library category contains a list of Web site addresses and keywords for search engines and URLs that have been set up to be blocked or white listed. Library categories are used when creating a rule, the minimum filtering level, or a filtering profile.
Service ports are used when setting up filter segments on the network (the range of IP addresses/netmasks to be detected by the ProxyBlocker), the global (default) filtering profile, and the minimum filtering level. When setting up the range of IP addresses/netmasks to be detected, service ports can be set up to be open (ignored).
NOTE: If the minimum filtering level is not set up, global (default) filtering settings will apply instead. If an override account is established at the IP group level for a member of a master IP group, filtering settings made for that end user will override the minimum filtering level if the global administrator sets the option to allow the minimum filtering level to be bypassed.
NTRODUCTORY ECTION HAPTER • ignore - if the filter segment detected on the network has Filtering Rules Filtering Levels Applied 1. The global (default) filtering profile applies to any user 2. If the minimum filtering level is defined, it applies to all 3.
Page 37
7. An override account profile takes precedence over an authentication profile. This account may override the minimum filtering level—if the override account was set up in the master IP group tree, and the global adminis- trator allows override accounts to bypass the minimum filtering level, or if the override account was set up in the global group tree.
Chapter 2: Logging and Blocking Web Access Logging One of the primary functions of the ProxyBlocker is to log the activity of users on the Internet. Information captured in the log can be transferred to a reporting appliance, to be viewed on a PC monitor or output to a printer.
When the IM module is loaded on the server, the Proxy- Blocker compares packets on the network with IM libraries stored on the ProxyBlocker server. If a match is found, the ProxyBlocker checks the user’s profile to see whether the user’s connection to the IM service should be blocked, and...
When the P2P module is loaded on the server, the Proxy- Blocker compares packets on the network with the P2P library stored on the ProxyBlocker server. If a match is found, the ProxyBlocker checks the user’s profile to see whether the user’s connection to the P2P service should be blocked, and then performs the appropriate action.
NTRODUCTORY ECTION HAPTER Using IM and P2P To solely log IM and/or P2P user activity, the Pattern Blocking setting needs to be enabled in the Filter window. To additionally block specified groups and/or users from using components and features of IM and/or P2P, settings need to be made in the Group section of the Administrator console.
Block P2P for All Users To block P2P for all users on the network: • the Pattern Blocking option in the Filter window must be activated • the global filtering profile must have the PR2PR library category set up to be blocked •...
NTRODUCTORY ECTION HAPTER Block P2P for a Specific Entity To block P2P for a specified group or user: • the Pattern Blocking option in the Filter window must be • the PR2PR library category must be set up to be blocked •...
IP address on your network. NOTE: If you do not have the ProxyBlocker Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you.
NTRODUCTORY ECTION HAPTER NOTE: The ProxyBlocker Introductory Window must be left open throughout your session. This window displays minimized when the Login dialog box opens. 4. When the Login dialog box opens, enter your Username TIP: The default Username is admin and the Password is user3.
Page 47
NOTE: See Chapter 1: System screen in the Global Administrator Section for information on logging into the ProxyBlocker interface if your password has expired. 5. Click OK to close the login dialog box and to access the welcome screen of the Administrator console: Fig.
ECTION HAPTER Last Library Update message If it has been more than seven days since the ProxyBlocker last received updates to library categories, upon logging into the Administrator console a pop-up dialog box opens and displays the following message: ”Libraries were last updated more than 7 days ago.
Page 49
3: G NTRODUCTORY ECTION HAPTER ETTING TARTED , Last Library Update text Fig. 1:3-4 Welcome screen Click the checkbox “Do not show “Old Library Warning” dialog box in future” to disable the Last Library Update message pop-up box. After the libraries are updated, the welcome screen will appear as in Fig.
NTRODUCTORY ECTION HAPTER Navigation Tips Access Main Sections The Administrator console is organized into six sections, each accessible by clicking the corresponding button in the navigational bar at the top of the screen: • Home - clicking this button displays the welcome screen •...
Page 51
3: G NTRODUCTORY ECTION HAPTER ETTING TARTED • Help - clicking this button displays the Help screen. This screen includes navigational tips and a link to the PDF copy of this User Guide: Fig. 1:3-5 Help screen ECHNOLOGIES ROXY LOCKER UIDE...
NTRODUCTORY ECTION HAPTER Help Features Help features provide information about how to use windows in the Administrator console. Such features include help topics and tooltips. Access Help Topics Each of the main section screens contains a link beneath the banner. When that link is clicked, a separate browser window opens with Help Topics for that section: Fig.
Page 53
Tooltips In any window that features the icon, additional information about that window can be obtained by hovering over that icon with your mouse, or by pressing the F1 key on your keyboard. • Hover Display The yellow tooltip box displays when you hover over the icon with your mouse: Fig.
NTRODUCTORY ECTION HAPTER • Help pop-up box Screen and Window Navigation All screens are divided into two panels: a navigation panel to the left, and a window in the panel to the right. Windows display in response to a selection made in the navigation panel.
3: G NTRODUCTORY ECTION HAPTER ETTING TARTED Topic Links In System, Library, and Reporting screens, the navigation panel contains topic links. By clicking a topic link, the window for that topic displays in the right panel: Fig. 1:3-9 Selected topic and its corresponding window ECHNOLOGIES ROXY LOCKER...
NTRODUCTORY ECTION HAPTER Select Sub-topics Some topics in System and Library screens consist of more than one window. For these topics, clicking a topic link opens a menu of sub-topics: Fig. 1:3-10 Sub-topics menu When a sub-topic from this menu is selected, the window for that sub-topic displays in the right panel of the screen.
3: G NTRODUCTORY ECTION HAPTER ETTING TARTED Navigate a Tree List Tree lists are included in the navigation panel of Group and Library screens. Fig. 1:3-11 Tree menu A tree is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign, when that branch of the tree is collapsed.
NTRODUCTORY ECTION HAPTER Tree List Topics and Sub-topics Group and Library tree lists possess a menu of topics and sub-topics. Topics in the tree list display by default when the tree is opened. Examples of tree list topics are circled in Fig. 1:4- When a tree list topic is selected and clicked, a menu of sub- topics opens: Fig.
3: G NTRODUCTORY ECTION HAPTER ETTING TARTED Navigate a Window with Tabs In each section of the console, there are windows with tabs. When selecting a window with tabs from the navigation panel, the main tab for that window displays. Entries made in a tab must be saved on that tab, if the tab includes the Apply button.
NTRODUCTORY ECTION HAPTER Console Tips and Shortcuts The following list of tips and shortcuts is provided to help you use windows in the Administrator console with greater efficiency. Navigation Path The navigation path displays at the top of each window: Fig.
Press F5 on your keyboard to refresh the Administrator console. This feature is useful in the event that more than one browser window is open simultaneously for the same ProxyBlocker server. Select Multiple Items When moving several items from one list box to another, or when deleting several items, the Ctrl and Shift keys can be used to expedite this task.
NTRODUCTORY ECTION HAPTER Calculate IP Ranges without Overlaps The Calculator button displays on windows in which IP ranges are entered. These windows include: Block Page Route Table window from the System section, and Range to Detect and Members windows from the Group section. Fig.
Fig. 1:3-16 Quit dialog box 2. Click Yes to close the Administrator console. 3. Click the “X” in the upper right corner of the ProxyBlocker Introductory Window to close it. WARNING: If you need to turn off the server, see the ShutDown window of the System screen in the Global Administrator Section.
Administrator console. This section is used by the autho- rized global administrator of the ProxyBlocker for config- uring and maintaining the ProxyBlocker server. The global administrator is responsible for integrating the...
Control settings, Network settings, Administrator account information, Secure Logon, Diagnostics, Alert contacts, Patch, operation Mode, Authentication settings (see the 8e6 ProxyBlocker Authentication User Guide for information about this topic), NIC Mode, Backup/Restore operations, Reset settings, SNMP, Hardware Failure Detec- tion, X Strikes Blocking, Warn Option Setting, Customiza- tion, and Quota Setting.
Page 66
LOBAL DMINISTRATOR ECTION Click your selection to choose a main topic from this list, or to view a menu of sub-topics, if applicable. When a topic or sub-topic is selected, the designated window for that topic or sub-topic displays in the right panel. 1: S HAPTER YSTEM SCREEN...
Page 67
LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Control Control includes options for controlling basic ProxyBlocker server functions. Click the Control link to view a menu of sub-topics: Filter, Block Page Authentication, ShutDown, and Reboot. Fig. 2:1-2 System screen, Control menu ECHNOLOGIES...
LOBAL DMINISTRATOR ECTION Filter window The Filter window displays when Filter is selected from the Control menu. This window is used for specifying network filtering preferences on this server. Fig. 2:1-3 Filter window Local Filtering is used for specifying whether this server being configured will filter traffic on the network.
The default setting has Local Filtering “On” and VLAN Detection “Off”. Disable Local Filtering Options If you have multiple ProxyBlocker servers on the network, you may wish to disable local filtering on the source server and use the server primarily for authenticating users who log on the network.
LOBAL DMINISTRATOR ECTION HTTP Filtering In the HTTP Filtering frame, enable or disable the feature that automatically detects a split HTTP packet. Enable HTTP Packet Splitting Detection By default, the feature that automatically detects a split HTTP packet is disabled. 1.
Page 71
Specify your preference for filtering HTTPS sites in the HTTPS Filtering frame. Select from the following settings for the HTTPS Filtering Level: • “None” - if you do not want the ProxyBlocker to filter HTTPS sites • “Low” - if you want the ProxyBlocker to filter HTTPS sites...
LOBAL DMINISTRATOR ECTION NOTE: After making all entries in this window, click Apply. Service Control In the Service Control frame, indicate whether or not Pattern Blocking with be enabled or disabled. Enable Pattern Blocking By default, Pattern Blocking is disabled. Click “On” to block the usage of clients such as Google Web Accelerator and various proxy pattern types on end user workstations that bypass filtering, and to log IM and P2P activity of end users...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Disable Pattern Blocking Click “Off” to disable Pattern Blocking. NOTE: After making all entries in this window, click Apply. ECHNOLOGIES ROXY LOCKER UIDE...
The Block Page Authentication window displays when Block Page Authentication is selected from the Control menu. This feature is used for entering criteria the ProxyBlocker server will use when validating a user’s account. Information entered/selected in this window is used by the block page that displays when an end user attempts to access a site or service that is set up to be blocked.
Page 75
IP group level. NOTE: Details about the Web-based Authentication option can be found in the 8e6 ProxyBlocker Authentication User Guide. TIP: Multiple options can be selected by clicking each option while pressing the Ctrl key on your keyboard.
Page 76
Logon Script Path field, \\PDCSHARE\scripts displays by default. In this field, enter the path of the logon script that the ProxyBlocker will use when re-authenticating users on the network, in the event that a user's machine loses its connection with the server, or if the server is rebooted.
Block page When a user attempts to access Internet content set up to be blocked, the block page displays on the user’s screen: Fig. 2:1-5 Sample Block Page By default, the following data displays in the User/Machine frame of the block page: •...
Page 78
By default, the following standard links are included in the block page: • HELP - Clicking this link takes the user to 8e6’s Technical • 8e6 Technologies - Clicking this link takes the user to By default, these links are included in the block page under the following conditions: •...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Options page The Options page displays when the user clicks the following link in the block page: For further options, click here. Fig. 2:1-6 Options page The following items previously described for the Block page display in the upper half of the Options page: •...
LOBAL DMINISTRATOR ECTION NOTE: Information about Option 1 is included in the 8e6 Proxy- Blocker Authentication User Guide. Option 2 The following phrase/link displays, based on options selected at the Re-authentication Options field: • Re-start your system and re-login - This phrase •...
Page 81
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Option 3 Option 3 is included in the Options page, if “Override Account” was selected at the Re-authentication Options field. This option is used by any user who has an override account set up for him/her by the global group administrator or the group administrator.
Control menu. This window is used for powering off the server. Fig. 2:1-9 ShutDown window Shut Down the Server In the ShutDown frame, click ShutDown to power off the server. To restart the server, the ProxyBlocker console needs to be re-accessed. 1: S HAPTER YSTEM SCREEN...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Reboot window The Reboot window displays when Reboot is selected from the Control menu. This window is used for reconnecting the server on the network. Fig. 2:1-10 Reboot window ECHNOLOGIES ROXY LOCKER UIDE...
Server Status message box, informing you that the server is now disconnected: Fig. 2:1-12 Server Status: disconnect message When the Server Status box closes, the ProxyBlocker status message box opens and informs you that the server is rebooting itself, and how much time has elapsed since this process began: Fig.
Page 85
Fig. 2:1-15 Server connected alert box 3. Click OK to close the ProxyBlocker ready alert box. 4. Click OK to close the Server connected alert box. 5. You must now re-access the ProxyBlocker console.
Page 86
LOBAL DMINISTRATOR ECTION Network Network includes options for configuring the ProxyBlocker server on the network. Click the Network link to view a menu of sub-topics: LAN Settings, NTP Servers, Regional Setting, and Block Page Route Table. Fig. 2:1-16 System screen, Network menu...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu. This window is used for configuring network connection settings for the Proxy- Blocker. Fig. 2:1-17 LAN Settings window ECHNOLOGIES ROXY LOCKER...
LOBAL DMINISTRATOR ECTION Specify LAN Settings 1. In the Host Name field, enter up to 50 alphanumeric 2. Specify the following information, as necessary: TIP: Be sure to place the LAN1 and LAN2 IP addresses in different subnets. 3. Click Apply to apply your settings. NOTE: Whenever modifications are made in this window, the server must be restarted in order for the changes to take effect.
Protocol (NTP) software. NTP is a time synchronization system for computer clocks throughout the Internet. The ProxyBlocker will use the actual time from a clock at a spec- ified IP address. NOTE: The System Time displays beneath the Details frame, using the YYYY/MM/DD HH:MM:SS Coordinated Universal Time (UTC) format for the current time zone.
128.59.35.142, 142.3.100.15, and 129.132.98.11. NOTE: Any IP address following the first entry in the Servers list box is only used in the event that the ProxyBlocker cannot access the primary time NTP server specified. IP addresses are used in the order in which they display in the list box.
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Regional Setting window The Regional Setting window displays when Regional Setting is selected from the Network menu. This window is used for specifying the time zone to be used by the Proxy- Blocker and the language set type, if necessary.
3. Click Apply to apply your settings, and to reboot the WARNING: If using the ProxyBlocker with an 8e6 Technologies Enterprise Reporter unit, be sure each ProxyBlocker used by the ER is set up in the same time zone as the ER. These “like”...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Block Page Route Table window The Block Page Route Table window displays when Block Page Route Table is selected from the Network menu. This window is used for building and maintaining a list of destina- tion based routers the server will use for communicating with other segments of the network.
LOBAL DMINISTRATOR ECTION Add a Router In the Route Table frame: 1. Enter the IP address. 2. Select the network subnet Mask from the pull-down 3. In the Gateway field, enter the IP address of the portal to TIP: Click Calculator to open the IP Calculator pop-up window. Use this calculator to calculate IP ranges without any overlaps.
Group Administrator Section for information on setting up and maintaining accounts for IP group administrators. See the 8e6 ProxyBlocker Authentication User Guide for more information on setting up and maintaining NT and LDAP Sub Admin group administrator accounts.
TIP: The default Username is admin and the Password is user3. 8e6 recommends that you retain this default account and pass- word in the event that the ProxyBlocker unit cannot be accessed. An authorized 8e6 Technologies technical representative may need to use this username and password when troubleshooting the unit.
Edit an Administrator Account To change an administrator’s password and/or account type: 1. Select the username from the Current User list box; this action populates the Account Details frame with data. 2. In the Password field, enter eight to 20 characters for a new password—including at least one alpha character, one numeric character, and one special character.
Secure Logon includes options for setting user passwords to expire after a designated number of days, and/or locking out users from the ProxyBlocker after unsuccessfully attempting to log in for the specified number of attempts within the defined timespan. Click the Secure Logon link to view a menu of sub-topics: Logon Settings, and Logon Management.
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Logon Settings window The Logon Settings window displays when Logon Settings is selected from the Secure Logon menu. This window is used for enabling the password expiration feature that lets you define the number of days a password will be valid before a new password must be used.
OK, a different login dialog box opens: Fig. 2:1-24 New password entry This dialog box displays his/her Username and prompts him/her to enter a new password in the Password and Confirm Password fields. Upon clicking OK, the ProxyBlocker interface opens. 1: S HAPTER YSTEM SCREEN Expired) expire.
Lockout by IP address option(s) enabled— enter the number of times a user can enter an incorrect password during the interval defined in the Failed Password Attempts Timespan (in minutes) [1-1440] field before being locked out of the ProxyBlocker. ECHNOLOGIES ROXY LOCKER...
Page 102
Allowable Number of Failed Password Attempts [1-10] field—before being locked out of the ProxyBlocker. ECHNOLOGIES ROXY LOCKER UIDE...
Proxy- Blocker interface—and for unlocking usernames and IPs currently locked out of the ProxyBlocker. If the user account is a global (Admin) or NT/LDAP group administrator (Sub Admin) account, the areas of interface accessible to that administrator can be viewed.
ECTION View User Account Status, Unlock Username View Account Status The All Accounts Status frame displays password statuses of current login accounts set up in this ProxyBlocker being configured, including: • Account Name - username • Type of account: • Expired Date (either Never Expired or a date using the •...
Unlock a Username To unlock a username: 1. Select the Account Name from the All Accounts Status frame by clicking on it to highlight it. 2. Click Unlock to open the dialog box asking if you wish to proceed with this action. TIP: Click No to close the dialog box.
Page 106
LOBAL DMINISTRATOR ECTION View Admin, Sub Admin Interface Access To view the areas of the interface accessible by a global or NT/LDAP group administrator: 1. Select the Admin or Sub Admin username from the list. 2. Click View Access to open the Assign Access View pop- 3.
Page 107
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Diagnostics Diagnostics includes options for setting up or running processes for maintaining the server. Click the Diagnostics link to view a menu of sub-topics: System Command, View Log File, Troubleshooting Mode, Active Profile Lookup, and Admin Audit Trail.
Command is selected from the Diagnostics menu. This window is used for viewing server statistics and for performing diagnostic tests on the server. Fig. 2:1-28 System Command window WARNING: Diagnostics tools utilize system resources, impacting the ProxyBlocker’s performance. 1: S HAPTER YSTEM SCREEN ECHNOLOGIES...
Ping The Ping diagnostic tool is used for verifying whether the ProxyBlocker can communicate with a machine at a given IP address within the network, and the speed of the network connection. Enter the IP address or host name of the specific Internet address to be contacted (pinged), and then click Execute to display results in the pop-up window.
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TOP CPU processes The TOP CPU processes diagnostic tool is used for analyzing how much memory and CPU power is being consumed by which processes. When Execute is clicked, the pop-up window displays the following information: the load average, number of processes that can run, current utilization by CPUs on the system, and memory and swap file space currently being used and currently available.
The Recent Logins diagnostic tool is used for showing infor- mation on administrator login activity. When Execute is clicked, the pop-up window displays a row of data for each time an administrator logged on the ProxyBlocker server. 1: S HAPTER...
When Execute is clicked, the pop-up window displays a row of data showing the current time, the amount of time the ProxyBlocker has been up, the number of users, and the load averages for the past 1, 5 and 15 minute inter- vals.
LOBAL DMINISTRATOR ECTION View Log File window The View Log File window displays when View Log File is selected from the Diagnostics menu. This window is used for viewing the most recent log file results of various activi- ties and for troubleshooting. Fig.
NIC card. • “Admin GUI Server Log (AdminGUIServer.log)” - used for viewing information on entries made by the admin- istrator in the ProxyBlocker console. NOTE: For information about the “Wbwatch Log (wbwatch.log)”, “Authentication Log (AuthenticationServer.log)”, “eDirectory Agent Debug Log (edirAgent.log)”, “eDirectory Agent Event Log (edirEvent.log)”...
Page 116
LOBAL DMINISTRATOR ECTION 4. Click the “X” in the upper right corner of the pop-up 1: S HAPTER YSTEM SCREEN Fig. 2:1-31 View Log File, Results window window to close it. ECHNOLOGIES ROXY LOCKER UIDE...
Fig. 2:1-32 Troubleshooting Mode window WARNING: This tool utilizes system resources, impacting the ProxyBlocker’s performance. When you click Enable, the Proxy- Blocker will stop filtering the network. After you finish making the necessary changes to the server, be sure to click Disable to terminate your Troubleshooting Mode session.
(TCP); Address Resolution Protocol (ARP); packets destined to a specified port (80, 443, 81); packets destined to the ProxyBlocker; packets sent to or from port 20 or 21; or packets sent to the Virtual IP address’s port 137 or 139.
8. After performing the fixes on the ProxyBlocker server, return to this window and click Disable to resume filtering the network. Active Profile Lookup window The Active Profile Lookup window displays when Active Profile Lookup is selected from the Diagnostics menu. This window is used for verifying whether an entity has an active filtering profile.
LOBAL DMINISTRATOR ECTION Verify Whether a Profile is Active 1. In the User IP/MAC Address field, enter the IP address 2. Click Lookup to verify whether or not a profile is active 1: S HAPTER YSTEM SCREEN of the end user. for that IP address.
Page 121
• Profile Type - type of profile: • Regular profiles - IP group, sub-group, or individual profile • Global profile - Global group profile • Override profiles - Override Account profile • Lock profiles - X Strikes Blocking lock out profile •...
Page 122
LOBAL DMINISTRATOR ECTION NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
4. Click the “X” in the upper right corner of the pop-up box to close it. Admin Audit Trail window The Admin Audit Trail window displays when Admin Audit Trail is selected from the Diagnostics menu. This window is used for specifying FTP criteria so that a log of server changes made by an administrator will be sent to the FTP server.
LOBAL DMINISTRATOR ECTION Specify FTP Criteria 1. Enter the IP address of the FTP Server. 2. The log will be sent to the current default directory, 3. At the Transfer Mode field, “Passive” is selected by 4. Type in the Username to be used. 5.
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View View the Log of Administrator Changes To view the log, click the View tab: Fig. 2:1-36 Admin Audit Trail window, View tab Click View Log to display data on recent activity. For each change made on the server, the log will contain the date and time the change was made (Time), IP address of the machine used by the administrator, administrator's User-...
Page 126
LOBAL DMINISTRATOR ECTION Alert Alert includes options for setting up alert emails that notify designated individuals of problems on the network. Click the Alert link to view a menu of sub-topics: Alert Settings, and SMTP Server Settings. Fig. 2:1-37 System screen, Alert menu 1: S HAPTER YSTEM SCREEN...
Alert menu. This window is used for setting up and maintaining email addresses of contacts who will receive automated notifications if problems on the network are detected during the ProxyBlocker’s self-moni- toring process. Fig. 2:1-38 Alert window...
Page 128
LOBAL DMINISTRATOR ECTION • Hard Drive Utilization - If the ProxyBlocker detects that • Log File Transmission - If the ProxyBlocker is unable to 1: S HAPTER YSTEM SCREEN tion will be required. However, if the error is not fixed—...
4. If using an SMTP server for sending alert email messages to designated administrators, enter the email address of the ProxyBlocker in the From Email Address field. 5. Click Apply to apply your settings. Modify Alert Settings 1.
LOBAL DMINISTRATOR ECTION SMTP Server Settings window The SMTP Server Settings window displays when SMTP Server Settings is selected from the Alert menu. This window is used for entering settings for the Simple Mail Transfer Protocol that will be used for sending email alert messages to specified administrators.
that can be placed into the queue awaiting an available outbound connection. 4. By default, Authentication is disabled. Click “Enable” if a username and password are required for logging into the SMTP server. This action activates the fields below. Make the following entries: a.
Page 132
LOBAL DMINISTRATOR ECTION Patch Patch includes options for uploading software updates. Click the Patch link to view a menu of sub-topics: Local Patch, and Patch Update Log. Fig. 2:1-41 System screen, Patch menu 1: S HAPTER YSTEM SCREEN ECHNOLOGIES ROXY LOCKER UIDE...
Fig. 2:1-42 Local Patch window NOTE: Available software updates for the ProxyBlocker come from downloads made to the server via Traveler, 8e6’s execut- able program that can run on demand, or be set to run at a scheduled time.
LOBAL DMINISTRATOR ECTION Read Information about a Software Update In either the Available Patches frame or the History of Patches frame, the Date, Name, and Synopsis are included for each software update. To read information about a software update: 1. Select a software update from the list. 2.
Select and Apply a Software Update To apply a software update: 1. Go to the Available Patches frame and select the soft- ware update to be applied. NOTES: Software updates must be applied to the server in sequential order. Be sure port 8082 is open on your network. 2.
Page 136
5. Click OK to close the alert box and to proceed. This 6. Click OK to close the alert box. 7. In the navigational bar, click Quit to exit the ProxyBlocker 8. Wait a few minutes, and then log back into the Proxy-...
NOTE: 8e6 recommends performing a backup of configuration files after applying a software update. (See the Backup/Restore window in this chapter for information on performing a backup.) Undo an Applied Software Update NOTE: Only the most recently applied software update can be uninstalled.
The Patch Update Log window displays when Patch Update Log is selected from the Patch menu. This window is used for viewing the software update log that provides the status on the ProxyBlocker’s software update activity, including checks for new software updates, and downloaded and applied software updates.
Download Log, View, Print Contents Download the Log 1. Click Download Log to open the alert box containing a message on how to download the log file to your worksta- tion, if using Windows XP. 2. Click OK to close the alert box. Two pop-up boxes open: •...
Page 140
LOBAL DMINISTRATOR ECTION 3. Find the folder in which to save the file, and then enter 4. You can now open this file, open the folder where the file NOTE: Proceed to View the Contents of the Log for information on viewing or printing the contents of the log file.
View the Contents of the Log Once the software update log file has been downloaded to your workstation, you can view its contents. 1. Find the log file in the folder, and right-click on it to open the pop-up menu: Fig.
Page 142
LOBAL DMINISTRATOR ECTION 3. If using WinZip, click I Agree to open the window 4. Right-click the zip file to open the pop-up menu, and 1: S HAPTER YSTEM SCREEN containing the zip file: Fig. 2:1-54 WinZip window choose “View” to open the View dialog box: Fig.
5. Select “Internal ASCII text viewer”, and then click View to open the View window containing the log file contents: Fig. 2:1-56 View window Save, Print the Log File Contents With the log file displaying correctly formatted in WinZip’s View window, if you wish to save or print the contents of this file: 1.
Page 144
LOBAL DMINISTRATOR ECTION Mode Mode includes options for configuring the ProxyBlocker to filter the network. Click the Mode link to view a menu of sub- topics: Operation Mode and Proxy Environment Settings. Fig. 2:1-57 System screen, Mode menu 1: S...
Mode is selected from the Mode menu. This window is used for specifying criteria for the invisible operational mode the ProxyBlocker will use for filtering on the network, as well as the settings to be used for “listening to” traffic and sending traffic.
Address Resolution Protocol method to find the best possible destination MAC address of a specified host, usually the ProxyBlocker gateway. preferred method, the block page will always be sent to the MAC address of a specified host, usually the Proxy- Blocker gateway.
• “Alternate IP Address” - this option should be used if block pages are not being served. Enter the IP address of the router or device that will serve block pages. NOTES: The Current MAC Address displays if there is a resolu- tion between the IP address and the MAC address of the router or device used for serving block pages.
80 will be enabled. Fig. 2:1-59 Proxy Environment Settings window NOTE: Basic Proxy Authentication must be used if using HTTPS in a proxy environment. The ProxyBlocker has been tested with ISA, Blue Coat, and Squid proxies. 1: S...
In the Proxy Setting frame, the default setting is “Off”. To specify that a local proxy server is used in the environment: 1. Click the “On” radio button. This selection indicates that the ProxyBlocker will perform a reverse lookup on packets to detect the source address and origin of packets.
Page 150
Click the Authentication link to view a menu of sub- topics: Enable/Disable Authentication, Authentication Settings, and Authentication SSL Certificate. Fig. 2:1-60 System screen, Authentication menu NOTE: Information about these sub-topics can be found in the 8e6 ProxyBlocker Authentication User Guide. 1: S HAPTER YSTEM SCREEN ECHNOLOGIES...
The NIC Mode window displays when NIC Mode is selected from the navigation panel. This window lets you specify the speed for the ProxyBlocker’s Network Interface Card settings so that the ProxyBlocker can communicate with the network switch or hub. Fig. 2:1-61 NIC Mode window By default the NIC mode for LAN1 and LAN2 is set to “Auto”.
LOBAL DMINISTRATOR ECTION View the NIC Negotiation To verify or correct the negotiation for a NIC, click View NIC Negotiation to open a window containing results from the mii-tool and the ethtool about the status of the NIC mode(s): Fig. 2:1-62 NIC Negotiation window Mii-tool checks or sets the status of a network interface's Media Independent Interface (MII) unit.
Modify the NIC Mode Setting WARNING: If changing the NIC mode, be sure the hub/switch to which the ProxyBlocker is connected will support the selected NIC mode. An incorrect setting may prevent you from accessing the ProxyBlocker console. To modify the NIC setting, in the LAN1 or LAN2 frame: 1.
Fig. 2:1-63 Backup/Restore window WARNING: A backup should be created and downloaded off the ProxyBlocker server whenever a change is made to filtering settings on the ProxyBlocker server. 1: S HAPTER...
By creating backup files and saving these files off the ProxyBlocker server, prior server settings can later be retrieved and uploaded to the ProxyBlocker in the event that current settings are incorrect, or if you wish to revert to settings from a previous backup. Additionally, backup files are useful if the current server fails.
To back up configuration and/or library modifications: 1. In the Backup frame, click the Configuration and/or 2. Click Backup to open the ProxyBlocker Backup dialog 3. Type in the Filename for the backup file. 4. Type in a descriptive Comment about that file.
Download a File To download a file to your machine: 1. Select the file from the Backup Configurations grid. 2. Click Download to open the alert box containing a message on how to download the log file to your worksta- tion, if using Windows XP.
Page 158
LOBAL DMINISTRATOR ECTION 1: S HAPTER YSTEM SCREEN After the file has completely downloaded, the Download complete dialog box opens: Fig. 2:1-67 Download complete box You can now open this file, open the folder where the file was saved, or close this dialog box. ECHNOLOGIES ROXY LOCKER...
WARNING: Be sure the file you are restoring uses the same version of the software currently used by the ProxyBlocker Administrator console. Refer to the Local Patch window for avail- able updates to the ProxyBlocker’s software. (See the Patch window for more information about software updates.)
LOBAL DMINISTRATOR ECTION 2. Click Browse to open the Choose file window: 3. Select the file to be uploaded. After the file is selected, 4. In the pop-up window, type in a Comment about the file. 5. Select the Type of file to be uploaded (CONFIG_ONLY, 6.
Remove a Backup File To remove a file from the Backup Configurations grid: 1. Select the file. 2. Click Delete. View Backup and Restoration Details To view details on backup and/or restoration activities: 1. Click Log to open the Backup/Restore Log pop-up box: Fig.
Fig. 2:1-71 Reset window WARNING: When Reset is clicked, all settings made on the ProxyBlocker server will be removed and the box will be restored to its original state. Any software updates applied to the server subsequent to receiving this box will need to be reapplied.
This feature lets the global adminis- trator use a third party Simple Network Management Protocol (SNMP) product for monitoring and managing the working status of the ProxyBlocker's filtering on a network. Fig. 2:1-72 SNMP window The following aspects of the ProxyBlocker are monitored by...
Set up Community Token for Public Access Enter the password to be used as the Community token for public access. This is the password that the manage- ment ProxyBlocker console would use when requesting access. Create, Build the Access Control List 1.
YSTEM SCREEN Hardware Failure Detection Hardware Failure Detection window If using a ProxyBlocker SL unit, the Hardware Failure Detection window displays when Hardware Failure Detec- tion is selected from the navigation panel. This feature shows the status of each drive on the RAID server.
LOBAL DMINISTRATOR ECTION View the Status of the Hard Drives The Hardware Failure Detection window displays the current RAID Array Status for the two hard drives (HD 1, HD 2). If both hard drives are functioning without failure, the text “OK”...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN X Strikes Blocking X Strikes Blocking window The X Strikes Blocking window displays when X Strikes Blocking is selected from the navigation panel. This feature lets a global administrator set criteria for blocking a user's access to “unacceptable”...
LOBAL DMINISTRATOR ECTION Configuration Set up Blocking Criteria 1. At Reset the X-Strike count upon authentication, “Off” 2. Enter the Maximum Strikes Before “Locking” the 3. Enter the Time Span in Minutes to Track the No. of 4. Enter the number of seconds for the Flood Tolerance 5.
To specify a different page, click “Custom URL” and enter the URL in the text box. 7. Click Save to save your configuration settings. Reset All Workstations The following buttons can be clicked to reset workstations: • Click Reset All Strikes to remove all strikes from all workstations, and to unlock all locked workstations.
LOBAL DMINISTRATOR ECTION The following information might also display in the lock page: “You have been denied access according to your organization's Internet Usage Policy. As a result, your Internet privileges were temporarily suspended for a total of ‘X’ (amount of time),” in which ‘X’ represents the number of minutes/hours the user will be locked out from Internet usage on that workstation.
Page 171
her workstation for five minutes. However, since the toler- ance timer is set at four seconds, a user could potentially receive five strikes within 16 seconds if he/she accesses a page with multiple, inappropriate images and/or links that load on each page within four seconds. In this scenario, the first strike would be delivered at 0 seconds, the second at 4 seconds, the third at 8 seconds, the fourth at 12 seconds, and the fifth at 16 seconds.
LOBAL DMINISTRATOR ECTION Email Alert Click the Email Alert tab to display Email Alert: Fig. 2:1-76 X Strikes Blocking window, Email Alert tab Set up Email Alert Criteria 1. In the Minutes Past Midnight Before Starting Time 2. In the Interval Minutes to Wait Before Sending Alerts 1: S HAPTER YSTEM SCREEN...
To check the time(s) the email alert is scheduled to occur, click the Display Sending Time button to open The Daily Schedule pop-up window that shows the alert time schedule in the (HH:MM:SS) format: Fig. 2:1-77 The Daily Schedule pop-up window Click Close to close the pop-up window.
LOBAL DMINISTRATOR ECTION Remove Email Alert Recipients 1. Select the email address(es) from the Current Email 2. Click Delete to remove the email address(es) from list. Logon Accounts Click the Logon Accounts tab to display Logon Accounts: Fig. 2:1-78 X Strikes Blocking window, Logon Accounts tab Set up Users Authorized to Unlock Workstations 1.
3. Click Add to include the username in the Current Acces- sible Users list box. NOTE: When an authorized staff member is added to this list, that username is automatically added to the Current Un-Accessible Users list box in the Logon Accounts tab of the Real Time Probe window.
LOBAL DMINISTRATOR ECTION Categories Click the Categories tab to display Categories: Fig. 2:1-79 X Strikes Blocking window, Categories tab Set up Categories to Receive Strikes or No Strikes 1. Select library categories from the “No Strike” Categories 2. Click the right arrow (>) to move the selected library cate- TIP: Use the left arrow (<) to move selected “Strike”...
The Re-login window opens if the user’s session needs to be validated: Fig. 2:1-80 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the ProxyBlocker console. ECHNOLOGIES ROXY LOCKER LOBAL DMINISTRATOR...
NOTE: An authorized staff member can click a link in an email alert, or type in http://x.x.x.x:88/XStrike.html in the address field of a browser window—in which “x.x.x.x” is the IP address of the ProxyBlocker—to view locked workstation criteria. Unlock a Workstation To unlock a specified workstation: 1.
Set up an Email Address to Receive Alerts To send locked workstation information to a designated administrator: 1. Enter the email address in the Email Address to be Subscribed/Unsubscribed text box. 2. Click Subscribe. Remove an Email Address from the Alert List To remove an administrator's email address from the notifi- cation list: 1.
LOBAL DMINISTRATOR ECTION Warn Option Setting Warn Option Setting window The Warn Option Setting window displays when Warn Option Setting is selected from the navigation panel. This feature lets a global administrator specify the number of minutes for the interval of time in which a warning page will redisplay for the end user who accesses a URL in a library category with a Warn setting for his/her profile.
Specify the Interval for Re-displaying the Warn page 1. In the Warn Life Time (minutes) field, by default 10 displays. Enter the number of minutes (1-480) to be used in the interval for re-displaying the warning page for the end user. 2.
Page 182
Common Customization, Authentication Form, Lock Page, Block Page, Warn Page, Profile Control, Quota Block Page, Quota Notice Page. Fig. 2:1-83 System screen, Customization menu NOTE: Refer to the 8e6 ProxyBlocker Authentication User Guide for information on using the Authentication Form Customization window. 1: S...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Common Customization window The Common Customization window displays when Common Customization is selected from the Customization menu. This window is used for specifying elements to be included in block, lock, profile, and warning pages, and/or the authentication request form the end user will see.
LOBAL DMINISTRATOR ECTION Enable, Disable Features 1. Click “On” or “Off” to enable or disable the following NOTE: If enabling the Help Display feature, both the Help Link Text and Help Link URL fields must be populated. 1: S HAPTER YSTEM SCREEN elements in the HTML pages, and make entries in fields to display customized text, if necessary:...
Page 185
• Help Link URL - By default, http://www.8e6.com/tech- support/deniedresponse.html displays as the help link URL. Enter the URL to be used when the end user clicks the help link text (specified in the Help Link Text field). • Submission Review Display - if enabled, displays in block pages the email address of the administrator to receive requests for a review on sites the end users feel are incorrectly blocked.
LOBAL DMINISTRATOR ECTION Lock Page Customization window The Lock Page Customization displays when Lock Page is selected from the Customization menu. This window is used with the X Strikes Blocking feature, and lets you customize text in the lock page end users will see when attempting to access Internet content blocked for their profiles, and their workstations are currently locked.
Edit Entries, Setting 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the lock page. • In the Description field, enter a static text message to be displayed beneath the lock page header.
LOBAL DMINISTRATOR ECTION Preview Sample Lock Page 1. Click Preview to launch a separate browser window 1: S HAPTER YSTEM SCREEN containing a sample customized lock page, based on entries saved in this window and in the Common Customization window: Fig.
• 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized lock page. TIP: If necessary, make edits in the Lock Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample lock page.
LOBAL DMINISTRATOR ECTION NOTE: See Appendix C: Create a Custom Block Page for infor- mation on creating a customized block page using your own design. TIP: An entry in any of the fields in this window is optional, but if an entry is made in the Link Text field, a corresponding entry must also be made in the Link URL field.
Preview Sample Block Page 1. Click Preview to launch a separate browser window containing a sample customized block page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-88 Sample Customized Block Page By default, the following data displays in the User/ Machine frame: •...
Page 192
Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. By default, these links are included in the block page under the following conditions: •...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Warn Page Customization window The Warn Page Customization window displays when Warn Page is selected from the Customization menu. This window is used with the Warn Option Setting feature, and lets you customize text in the pop-up window end users will see if attempting to access a URL in a library category set up with a Warn setting for his/her profile.
Page 194
LOBAL DMINISTRATOR ECTION Add, Edit Entries 1. Make an entry in any of the following fields: 2. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. 1: S HAPTER YSTEM SCREEN •...
Preview Sample Warning Page 1. Click Preview to launch a separate browser window containing a sample customized warning page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-90 Sample Customized Warning Page By default, the following data displays in the User/ Machine frame: •...
Page 196
• HELP - Clicking this link takes the user to 8e6’s Tech- nical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following buttons are included in the warning page: •...
Page 197
2. Click the “X” in the upper right corner of the window to close the sample customized warning page. TIP: If necessary, make edits in the Warn Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample warning page. ECHNOLOGIES ROXY LOCKER...
LOBAL DMINISTRATOR ECTION Profile Control window The Profile Control window displays when Profile Control is selected from the Customization menu. This window is used with the Override Account feature, and lets you customize text in the pop-up window end users with override accounts will see when logging into their override accounts.
Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the profile control pop-up window. • In the Warning Text field, enter a static text message to be displayed at the bottom of the pop-up window.
LOBAL DMINISTRATOR ECTION Quota Block Page Customization window The Quota Block Page Customization window displays when Quota Block Page is selected from the Customization menu. This window is used for making customizations to the quota block page the end user will see if he/she has a quota time limit set for a passed category in his/her profile and has attained or exceeded that limit.
Page 201
Add, Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to display at the top of the quota block page. • In the Description field, enter a static text message to be displayed beneath the header.
LOBAL DMINISTRATOR ECTION Preview Sample Quota Block Page 1. Click Preview to launch a separate browser window 1: S HAPTER YSTEM SCREEN containing a sample customized quota block page, based on entries saved in this window and in the Common Customization window: Fig.
• 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized quota block page. TIP: If necessary, make edits in the Quota Block Page Customi-...
LOBAL DMINISTRATOR ECTION TIP: An entry in any of the fields in this window is optional. NOTE: For more information about quotas, see the Quota Setting window in this chapter. Add, Edit Entries 1. Make an entry in any of the following fields: 2.
Preview Sample Quota Notice Page 1. Click Preview to launch a separate browser window containing a sample customized quota notice page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-95 Sample Customized Quota Notice Page By default, the following data displays in the Category frame: •...
Page 206
Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following button is included in the quota notice page: •...
1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Quota Setting Quota Setting window The Quota Setting window displays when Quota Setting is selected from the navigation panel. This window lets a global administrator configure URL hits that—along with quotas specified in filtering profiles—determine when a user will be blocked from further accessing URLs in a library group/category.
LOBAL DMINISTRATOR ECTION Configure Quota Hit Settings Enter the number of Seconds Per Hit to indicate how much time will be applied towards a “hit” (URL access) in any category with a quota. The default is 10 seconds per hit. The entry in this field combines with the minutes entered in the quota from the filtering profile to determine the amount of time the end user can access URLs in the specified passed...
Set up a Schedule to Automatically Reset Quotas A schedule can be set up to reset all quotas at the appointed hour(s) / minute(s) each day. 1. At the New Reset Time (HH:MM) field: • Select the hour at which the quota will be reset (“00” - “23”) •...
LOBAL DMINISTRATOR ECTION Quota Notice page When the end user has spent 75 percent of time in a quota- restricted library group/category, the quota notice page displays: Fig. 2:1-97 Sample Quota Notice Page By default, the following fields display: • Category field - Name of the library category with the •...
• HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The end user can decide whether or not to access the requested URL.
Page 212
By default, the following standard links are included in the quota block page: • HELP - Clicking this link takes the user to 8e6’s Technical • 8e6 Technologies - Clicking this link takes the user to 1: S HAPTER YSTEM SCREEN triggered the quota block page displays.
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Chapter 2: Group screen The Group screen is comprised of windows and dialog boxes used for adding IP groups and/or NT/LDAP domains, and for creating filtering profiles for IP/NT/LDAP groups and their members. Fig.
Page 214
NOTES: Information on NT and LDAP groups can be found in the 8e6 ProxyBlocker Authentication User Guide. Information on creating filtering profiles for IP groups can be found in the Group Administrator Section of this user guide.
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Global Group Global Group includes options for creating and maintaining groups. Click the Global Group link to view a menu of sub- topics: Range to Detect, Rules, Global Group Profile, Over- ride Account, Minimum Filtering Level, and Refresh All. Fig.
The Range to Detect window displays when Range to Detect is selected from the Global Group menu. This window is used for defining segments of network traffic to be detected by the ProxyBlocker. Service ports that should be open—ignored by the ProxyBlocker—are also defined in this window.
Add a Segment to the Network To add a segment to be detected on the network: 1. Click Add to go to the next page: Fig. 2:2-4 Range to Detect Settings, second window 2. Click one of the following buttons to select the procedure for adding the segment: •...
LOBAL DMINISTRATOR ECTION Range to Detect Setup Wizard Click the Start the Setup Wizard button to display Step 1 of the Range to Detect Setup Wizard. The Wizard is comprised of six steps. An entry is required in Step 1, but not in Steps 2 - 5.
Page 219
• IP / Netmask - use these fields to specify a range of IP addresses • Individual IP - use this field to enter a single IP address 2. Click Add to include the segment in the list box above. NOTE: To modify the segment, select it from the list box and click Modify to move the segment to the field(s) below for editing.
Page 220
NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the ProxyBlocker, thus enabling it to handle more traffic. Fig. 2:2-6 Range to Detect Setup Wizard window, Step 2 NOTE: For Steps 2-6, click Back to return to the previous page of the Wizard.
Page 221
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 3: Optional In this step you define the source IP address(es) to be excluded from filtering. Fig. 2:2-7 Range to Detect Setup Wizard window, Step 3 ECHNOLOGIES ROXY LOCKER UIDE...
Page 222
NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the ProxyBlocker, thus enabling it to handle more traffic. Fig. 2:2-8 Range to Detect Setup Wizard window, Step 4...
Page 223
Step 5: Optional In this step you enter destination port numbers to be excluded from filtering. Fig. 2:2-9 Range to Detect Setup Wizard window, Step 5 1. In the Individual Port field, enter the port number to be excluded from filtering. 2.
Page 224
LOBAL DMINISTRATOR ECTION Step 6 In this final step of the Wizard you review your entries and make modifications, if necessary. Fig. 2:2-10 Range to Detect Setup Wizard window, Step 6 1. Review the contents in all list boxes. 2. Perform one of the following actions: 2: G HAPTER ROUP SCREEN...
Range to Detect Advanced Settings Click the Advanced Settings button to display the Range to Detect Advanced Settings window: Fig. 2:2-11 Range to Detect Advanced Settings window 1. Enter the settings in the list box, using the correct syntax. Refer to the examples above. TIP: Use the Calculator to calculate IP ranges without any over- laps.
LOBAL DMINISTRATOR ECTION Modify a Segment of the Network To modify a segment: 1. In the main Range to Detect Settings window (see Fig. 2. Click Modify to go to the second page (see Fig. 2:2-4). 3. Click one of the following buttons to select the procedure Remove a Segment from the Network To remove a segment: 1.
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Rules window The Rules window displays when Rules is selected from the Global Group menu. This window is used for adding a filtering rule when creating a filtering profile for an entity. Fig.
LOBAL DMINISTRATOR ECTION View Criteria for a Rule Select the rule from the Current Rules pull-down menu to populate the Rule Details frame with settings made for that rule. If this rule is not an 8e6 pre-defined rule it can be modi- fied or deleted.
Page 229
NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
LOBAL DMINISTRATOR ECTION 6. Click Add Rule to include your rule to the list that Modify a Rule After a rule is added, it can later be modified. To make changes to a rule: 1. Select the rule from the Current Rules pull-down menu. 2.
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 5. Click Save Rule. Remove a Rule To delete a rule: 1. Select the rule from the Current Rules pull-down menu. 2. Click Delete Rule. ECHNOLOGIES ROXY LOCKER UIDE...
LOBAL DMINISTRATOR ECTION Global Group Profile window The Global Group Profile window displays when Global Group Profile is selected from the Global Group menu. This window is used for viewing/creating the global (default) filtering profile that will be used by all users on the network unless a unique filtering profile is created for an entity.
Category Profile Category Profile displays by default when Global Group Profile is selected from the Global Group menu, or when the Category tab is clicked. This tab is used for assigning filter settings to category groups/library categories for the global group profile.
Page 234
LOBAL DMINISTRATOR ECTION NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
Page 235
NOTE: See the Quota Settings window in Chapter 1: System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas. • The Overall Quota field becomes enabled if a quota is entered for any library group/category. By default, the enabled Overall Quota is turned “Off”.
LOBAL DMINISTRATOR ECTION Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports for the global filtering profile. Fig. 2:2-14 Global Group Profile window, Port tab Create, Edit a List of Service Ports All service ports are filtered by default.
2. Click Remove. 3. Click Apply to apply your settings at the global level. Default Redirect URL Default Redirect URL displays when the Default Redirect URL tab is clicked. This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked for the global filtering profile.
LOBAL DMINISTRATOR ECTION 2. Click Apply to apply your settings. Filter Options Filter Options displays when the Filter Options tab is clicked. This tab is used for specifying which filter option(s) will be applied to the global group filtering profile. Fig.
Page 239
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN X Strikes Blocking With the X Strikes Blocking option enabled, an end user who attempts to access inappropriate sites on the Internet will be locked out from his/her workstation after a specified number of tries within a fixed time period.
LOBAL DMINISTRATOR ECTION Search Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled, search engine keywords can be set up to be blocked. When a user enters a keyword in the search engine, if that keyword has been set up to be blocked, the search will not be performed.
URL Keyword Filter Control With the URL Keyword Filter Control option enabled, URL keywords can be set up to be blocked. When a user enters a keyword in the address line of a browser window, if that keyword has been set up to be blocked, the user will be denied access to that site or service.
LOBAL DMINISTRATOR ECTION Override Account window The Override Account window displays when Override Account is selected from the Global Group menu. This window is used for creating an override account that allows an IP group user to bypass settings at the minimum filtering level.
NOTES: A user can have only one override account. If an over- ride account was previously created for a user in a master IP group, only that override account will be effective, unless that account is deleted from the IP group. See the Override Account window in Chapter 1 of the Group Administrator Section for infor- mation on setting up an override account for a user in an IP group.
LOBAL DMINISTRATOR ECTION Category Profile The Rule tab is used for creating the categories portion of the override account profile. Fig. 2:2-18 Override Account pop-up window, Rule tab To create the category profile: 1. Select a filtering rule from the available choices in the TIP: In the Category Groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group.
Page 245
NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
Page 246
LOBAL DMINISTRATOR ECTION TIP: If a quota entry is made for a category group, all library cate- gories in that group will show the same number of quota minutes. NOTE: See the Quota Settings window in Chapter 1: System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas.
Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked. Fig. 2:2-19 Override Account pop-up window, Redirect tab 1.
LOBAL DMINISTRATOR ECTION 3. Click the Filter Options tab to continue creating the over- Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig. 2:2-20 Override Account pop-up window, Filter Options tab 1.
Page 249
NOTE: See the X Strikes Blocking window in Chapter 1: System screen for information on setting up the X Strikes Blocking feature. • “Google/Yahoo!/Ask.com/AOL Safe Search Enforce- ment” - With the Google/Yahoo!/Ask.com/AOL Safe Search Enforcement option enabled, Google, Yahoo!, Ask.com, and AOL’s “strict” SafeSearch Filtering option will be used whenever the end user performs a Google, Yahoo!, Ask.com, or AOL Web search or Image search.
Page 250
LOBAL DMINISTRATOR ECTION NOTE: To set up search engine keywords in a Search Engine Keywords window, see the following sections of this user guide for the specified library type: • 8e6 Supplied Categories - see Chapter 3: Library screen, Search Engine Keywords window. •...
Edit an Override Account Change the Password To change an override account’s password: 1. In the Current Accounts frame, select the username from the list box. 2. In the Account Details frame, enter the username in the Name field. 3. Enter the new Password. 4.
LOBAL DMINISTRATOR ECTION Delete an Override Account To delete an override account: 1. In the Current Accounts frame, select the username from 2. Click Remove. Minimum Filtering Level window The Minimum Filtering Level window displays when Minimum Filtering Level is selected from the Global Group menu.
Page 253
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Fig. 2:2-21 Minimum Filtering Level window, Min. Filtering Categories By default, “Child Pornography” and “Pornography/Adult Content” are assigned a Block filter setting, and all other active library categories are set to Pass. Filter settings are designated by the check mark inside a green circle in the Pass or Block column.
LOBAL DMINISTRATOR ECTION Create, Edit Minimum Filtering Categories To create the categories portion of the minimum filtering level profile: 1. Double-click the column (Pass, Block) in the row corre- TIPS: Multiple categories can be assigned the same filter setting by clicking each category while pressing the Ctrl key on your keyboard, and then double-clicking in the appropriate column.
Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports at the minimum filtering level. Fig. 2:2-22 Minimum Filtering Level window, Port tab Create, Edit a List of Service Ports All service ports are filtered by default. To block a service port from being accessed at the minimum filtering level: 1.
LOBAL DMINISTRATOR ECTION 1. Select the port number. 2. Click Remove. 3. Click Apply to apply your settings at the minimum Minimum Filtering Bypass Options Minimum Filtering Bypass Options displays when the Min. Filter Bypass tab is clicked. This tab is used for specifying whether users in a master IP group will be allowed to bypass the minimum filtering level with an override account or an exception URL.
Specify Minimum Filtering Bypass Options To allow a user to override settings made at the minimum filtering level: 1. In the Override Account frame, click the “On” checkbox. Any user who has an override account will be able to access content blocked at the minimum filtering level. 2.
LOBAL DMINISTRATOR ECTION Refresh All Refresh All Main Branches From the Global Group menu, click Refresh All to refresh the main branches of the tree. This action should be performed whenever authentication has been enabled or disabled. If authentication is enabled, when Refresh All is clicked, the NT and LDAP branches of the tree display.
Page 259
2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN IP includes options for adding a master IP group and to refresh the tree list. Click the IP link to view a menu of sub- topics: Add Group, and Refresh. Fig. 2:2-24 Group screen, IP menu ECHNOLOGIES ROXY LOCKER...
LOBAL DMINISTRATOR ECTION Add Group Add a Master IP Group From the IP group menu: 1. Choose Add Group to open the Create New Group dialog 2. Enter up to 20 characters for the Group Name. NOTES: The name of the master IP group must be less than 20 characters;...
4. Click OK to add the group to the tree. NOTE: Information on defining the group and its members and establishing their filtering profiles can be found in the Group Administrator Section of this user guide. Refresh Refresh IP Groups From the IP group menu, click Refresh whenever changes have been made in this branch of the tree.
LOBAL DMINISTRATOR ECTION Chapter 3: Library screen The Library screen is comprised of windows and dialog boxes used for adding and maintaining library categories. Library categories are used when creating or modifying filtering profiles. Fig. 2:3-1 Library screen A list of main topics displays in the navigation panel at the left of the screen: Updates, Library Lookup, Category Weight System, NNTP Newsgroup, and Category Groups.
Page 263
3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN envelope—any envelope except Custom Categories—to view 8e6 supplied library categories for that group. Click a library category topic to view a menu of sub-topics for that library category item: Library Details, URLs, URL Keywords, and Search Engine Keywords.
Page 264
LOBAL DMINISTRATOR ECTION Updates Updates includes options for making configurations for library category activities. Click the Updates link to view a menu of sub-topics: Configuration, Manual Update, Addi- tional Language Support, Library Update Log, and Emer- gency Update Log. Fig. 2:3-2 Library screen, Updates menu 3: L HAPTER IBRARY SCREEN...
Configuration window The Configuration window displays when Configuration is selected from the Updates menu. This window is used for making settings to allow the ProxyBlocker to receive 8e6 supplied library category updates on a daily basis. Fig. 2:3-3 Configuration window Set a Time for Updates to be Retrieved 1.
LOBAL DMINISTRATOR ECTION Optional: Specify a Proxy Server 1. In the FTP Proxy Setting frame, by default “Disable” is 2. By default, proxy.company.com displays as the host 3. By default, userid displays in the Username field. Enter 4. Enter the same password in the Password and Confirm 5.
This window is used for updating specified 8e6 supplied library categories on demand from the update server, if the ProxyBlocker has not received daily updates due to an occurrence such as a power outage. Fig. 2:3-4 Manual Update window...
• Patch Update - Select this option to download new software updates for the ProxyBlocker, if available. Any software updates that are downloaded can be found in the System section of the console, in the Local Patch window.
Additional Language Support window The Additional Language Support window displays when Additional Language Support is selected from the Updates menu. This window is used for including additional 8e6- supported languages in library downloads. Fig. 2:3-5 Additional Language Support window Select Additional Languages 1.
Page 270
LOBAL DMINISTRATOR ECTION TIP: To move a language selection back to the Unselected Languages list box, select the item and then click the left arrow. 3. Click Apply to have URLs from the selected language(s) 3: L HAPTER IBRARY SCREEN To make an optional selection for a primary language, choose the language from the (Optional) Select Primary Language pull-down menu.
The Library Update Log window displays when Library Update Log is selected from the Updates menu. This window is used for viewing transfer activity of library updates from the update server to your ProxyBlocker, and for downloading the activity log. Fig. 2:3-6 Library Update Log window...
LOBAL DMINISTRATOR ECTION Download Log, View, Print Contents Download the Log 1. Click Download Log to open the alert box containing a 2. Click OK to close the alert box. Two pop-up boxes open: 3: L HAPTER IBRARY SCREEN message on how to download the log file to your worksta- tion, if using Windows XP.
3. Find the folder in which to save the file, and then enter the File name, retaining the “.zip” file extension. Click Save to begin downloading the zip file to your worksta- tion. After the file has completely downloaded, the Download complete dialog box opens: Fig.
Page 274
LOBAL DMINISTRATOR ECTION 2. Choose “Open With” and then select a zip file executable 3. If using WinZip, click I Agree to open the window 3: L HAPTER IBRARY SCREEN Fig. 2:3-10 Folder containing downloaded file program such as “WinZip Executable” to launch that application: Fig.
Page 275
Fig. 2:3-12 WinZip window 4. Right-click the zip file to open the pop-up menu, and choose “View” to open the View dialog box: Fig. 2:2-13 View dialog box 5. Select “Internal ASCII text viewer”, and then click View to open the View window containing the log file contents: Fig.
LOBAL DMINISTRATOR ECTION Save, Print the Log File Contents With the log file displaying correctly formatted in WinZip’s View window, if you wish to save or print the contents of this file: 1. Click Clipboard Copy, wait for the dialog box to open 2.
Emergency Update Log window The Emergency Update Log window displays when Emer- gency Update Log is selected from the Updates menu. This window is used for viewing transfer activity of emergency software updates from the update server to your Proxy- Blocker, and for downloading the activity log.
LOBAL DMINISTRATOR ECTION Download the Software Update Log File NOTE: See Library Update Log window for screen shots pertaining to downloading the software update log file. 1. Click Download Log to open the alert box containing a 2. Click OK to close the alert box. Two pop-up boxes open: 3.
3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Library Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel. This window is used for verifying whether a URL or search engine keyword or keyword phrase exists in a library category, and to remove it, if necessary.
LOBAL DMINISTRATOR ECTION URL Lookup, Removal Perform a URL Check To see if a URL has been included in the library: 1. In the URL Lookup frame, enter the URL. For example, NOTE: The minimum number of wildcard levels that can be entered is three (e.g.
3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Remove a URL To remove the URL: 1. Select the item from the Result Category list box. 2. Click Remove. Submit an Email to the Administrator If using a non-Web based email client such as Outlook, you can send an email to the administrator at your organization regarding a URL or search engine keyword that appears to be incorrectly categorized.
Once all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Category Weight System Category Weight System window The Category Weight System window displays when Cate- gory Weight System is selected from the navigation panel. This feature lets you choose which category will be logged and reported for a URL request that exists in multiple cate- gories (possibly both 8e6 supplied and custom library cate- gories) with the same operational precedence.
NOTE: If a URL exists in multiple un-weighted categories of the same operational precedence, the category logged would be the first one returned by the ProxyBlocker database. Since there is no precedence given, the order in which the category is returned would be random.
Weighting Library Categories 1. Select the category from the "No Weight" Categories list box. TIP: Multiple categories can be selected by clicking each cate- gory while pressing the Ctrl key on your keyboard. Blocks of cate- gories can be selected by clicking the first category, and then pressing the Shift key on your keyboard while clicking the last category.
LOBAL DMINISTRATOR ECTION NNTP Newsgroup NNTP Newsgroup window The NNTP Newsgroup window displays when NNTP News- group is selected from the navigation panel. This window is used for adding or removing a newsgroup from the libraries. Fig. 2:3-19 NNTP Newsgroup window Add a Newsgroup to the Library To add a newsgroup to the library: 1.
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
8e6 supplied library categories. 8e6 supplied library categories are updated regularly with new URLs via Traveler, 8e6’s executable program that supplies updates to the ProxyBlocker. Category Groups also contains the Custom Categories category group. The ALLOW and BLOCK library categories within this category group must be maintained by the global administrator.
Page 289
3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Click the 8e6 supplied category link or the ALLOW or BLOCK link in Custom Categories to view a menu of sub- topics: Library Details, URLs, URL Keywords, and Search Engine Keywords. (Menus for Instant Messaging library categories only include the sub-topics Library Details, and URLs).
LOBAL DMINISTRATOR ECTION Library Details window The Library Details window displays when Library Details is selected from the library category’s menu of sub-topics. This window is a view only window. Fig. 2:3-21 Library Details window View Library Details This window displays the Group Name, Description, and Short Name of the 8e6 supplied library category.
3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN URLs window The URLs window displays when URLs is selected from the library category’s menu of sub-topics. This window is used for viewing, or adding and/or removing a URL from a library category.
LOBAL DMINISTRATOR ECTION View a List of URLs in the Library Category To view a list of all URLs that either have been added or deleted: 1. Click the View tab. 2. Make a selection from the pull-down menu for “Addition 3.
Add or Remove URLs, Reload the Library The Action tab is used for making entries in the URLs window for adding or removing a URL, or reloading the library. Add a URL to the Library Category To add a URL to the library category: 1.
LOBAL DMINISTRATOR ECTION Add a Wildcard URL to the Library Category NOTE: Wildcards are to be used for blocking only. They are not designed to be used for the exceptions function or the always allowed white listing function. To add a URL containing a wildcard to the library category: 1.
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
LOBAL DMINISTRATOR ECTION URL Keywords window The URL Keywords window displays when URL Keywords is selected from the library category’s menu of sub-topics. This window is used for adding and removing URL keywords from a library category. A library category uses URL keywords to block a user’s access to Internet addresses containing keywords included in its list.
WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked categories. For example, if all URL keywords containing “sex”...
LOBAL DMINISTRATOR ECTION Upload a List of URL Keywords to the Library Before uploading a text file with URL keyword additions or deletions, in the Upload URL Keyword File frame, specify whether the contents of this file will add to the current file, or overwrite the current file on the server, by clicking the “Append”...
After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
LOBAL DMINISTRATOR ECTION Search Engine Keywords window The Search Engine Keywords window displays when Search Engine Keywords is selected from the library cate- gory’s menu of sub-topics. This window is used for adding and removing search engine keywords/phrases to and from a library category.
NOTE: If the feature for search engine keyword filtering is not enabled in a filtering profile, search engine keywords can be added in this window but search engine keyword filtering will not be in effect for the user(s). (See the Filter Options tab in the Group screen section for information about enabling search engine keyword filtering.) WARNING: Use extreme caution when setting up search engine...
LOBAL DMINISTRATOR ECTION Remove a Search Engine Keyword from the Library To remove a search engine keyword/phrase from the library category: 1. In the Edit Search Keyword List frame, enter up to 75 2. Click Remove. Upload a List of Search Engine Keywords Before uploading a text file with search engine keyword/ phrase additions or deletions, in the Upload Add/Del Keyword frame, specify whether the contents of this file will...
After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
This tool is used for monitoring Internet activities of specified users in real time. NOTE: Information on configuring the Enterprise Reporter (ER) to work with the ProxyBlocker can be found in Appendix E of the Appendices Section. 4: R...
Fig. 2:4-2 Report Configuration window Specify the Reporting Device By default, no option is selected at the Export field. If ProxyBlocker logs will be exported to a reporting applica- tion: 1. Click the checkbox corresponding to the reporter to be used for transferring logs: “8e6 Enterprise Reporter”, or...
If “8e6 Enterprise Reporter” was selected, the 8e6 Enter- prise Reporter tab displays by default. On this tab, you need to specify criteria for the ER server that will receive logs from the ProxyBlocker. Fig. 2:4-3 Report Configuration window, 8e6 ER option, ER tab Edit ER Server Information In the Log File Transfer Configuration frame, by default the IP address 1.2.3.6 displays in the Remote Server list box.
View Transfer Activity to the ER After the ER has been configured and logs have been trans- ferred from the ProxyBlocker to the ER, you can view transfer activity. Fig. 2:4-4 Report Configuration window, 8e6 ER option, Log tab 1.
If “Other Device” was selected, the Other Device tab displays by default. On this tab, you need to specify criteria for the reporter that will receive logs from the ProxyBlocker. Fig. 2:4-5 Report Configuration window, Other Device option and tab...
Page 309
3. At the User Authentication field, “User” is selected by default, indicating that a username and password will be required for FTP transfers. Click the “Anonymous” radio button if no user authentication will be required for FTP transfers. 4. By default, the Username field is activated. For this option, userid displays by default.
DMINISTRATOR ECTION View Transfer Activity to the Reporting Device After logs have been transferred from the ProxyBlocker to the reporting device, the Log tab can be clicked to view transfer activity. On this tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Real Time Probe Real Time Probe window The Real Time Probe window displays when Real Time Probe is selected from the navigation panel. This feature lets the probe administrator monitor a user's Internet usage in real time to see if that user is using the Internet appropri- ately.
LOBAL DMINISTRATOR ECTION Configuration Enable Real Time Probes 1. On the Configuration tab, click “On”. 2. Click Save to enable the Real Time Probes feature. As a Set up Real Time Probes 1. Enter the Maximum Probes to Run/Schedule Simulta- 2.
Remove IPs from the White List 1. Select the IP address(es) from the Current White list of IPs list box. 2. Click Delete to remove the IP address(es) from the white list. Report Recipients Click the Report Recipients tab to display Email Report: Fig.
LOBAL DMINISTRATOR ECTION 2. Select the Maximum File Size of an Email Report (MB) 3. Click Save. Set up Email Addresses to Receive Reports 1. Enter the Email Address of an individual who will 2. Click Add to include the email address in the Current List NOTE: The maximum number of report recipients is 50.
Logon Accounts Click the Logon Accounts tab to display Logon Accounts: Fig. 2:4-8 Real Time Probe window, Logon Accounts tab Set up Users Authorized to Create Probes 1. Enter the Username of a staff member who is authorized to create real time probes. 2.
LOBAL DMINISTRATOR ECTION NOTE: When an authorized staff member is added to this list, that username is automatically added to the Current Un-Accessible Users list box in the Logon Accounts tab of the X Strikes Blocking window. Deactivate an Authorized Logon Account To deactivate an authorized user’s account: 1.
The Re-login window opens if the user’s session needs to be validated: Fig. 2:4-9 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the ProxyBlocker console. ECHNOLOGIES ROXY LOCKER LOBAL DMINISTRATOR...
“x.x.x.x” is the IP address of the ProxyBlocker—to only see probes he/she created. Create a Real Time Probe Click the Create tab to enter and specify criteria for the report you wish to generate: Fig.
Page 319
The Current Probe Count displays the Total number of active probes, and the number of probes Created Under This Account. The Maximum Probes to Run/Schedule Simultaneously entered on the Configuration tab displays. 1. Enter up to 40 characters for the Display Name. This label will be used for the probe in the View tab and in the email report to be sent to the designated recipient(s).
Page 320
LOBAL DMINISTRATOR ECTION NOTE: Up to 250 characters will be accepted for the IP Address, User Name, or URL. 4. If you wish to send the completed report to a specified 5. Specify the Start Date & Time by clicking the appropriate 6.
4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN View Real Time Probe Details Click the View tab to view details about active probes: Fig. 2:4-11 Real Time Probe Reports, View tab The Display Name shows the name assigned to the probe on the Create tab.
LOBAL DMINISTRATOR ECTION By selecting a probe, buttons for the probe become acti- vated, based on the state of the probe. The following options are available for each of the probe statuses: • Completed: View, Properties, Delete, Email • In Progress: View, Properties, Stop •...
Page 323
keyword if the method is an SE Keyword or a URL Keyword); URL in Libraries, and Requested URL. The following actions can be performed in this box: • Click a URL to open a window that accesses the desig- nated site. •...
LOBAL DMINISTRATOR ECTION Stop, Delete options Clicking Stop halts the probe and gives it a Completed status. This option is also available in the Real Time Infor- mation box via the “Stop” button. Clicking Delete opens the following dialog box, asking if you want to delete the probe: Fig.
ROUP DMINISTRATOR Introduction The Group Administrator Section of this user guide is comprised of two chapters that include information on func- tions performed by the group administrator. Chapter 1 includes information on setting up and main- taining master IP groups and group members. Chapter 2 includes information on maintaining exception URLs.
ROUP DMINISTRATOR ECTION Chapter 1: Group screen Group administrators use group screen windows to add members to a master IP group, create sub-groups and/or individual IP members, and define and maintain members’ filtering profiles. A member is associated with an IP address and may contain a netmask within a valid IP address range.
Refresh Refresh the Master IP Group, Member Click Refresh whenever a change has been made to the master IP group or member level of the tree. Fig. 3:1-2 Group screen, IP menu ECHNOLOGIES ROXY LOCKER ROUP DMINISTRATOR UIDE 1: G ECTION HAPTER ROUP SCREEN...
ROUP DMINISTRATOR ECTION Master IP Group Master IP group includes options for defining and main- taining group accounts, setting up an override account and/ or exception URLs to bypass global settings, and uploading or downloading IP profiles. Click the master IP group’s link to view a menu of sub-topics: Group Details, Members, Override Account, Group Profile, Exception URL, Time Profile, Upload/Download IP Profile, Add Sub Group, Add...
Group Details window The Group Details window displays when Group Details is selected from the menu. This window is used for viewing the Group Name and for changing the password of the group administrator. Fig. 3:1-4 Group window Change the Group Administrator Password In the Group Administrator frame, the Group Name displays.
ROUP DMINISTRATOR ECTION Members window The Members window displays when Members is selected from the menu. This window is used for adding and managing members of a master IP group. A member is comprised of an associated IP address, and a sub-group may also contain a netmask.
2. Click Add to include the IP address entry in the Current Members list box. TIP: Click Calculator to open the IP Calculator, and calculate IP ranges without any overlaps. Enter the IP address, specify the Netmask, and then click Calculate to display results in the Min Host and Max Host fields.
Page 332
ROUP DMINISTRATOR ECTION Override Account window The Override Account window displays when Override Account is selected from the menu. This window is used for creating an override account that allows an end user from a master IP group to bypass settings at the minimum filtering level.
NOTES: Override accounts can be created for any authorized user. In order for a user with an override account to access cate- gories and ports set up to be blocked at the master IP group level, the global administrator must first activate the option to allow an override account to bypass minimum filtering level settings.
ROUP DMINISTRATOR ECTION Category Profile The Rule tab is used for creating the categories portion of the override account profile. Fig. 3:1-7 Override Account pop-up window, Rule tab To create the category profile: 1. Select a filtering rule from the available choices in the TIP: In the Category Groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group.
Page 335
NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
Page 336
ROUP DMINISTRATOR ECTION TIP: If a quota entry is made for a category group, all library cate- gories in that group will show the same number of quota minutes. NOTE: See the Quota Settings window in Chapter 1: System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas.
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked. Fig.
ROUP DMINISTRATOR ECTION Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig. 3:1-9 Override Account pop-up window, Filter Options tab Click the checkbox(es) corresponding to the option(s) to be applied to the override account filtering profile: •...
Page 339
• “Google/Yahoo!/Ask.com/AOL Safe Search Enforce- ment” - With the Google/Yahoo!/Ask.com/AOL Safe Search Enforcement option enabled, Google, Yahoo!, Ask.com, and AOL’s “strict” SafeSearch Filtering option will be used whenever the end user performs a Google, Yahoo!, Ask.com, or AOL Web search or Image search. WARNING: If this option is used in conjunction with the X Strikes Blocking feature and the user is performing an inappropriate Google, Yahoo!, Ask.com, or AOL Image search, the number of...
ROUP DMINISTRATOR ECTION NOTE: To set up URL keywords in a URL Keywords window, see the URL Keywords window in Chapter 2. Edit an Override Account Change the Password To change an override account’s password: 1. In the Current Accounts frame, select the username from 2.
Delete an Override Account To delete an override account: 1. In the Current Accounts frame, select the username from the list box. 2. Click Remove. ECHNOLOGIES ROXY LOCKER ROUP DMINISTRATOR UIDE 1: G ECTION HAPTER ROUP SCREEN...
ROUP DMINISTRATOR ECTION Group Profile window The Group Profile window displays when Group Profile is selected from the group menu. This window is used for viewing/creating the group’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options.
By default, “Rule0 Minimum Filtering Level” displays in the Available Filter Levels pull-down menu, and the Minimum Filtering Level box displays “Child Pornography” and “Pornography/Adult Content”. By default, Uncategorized Sites are allowed to Pass. NOTE: By default, the Available Filter Levels pull-down menu also includes these five rule choices: Rule1 BYPASS”, “Rule2 BLOCK Porn”, “Rule3 Block IM and Porn”, “Rule4 8e6 CIPA Compliance”, and “Block All”.
Page 344
ROUP DMINISTRATOR ECTION TIPS: Multiple categories can be assigned the same filter setting by clicking each category while pressing the Ctrl key on your keyboard, and then double-clicking in the appropriate column. Blocks of categories can be assigned the same filter setting by clicking the first category, and then pressing the Shift key on your keyboard while clicking the last category, and then double- clicking in the appropriate column.
5. Click Apply to apply your settings to the override account profile. 6. Click another tab (Redirect or Filter Options) to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window.
ROUP DMINISTRATOR ECTION 2. Click Apply to apply your settings. Filter Options Filter Options displays when the Filter Options tab is clicked. This tab is used for specifying which filter option(s) will be applied to the group’s filtering profile. Fig. 3:1-12 Group Profile window, Filter Options tab Create, Edit the Filter Options 1.
Page 347
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN 2. Click Apply to apply your settings. X Strikes Blocking With the X Strikes Blocking option enabled, an end user who attempts to access inappropriate sites on the Internet will be locked out from his/her workstation after a specified number of tries within a fixed time period.
Page 348
ROUP DMINISTRATOR ECTION engine, if that keyword has been set up to be blocked, the search will not be performed. Search engine keywords are entered in the Search Engine Keywords window of custom library categories. NOTES: Search engine keyword filtering relies on an exact keyword match.
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Exception URL window The Exception URL window displays when Exception URL is selected from the group menu. This window is used for blocking group members’ access to specified URLs and/or for letting group members access specified URLs blocked at the minimum filtering level.
ROUP DMINISTRATOR ECTION Block URL frame To block the group’s access to a URL: 1. In the Block URL field, enter the URL. 2. Click Add to include the URL in the Block URLs list box. To allow the URL to be accessed by the group again: 1.
Time Profile window The Time Profile window displays when Time Profile is selected from the group menu. This window is used for setting up or modifying a filtering profile to be activated at a specified time. Fig. 3:1-14 Time Profile window The Current Time Profiles list box displays the Name and Description of any time profiles previously set up for the entity that are currently active.
Page 352
ROUP DMINISTRATOR ECTION 2. Type in three to 20 alphanumeric characters—the under- 3. Click OK to close the pop-up box and to open the Adding 1: G HAPTER ROUP SCREEN Fig. 3:1-15 Adding Time Profile score ( _ ) character can be used—for the profile name. Time Profile pop-up window that displays the name of this profile at the top of the Time Profile frame: Fig.
Page 353
4. In the Recurrence duration time frame, specify Start and End time range criteria: a. Select from a list of time slots incremented by 15 minutes: “12:00” to “11:45”. By default, the Start field displays the closest 15-minute future time, and the End field displays a time that is one hour ahead of that time.
Page 354
ROUP DMINISTRATOR ECTION 1: G HAPTER ROUP SCREEN • Daily - If this selection is made, enter the interval for the number of days this time profile will be used. By default, “1” displays, indicating this profile will be used each day during the specified time period.
Page 355
• Yearly - If this selection is made, the year(s), month, and day for this time profile’s interval must be speci- fied: First enter the year(s) for the interval. By default “1” displays, indicating this time profile will be used each year.
Page 356
ROUP DMINISTRATOR ECTION 7. Click each of the tabs (Rule, Redirect, Filter Options, 8. Click Apply to activate the time profile for the IP group at 9. Click Close to close the Adding Time Profile pop-up WARNING: If there is an error in a time profile, the Description for that time profile displays in red text.
Page 357
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the time profile. Fig. 3:1-17 Time Profile pop-up window, Rule tab NOTE: See the Override Account window, Category Profile sub- section in this chapter for information about entries that can be made for this component of the filtering profile.
Page 358
ROUP DMINISTRATOR ECTION Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked. Fig. 3:1-18 Time Profile pop-up window, Redirect URL tab NOTE: See the Override Account window, Redirect URL sub- section in this chapter for information about entries that can be made for this component of the filtering profile.
Page 359
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the time profile. Fig. 3:1-19 Time Profile pop-up window, Filter Options tab NOTE: See the Override Account window, Filter Options sub- section in this chapter for information about entries that can be made for this component of the filtering profile.
ROUP DMINISTRATOR ECTION Exception URL The Exception tab is used for allowing users to be blocked from accessing specified URLs and/or to be allowed to access specified URLs blocked at the minimum filtering level. Fig. 3:1-20 Time Profile pop-up window, Exception tab NOTE: Settings in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator.
Page 361
To block the group’s access to a URL: 1. In the Block URL field, enter the URL. 2. Click Add to include the URL in the Block URLs list box. To allow the URL to be accessed by the group again: 1.
ROUP DMINISTRATOR ECTION Modify a Time Profile To modify an existing time profile: 1. Select the time profile from the Current Time Profiles list 2. Click View/Modify to open the Modify Time Profiles pop- 3. Make modifications in the default Recurrence tab and/or 4.
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Upload/Download IP Profile window The Upload/Download IP Profile window displays when Upload/Download IP Profile is selected from the group menu. This window is used for uploading or downloading a text file containing filtering profiles of multiple users or sub- groups.
ROUP DMINISTRATOR ECTION Upload IP Profiles 1. Click Upload File to open both the refresh message NOTE: Leave the message dialog box open until the file containing the profile has been uploaded. 2. Click Browse to open the Choose file window in which NOTE: For examples of entries to include in a profile file, go to http://www.8e6.com/pbahelp/files/2group_ipprofiles.html.
Download Profile If profiles have been created and/or uploaded to the server: 1. Click Download Profile to open a browser window containing the profiles: Fig. 3:1-23 Download IP Profiles window The contents of this window can viewed, printed, and/or saved. 2.
ROUP DMINISTRATOR ECTION Add Sub Group Add an IP Sub Group From the group menu: 1. Click Add Sub Group to open the Create Sub Group 2. Enter the Group Name for the sub-group. NOTES: The name of the sub-group must be less than 20 char- acters;...
WARNING: When adding a sub-group to the tree list, sub-group users will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window. The minimum filtering level is established by the global administrator.
ROUP DMINISTRATOR ECTION 3. Click OK to close the dialog box and to add the individual WARNING: When adding an Individual IP member to the tree list, the user will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window.
Paste Sub Group The Paste Sub Group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists. A sub-group can be “pasted”—or copied—to a group if the Copy Sub Group function was first performed at the sub- group level.
ROUP DMINISTRATOR ECTION Sub Group Sub Group includes options for creating and maintaining the filtering profile for the sub-group. Click the sub-group’s link to view a menu of sub-topics: Sub Group Details, Members, Sub Group Profile, Exception URL, Time Profile, Delete Sub Group, and Copy Sub Group.
Sub Group (IP Group) window The Sub Group (IP Group) window displays when Sub Group Details is selected from the menu. This window is used for viewing and adding or editing details on an IP group member. Fig. 3:1-28 Sub Group (IP Group) window View IP Sub-Group Details If the sub-group was previously defined, the fields in the Sub Group Details frame cannot be edited.
ROUP DMINISTRATOR ECTION Add IP Sub-Group Details If the sub-group was not previously defined, the fields in the IP Address frame and the Apply button remain activated. Fig. 3:1-29 Sub Group (IP Group) window 1. In the IP Address frame, click the appropriate radio TIP: Use the IP Range pull-down menu to view the IP address(es) that can be entered in these fields.
3. Click Apply to save your entries. Once applied, the Member fields become greyed-out and the Apply button becomes deactivated (see Fig. 3:1-28). Members window The Members window displays when Members is selected from the menu. This window is used for modifying the sub- group’s Member IP address.
ROUP DMINISTRATOR ECTION Modify Sub-Group Members The Modify Sub Group Member frame is comprised of the IP Address and MAC Address frames. 1. In the IP Address frame, specify whether to add or edit an TIP: Click Calculator to open the IP Calculator, and calculate IP ranges without any overlaps.
Exception URL window The Exception URL window displays when Exception URL is selected from the sub-group menu. This window is used for blocking sub-group members’ access to specified URLs and/or for letting sub-group members access specified URLs blocked at the minimum filtering level. NOTE: See the Exception URL window in the group tree section of this chapter for information on entries that can be made in this window.
ROUP DMINISTRATOR ECTION Copy Sub Group The Copy Sub Group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists. Copy an IP Sub-Group To copy configurations made for a specified sub-group: 1.
Page 377
1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Individual IP Individual IP includes options for creating and maintaining the filtering profile for the Individual IP member. Click the individual IP member’s link to view a menu of sub-topics: Members, Individual IP Profile, Exception URL, Time Profile, Delete Individual IP.
ROUP DMINISTRATOR ECTION Member window The member window displays when Members is selected from the menu. This window is used for modifying the indi- vidual IP member’s IP address. Fig. 3:1-32 Member window Enter the IP Address of the Member In the Modify Individual Group Member frame: 1.
Individual IP Profile window The Individual IP Profile window displays when Individual IP Profile is selected from the individual IP member menu. This window is used for viewing/creating the member’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options.
ROUP DMINISTRATOR ECTION Delete Individual IP Delete an Individual IP Member To delete an individual IP member, choose Delete Individual IP from the individual IP member menu. This action removes the member from the tree. 1: G HAPTER ROUP SCREEN ECHNOLOGIES ROXY LOCKER...
2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Chapter 2: Library screen Group administrators use windows and dialog boxes in the Library screen to look up URLs in library categories. Library categories are used when creating or modifying filtering profiles. Fig.
ROUP DMINISTRATOR ECTION Library Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel. This window is used for verifying whether or not a URL or search engine keyword or keyword phrase exists in a library category. Fig.
Look up a URL 1. In the URL Lookup frame, enter the URL. For example, enter http://www.playboy.com, playboy.com, or use a wildcard by entering *.playboy.com. A wildcard entry finds all URLs containing text that follows the period (.) after the asterisk (*). The following types of URL formats also can be entered in this field: •...
ROUP DMINISTRATOR ECTION Look up a Search Engine Keyword To see if a search engine keyword or keyword phrase has been included in any library category: 1. In the Search Engine Keyword Lookup frame, enter the 2. Click Lookup to display results in the Result Category 2: L HAPTER IBRARY SCREEN...
2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Custom Categories Custom Categories includes the ALLOW and BLOCK library categories. Click either ALLOW or BLOCK to view a menu of sub-topics: Library Details, URLs, URL Keywords, and Search Engine Keywords. Fig. 3:2-3 Library screen, custom library category menu NOTE: Maintaining the list of custom category URLs and keywords is the responsibility of the global administrator.
ROUP DMINISTRATOR ECTION Library Details window The Library Details window displays when Library Details is selected from the ALLOW or BLOCK library category’s menu of sub-topics. This window is used for editing the long name of the custom library category, and for viewing name criteria previously entered.
2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN URLs window The URLs window displays when URLs is selected from the custom library category’s menu of sub-topics. This window is used for viewing, adding and/or removing a URL from a custom library category’s master URL list or master wildcard URL list.
Page 388
ROUP DMINISTRATOR ECTION View a List of URLs in the Library Category To view a list of all URLs that either have been added or deleted from the master URL list or master wildcard URL list: 1. Click the View tab. 2.
Add or Remove URLs or Wildcard URLs The Action tab is used for making entries in the URLs window for adding or removing a URL or wildcard URL, uploading a master URL list or master wildcard URL list, or reloading the library. Add a URL to the Library Category To add a URL to the library category: 1.
Page 390
ROUP DMINISTRATOR ECTION Add a Wildcard URL to the Library Category NOTE: Wildcards are to be used for blocking only. They are not designed to be used for the exceptions function or the always allowed white listing function. To add a URL containing a wildcard to the library category: 1.
Page 391
Remove a URL from the Library Category To remove a URL or wildcard URL from the library category: 1. Click the Action tab. 2. Enter the URL in the Edit URL List frame or Edit Wild- Card URL List frame, as pertinent. 3.
ROUP DMINISTRATOR ECTION Upload a Master List to the Library Upload a Master List of URLs To upload a master file with URL additions: 1. Click Upload Master to open the Upload Custom Library 2. Click Browse to open the Choose file pop-up window. 3.
Page 393
4. Click Upload File to display the results of the library file content validation in the Library File Content/IP Lookup Options pop-up window: Fig. 3:2-8 Library File Content/IP Lookup Options URLs contained in the file are listed under the column for either Valid URL or Invalid URL.
ROUP DMINISTRATOR ECTION NOTE: In order for the URLs to take effect, library categories must be reloaded. Upload a Master List of Wildcard URLs To upload a master file with wildcard URL additions: 1. Click Upload Wildcard Master to open the Upload 2.
Page 395
3. Select the file to be uploaded. TIP: A wildcard URL text file must contain one wildcard URL per line. WARNING: The text file uploaded to the server will overwrite the current file. NOTE: Before the file is uploaded to the server, it will first be vali- dated 4.
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
Page 397
2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN URL Keywords window The URL Keywords window displays when URL Keywords is selected from the ALLOW or BLOCK library category’s menu of sub-topics. This window is used for adding or removing a URL keyword from a custom library category’s master list.
ROUP DMINISTRATOR ECTION WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked categories. For example, if all URL keywords containing “sex”...
After all changes have been made to library windows, in the Reload URL Keywords frame, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
Page 400
ROUP DMINISTRATOR ECTION Search Engine Keywords window The Search Engine Keywords window displays when Search Engine Keywords is selected from the ALLOW or BLOCK library category’s menu of sub-topics. This window is used for adding and removing search engine keywords and phrases to and from a custom library category’s master list.
WARNING: Use extreme caution when setting up search engine keywords for filtering. If a non-offending keyword contains the same consecutive characters as a keyword set up to be blocked, users will be denied the ability to perform a search using keywords that are not even in blocked categories.
After all changes have been made to library windows, in the Reload Search Keywords frame, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
Delete Category Delete a Custom Category To delete a custom library category, choose Delete Cate- gory from the menu. This action removes the library cate- gory from the Custom Categories list. ECHNOLOGIES ROXY LOCKER ROUP DMINISTRATOR UIDE 2: L ECTION HAPTER IBRARY SCREEN...
UPPORT RODUCT ECHNICAL ARRANTIES Technical Support For technical support, visit 8e6 Technologies’s Technical Support Web page at http://www.8e6.com/support.html, or contact us by phone, by email, or in writing. Hours Regular office hours are from Monday through Friday, 8 a.m. to 5 p.m. PST.
Office Locations and Phone Numbers 8e6 Corporate Headquarters (USA) 828 West Taft Avenue Orange, CA 92865-4232 Local Domestic US International 8e6 Taiwan 7 Fl., No. 1, Sec. 2, Ren-Ai Rd. Taipei 10055 Taiwan, R.O.C. Taipei Local Domestic Taiwan : International ECHNOLOGIES ROXY LOCKER...
ECHNICAL UPPORT RODUCT Support Procedures When you contact our technical support department: • You will be greeted by a technical professional who will • If your issue needs to be escalated, you will be given a • If your issue requires immediate attention, such as your •...
ARRANTIES Product Warranties Standard Warranty 8e6 Technologies warrants the medium on which the 8e6 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “Warranty Period”) from the date of delivery. This standard Warranty Period applies to both new and refurbished equip- ment for a period of one year from the delivery date.
UPPORT RODUCT Technical Support and Service 8e6 Technologies will provide initial installation support and technical support for up to 90 days following installation. 8e6 Technologies provides after-hour emergency support to 8e6 server customers. An after hours technician can be reached by voice line.
If parts are discontinued from production during the Warranty Period, immediate replacement product(s) or hardware parts will be available for exchange with defective parts from 8e6 Technologies’ local reseller or distributor. Extended Technical Support and Service Extended technical support is available to customers under a Technical Support Agreement.
PPENDICES ECTION PPENDIX PPENDICES Appendix A Filtering Profile Format and Rules A filtering profile must be set up in a specified format, containing the following items: 1. The username or group name 2. IP address 3. Filtering profile criteria: 4. Redirect URL (optional) 5.
Rule Criteria Rule criteria consists of selections made from the following lists of codes that are used in profile strings: • Port command codes: message • Port Numbers: 21 = 80 = 119 = 443 = Other • Filter Mode Values: ECHNOLOGIES ROXY LOCKER...
Page 412
PPENDICES ECTION PPENDIX • Category command codes: • Category Codes: NOTE: The list of library category codes and corresponding descriptions is subject to change due to the addition of new cate- gories and modification of current categories. For explanations and examples of category items, go to http://www.8e6.com/ database-categories.html Category command codes must be entered in the following order: J, R, M, I.
• Filter Option codes: • 0x1 • 0x2 • 0x4 Enforcement • 0x100 = Search Engine Keyword • 0x200 = URL Keyword • 0x1000= Extend URL Keyword Filter Control NOTE: To enable multiple filter codes, add the codes together. For example, to enable all features for an IP profile, add 1 + 2 + 4 + 100 + 200 + 1000 = 1307, which means that 0x1307 should be entered at the end of the profile string (unless the quota option is used, in which case the quota should be entered at the end of the...
Your ProxyBlocker receives 8e6 supplied library category updates and software updates via Traveler, 8e6’s execut- able program for updating the ProxyBlocker server. You can run Traveler on demand via the Manual Update to 8e6 Supplied Categories window, or schedule Traveler to launch at a specified time via the Configuration window.
General Activity Startup, Finish • Logging to: <log file> • Start running Traveler • Traveler has finished running. Command Executed More than Once • Traveler is running, cannot start another traveler. • Installscript is running, cannot start another traveler. • Traveler_Full_Download is running, cannot start another traveler.
PPENDICES ECTION PPENDIX Library Download Process • <filename> needs to be updated. • <filename> does not need to be updated. • Preparing for download • Prepare for download -- Fail • Downloading files • Processing downloaded files • Processing downloaded files -- Fail •...
PPENDICES ECTION PPENDIX Error Messages • Running Traveler encounters an exception. • Alert emails could not be read. "<email alert configuration • Reloading library encounters an exception • Send alert encountered an exception • Traveler exits after reaching time limit: <time limit> mins •...
PPENDICES ECTION PPENDIX Full URL Library Update (URLs, URL Keywords) • Download full library: • Failed to download <category> library • Successfully download <category> library! • Failed to unzip <category> • Full URL Library Update has completed. All Library Updates (includes all other msgs.) •...
Select either of the following options to modify the Proxy- Blocker. Option 1 lets you modify the back end, and Option 2 lets you modify the ProxyBlocker console. Option 1: Modify the back end • PROS: No need to set up the redirect URL for each •...
2. Set the redirect URL to: http://<server for block_page>[:<port for block page>]/<blockpage> NOTE: The ProxyBlocker does not accept the URL with a port setting (:<port for block page>), so to get around this the block page must be placed at the default HTTP port, which is 80. Since the console may not allow certain characters (e.g.
PPENDICES ECTION PPENDIX Part II: Customize the Block Page 1. Set up a Web server A Web server must be set up to hold the customized block page. 2. Create a customized block page The customized block page must be accessible via this link: http://<server for block_page>[:<port for block page>]/ <blockpage>...
3. CGI written in C See the Reference portion of this appendix for coding details. NOTE: Don’t forget to replace <ProxyBlocker IP> with the real IP in the HTML/CGI before using these samples. Part III: Restart the ProxyBlocker You must restart the unit to make your changes effective.
ECTION PPENDIX Reference HTML <!-- Description: Sample HTML for ProxyBlocker customized block page --> <!-- Replace <ProxyBlocker IP> with real IP before using --> <!-- Revision: 1 --> <!-- Date: 03/08/2004 --> <html> <head> <script language=javascript> function parseData(str, start, end) start.length);...
Page 427
<input type=hidden name="URL" value=""> <input type=hidden name="IP" value=""> <input type=hidden name="CAT" value=""> <input type=hidden name="USER" value=""> <input type=hidden name="STEP" value="STEP2"> </form> <br>ProxyBlocker Customized Block Page (HTML using Java Script to parse and post form data)<br> <script language=javascript> getData(); showData(); </script>...
# Original Filename: cusp_block1.cgi # File Type: # Description: block page # Replace the <ProxyBlocker IP> with the real IP before using. # This script provide data to the options CGI through query string # Revision: # Date: 03/08/2004 $method = $ENV{'REQUEST_METHOD'};...
# Original Filename: cusp_block2.cgi # File Type: # Description: block page # Replace the <ProxyBlocker IP> with the real IP before using. # This script uses Java Script to post form data to # options CGI # Revision: # Date: 03/08/2004 $method = $ENV{'REQUEST_METHOD'};...
Page 430
"<input type=hidden name=\"URL\" value=\"$url\">\n"; print "<input type=hidden name=\"CAT\" value=\"$cat\">\n"; print "<input type=hidden name=\"USER\" value=\"$user\">\n"; print "<input type=hidden name=\"STEP\" value=\"STEP2\">\n"; print "<br>ProxyBlocker Customized Block Page (CGI written with Perl using Java Script to post form data)<br>\n"; print "URL: $url<br>\n"; print "IP: $ip<br>\n";...
CGI written in C * cusc_block.c * Description: sample C source code of CGI for customized block page * Replace <ProxyBlocker IP> with real IP and recompile before using * Revision: 1 * Date: 03/08/2004 #include <stdio.h> struct { char *name;...
Page 433
Customized Block Page (CGI written with C using Java Script to post form data)<br>\n"); printf("URL: %s<br>\n", szURL); printf("IP: %s<br>\n", szIP); printf("CAT: %s<br>\n", szCategory); printf("USER: %s<br>\n", szUserName);...
Page 435
int wsize; char *word; int ll; wsize = 102400; ll=0; word = (char *) malloc(sizeof(char) * (wsize + 1)); while(1) *)realloc(word,sizeof(char)*(wsize+1)); ++ll; /* to_upper: * Change the string to upper case int to_upper(char *string) int len; int i; char *tmp=NULL; if (string &&...
PPENDICES ECTION PPENDIX Appendix D Override Pop-up Blockers An override account user with pop-up blocking software installed on his/her workstation will need to temporarily disable pop-up blocking in order to authenticate him/herself via the Options page: Fig. D-1 Options page This appendix provides instructions on how to use an over- ride account if typical pop-up blocking software is installed, as in the following products: Yahoo! Toolbar, Google...
PPENDICES ECTION PPENDIX Yahoo! Toolbar Pop-up Blocker If Pop-up Blocking is Enabled 1. In the Options page (see Fig. D-1), enter your Username 2. Press and hold the Ctrl key on your keyboard while Add Override Account to the White List If the override account window was previously blocked by the Yahoo! Toolbar, it can be moved from the black list and added to the white list so that it will always be allowed to...
Page 439
Fig. D-3 Allow pop-ups from source 3. Select the source from the Sources of Recently Blocked Pop-Ups list box to activate the Allow button. 4. Click Allow to move the selected source to the Always Allow Pop-Ups From These Sources list box. 5.
PPENDICES ECTION PPENDIX Google Toolbar Pop-up Blocker If Pop-up Blocking is Enabled 1. In the Options page (see Fig. D-1), enter your Username 2. Press and hold the Ctrl key on your keyboard while Add Override Account to the White List To add the override account window to the white list so that it will always be allowed to pass, go to the Google Toolbar and click the # blocked icon:...
AdwareSafe Pop-up Blocker If Pop-up Blocking is Enabled 1. In the Options page (see Fig. D-1), enter your Username and Password. 2. Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button—this action opens the override account pop-up window. Temporarily Disable Pop-up Blocking AdwareSafe’s SearchSafe toolbar lets you toggle between enabling pop-up blocking (# popups blocked) and disabling...
PPENDICES ECTION PPENDIX Mozilla Firefox Pop-up Blocker Add Override Account to the White List 1. From the browser, open the Preferences dialog box. 2. Go to the Category list box and select Privacy & Security 3. With the “Block unrequested popup windows” checkbox 4.
Windows XP SP2 Pop-up Blocker Set up Pop-up Blocking There are two ways to enable the pop-up blocking feature in the IE browser. Use the Internet Options dialog box 1. From the IE browser, go to the toolbar and select Tools > Internet Options to open the Internet Options dialog box.
PPENDICES ECTION PPENDIX Use the IE Toolbar In the IE browser, go to the toolbar and select Tools > Pop- up Blocker > Turn On Pop-up Blocker: Fig. D-8 Toolbar setup When you click Turn On Pop-up Blocker, this menu selec- tion changes to Turn Off Pop-up Blocker and activates the Pop-up Blocker Settings menu item.
Page 445
Add Override Account to the White List There are two ways to disable pop-up blocking for the over- ride account and to add the override account to your white list. Use the IE Toolbar 1. With pop-up blocking enabled, go to the toolbar and select Tools >...
PPENDICES ECTION PPENDIX Use the Information Bar With pop-up blocking enabled, the Information Bar can be set up and used for viewing information about blocked pop- ups or allowing pop-ups from a specified site. Set up the Information Bar 1. Go to the toolbar and select Tools > Pop-up Blocker > 2.
Page 447
3. Click the Information Bar for settings options: Fig. D-11 Information Bar menu options 4. Select Always Allow Pop-ups from This Site—this action opens the Allow pop-ups from this site? dialog box: Fig. D-12 Allow pop-ups dialog box 5. Click Yes to add the override account to your white list and to close the dialog box.
PPENDIX Appendix E Configure ProxyBlocker for ER Reporting When configuring the ProxyBlocker to be used with an ER unit, the following procedures must be completed in order for the ER to receive logs from the ProxyBlocker. Entries in the ProxyBlocker Admin console 1.
Page 449
Remove. 4. After the ER has been configured, and logs have been transferred from the ProxyBlocker to the ER, click the Log tab to view transfer activity. 5. On the Log tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
Page 450
PPENDICES ECTION PPENDIX Entries in the ER Administrator console To see if log files have transferred: 1. Access the ER’s Administrator console. 2. From the Database pull-down menu, choose Tools to 3. From the Database Status menu, choose File Watch Log. 4.
ECTION PPENDIX Appendix F RAID Maintenance This appendix pertains to ProxyBlocker “SL” servers and is divided into three parts: Hardware Components, Server Interface, and Troubleshooting—in the event of a failure in one of the drives, power supplies, or fans. NOTE: As part of the ongoing maintenance procedure for your RAID server, 8e6 recommends that you always have a spare drive and spare power supply on hand.
PPENDICES ECTION PPENDIX Part 2: Server Interface LED indicators in SL units On an “SL” unit, the following LED indicators for software and hardware status monitoring display on the left side of the front panel: • FLTR = Filtering Status •...
Page 453
LED Indicator Chart Below is a chart of LED indicators in the “SL” unit: Indicator FLTR LIBR RAID UPDT ECHNOLOGIES ROXY LOCKER Color Condition Green Amber Green Amber Green Amber UIDE PPENDICES ECTION PPENDIX Description Filtering traffic Library being uploaded or one or more processes being started Not filtering traffic...
Page 454
PPENDICES ECTION PPENDIX Front control panels on SL units Control panel buttons, icons, and LED indicators display on the right side of the front panel. The buttons let you perform a function on the unit, while an LED indicator corresponding to an icon alerts you to the status of that feature on the unit.
Page 455
PPENDICES ECTION PPENDIX HDD (icon) – In addition to displaying in the control panel, this icon also displays on the front panel on each hard drive carrier. Hard drive activity is indi- cated by an amber LED. An unlit LED on a drive carrier may indicate a hard drive failure.
PPENDICES ECTION PPENDIX Part 3: Troubleshooting The text in this section explains how the server alerts the administrator to a failed component, and what to do in the event of a failure. Hard drive failure Step 1: Review the notification email If a hard drive fails, a notification email is sent to the admin- istrator of the server.
PPENDICES ECTION PPENDIX Step 2: Verify the failed drive in the Admin console The Hardware Failure Detection window in the Adminis- trator console is accessible via the System > Hardware Failure Detection menu selection: Fig. F-2 Hardware Failure Detection window The Hardware Failure Detection window displays the current RAID Array Status for the two hard drives (HD 1 and HD 2) at the right side of the window.
PPENDICES ECTION PPENDIX Step 3: Replace the failed hard drive After verifying the failed hard drive in the Administrator console, go to the server to replace the drive. Press the red release button to release the handle on the carrier, and then extend the handle fully and pull the carrier out towards you.
PPENDICES ECTION PPENDIX Step 4: Rebuild the hard drive Once the failed hard drive has been replaced, return to the Hardware Failure Detection window in the Administrator console, and click Rebuild to proceed with the rebuild process. WARNING: When the RAID array reconstruction process begins, the Administrator console will close and the hard drive will become inaccessible.
PPENDICES ECTION PPENDIX Step 3: Replace the failed power supply Remove the failed power supply by locating the red release tab (1) and pushing it to the right (2), then lifting the curved metal handle and pulling the power supply module towards you (3).
PPENDICES ECTION PPENDIX Fan failure Identify a fan failure A flashing red LED indicates a fan failure. If this displays on your unit, contact Technical Support for an RMA (Return Merchandise Authorization) number and for instructions on returning the unit to 8e6. A steady red LED (on and not flashing) indicates an over- heating condition, which may be caused by cables obstructing the airflow in the system or the ambient room...
- An authorized administrator of the network who maintains all aspects of the ProxyBlocker, except for managing master IP groups and their members, and their associated filtering profiles. The global adminis- trator configures the ProxyBlocker, sets up master IP groups, and performs routine maintenance on the server.
Page 463
- IM involves direct connections between workstations either locally or across the Internet. Using this feature of the ProxyBlocker, groups and/or indi- vidual client machines can be set up to block the use of IM services specified in the library category.
Page 464
PPENDICES ECTION PPENDIX master IP group - An IP group set up in the tree menu in the Group section of the console, comprised of sub-groups and/or individual IP filtering profiles. master list - A list of additional URLs that is uploaded to a custom category’s URLs window.
Page 465
Using this feature of the ProxyBlocker, groups and/or individual client machines can be set up to block the use of P2P services specified in the library category.
Page 466
URLs for a specified time before being blocked from further access to that category Real Time Probe - On the ProxyBlocker, this tool is used for monitoring the Internet activity of specified users in real time. The report generated by the probe lets the adminis- trator know whether end users are using the Internet appro- priately.
Page 467
PPENDICES ECTION PPENDIX Traveler - 8e6’s executable program that downloads updates to your ProxyBlocker on demand or at a scheduled time. URL - An abbreviation for Uniform Resource Locator, the global address of Web pages and other resources on the Internet.
Page 472
NDEX filter options 224 menu 201 override account 228 port profile 222 Global Group Profile window 218 Google Web Accelerator 58 Google/Yahoo! Safe Search Enforcement global group filter option 225 grid, terminology 5 group create IP group 246 delete profile 354 global 13 IP 14 types of 13...
Need help?
Do you have a question about the ProxyBlocker and is the answer not in the manual?
Questions and answers