8e6 Technologies R3000IR User Manual

8e6 Technologies R3000IR User Manual

Enterprise filter
Hide thumbs Also See for R3000IR:
Table of Contents

Advertisement

Quick Links

8e6
R3000
| Enterprise Filter
R
USER
GUIDE
Model: R3000IR
Release 2.0.00 / Version No.: 1.02

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the R3000IR and is the answer not in the manual?

Questions and answers

Summary of Contents for 8e6 Technologies R3000IR

  • Page 1 R3000 | Enterprise Filter USER GUIDE Model: R3000IR Release 2.0.00 / Version No.: 1.02...
  • Page 2 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 3 8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the exam- ples herein.
  • Page 4 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 5: Table Of Contents

    ONTENTS ..........1 NTRODUCTORY ECTION R3000 Enterprise Filter ............... 1 About this User Guide ..............1 How to Use this User Guide ............3 Conventions ..................3 Terminology ..................4 Overview ..................9 Environment Requirements ............. 10 Workstation Requirements .............. 10 Network Requirements ..............
  • Page 6 ONTENTS Service Ports ................24 Rules ..................24 Minimum Filtering Level ............24 Filter Settings ................25 Filtering Rules ................. 26 Filtering Levels Applied ............26 Chapter 2: Logging and Blocking ..........28 Web Access Logging ..............28 Instant Messaging, Peer-to-Peer Blocking ........29 How IM and P2P Blocking Works ..........
  • Page 7 ONTENTS Source Server Failure Scenarios ..........45 Establish Backup Procedures ........... 45 Use a Backup File to Set up a Source Server ......46 Set up a Target Server as a Source Server ......46 Set up a Replacement Target Server........47 Set up a New Source Server from Scratch .......
  • Page 8 ONTENTS Enable Local Filtering Options........73 Service Blocking..............73 Enable Options for IM, P2P .......... 73 Disable Options for IM, P2P ......... 74 HTTPS Filtering..............74 Service Control..............75 Enable Proxy Pattern Blocking ........75 Disable Proxy Pattern Blocking ........75 Target(s) Filtering..............
  • Page 9 ONTENTS Command Selections ............103 Ping................103 Trace Route ..............103 Process list ..............103 TOP CPU processes ..........104 NIC configuration ............104 Active connections............104 Routing table............... 104 Current memory usage ..........105 CPU usage ..............105 System performance........... 105 Recent logins ..............
  • Page 10 ONTENTS View the Contents of the Log........133 Save, Print the Log File Contents ....... 135 Synchronization ................136 Setup window ................. 137 Using Only One R3000 on the Network ......138 Using More than One R3000 on the Network ....138 Set up an R3000 to be a Source Server.....
  • Page 11 ONTENTS View Backup and Restoration Details ....... 168 Reset ..................... 169 Reset window ................. 169 Radius Authentication Settings ............. 170 Radius Authentication Settings window ........170 Enable Radius..............171 Specify Radius Authentication Settings ...... 171 Apply Settings............. 172 Disable Radius ..............173 SNMP ....................
  • Page 12 ONTENTS Close the Pop-up Window .......... 190 Warn Option Setting ..............191 Warn Option Setting window ..........191 Specify the Interval for Re-displaying the Warn page ..192 Customization ................193 Common Customization window ..........194 Enable, Disable Features..........195 Lock Page Customization window ..........
  • Page 13 ONTENTS Add an Override Account ..........240 Category Profile ............241 Redirect URL .............. 243 Filter Options .............. 244 Edit an Override Account ..........247 Change the Password ..........247 Modify an Override Account ........247 Delete an Override Account ..........248 Upload/Download IP Profile window ........
  • Page 14 ONTENTS View the Contents of the Log........275 Save, Print the Log File Contents ....... 277 Emergency Update Log window ..........279 View the Emergency Software Update Process ....280 Download the Software Update Log File......280 Library Lookup ................281 Library Lookup window ............
  • Page 15 ONTENTS Remove a URL Keyword from the Library ....302 Upload a List of URL Keywords to the Library ....303 Upload a List of URL Keyword Additions....303 Upload a List of URL Keyword Deletions....304 Reload the Library............. 304 Search Engine Keywords window ..........
  • Page 16 ONTENTS Select a Graph to View ............. 327 Recent Trend .............. 327 Daily Peaks..............328 Shadow Log Format ..............329 Shadow Log Format window ..........329 Specify the Shadow Log Format ........330 Auto-detect option............330 Post 2.0 log format option........... 331 Post 1.9 log format option...........
  • Page 17 ONTENTS Filter Options..............353 Create, Edit the Filter Options ........354 Exception URL window ............356 Block URL frame ............... 357 ByPass URL frame............357 Apply Settings ..............357 Time Profile window ............... 358 Add a Time Profile............. 359 Category Profile ............360 Redirect URL ..............
  • Page 18 ONTENTS Individual IP Profile window ............ 383 Exception URL window ............383 Time Profile window ............... 383 Delete Individual IP ..............384 Delete an Individual IP Member ........384 Chapter 2: Library screen ............385 Library Lookup ................386 Library Lookup window ............386 Look up a URL ..............
  • Page 19 ONTENTS Upload a Master List of Search Engine Keywords.... 410 Reload the Library............. 410 Delete Category ..............411 Delete a Custom Category..........411 ..412 ECHNICAL UPPORT RODUCT ARRANTIES Technical Support ..............412 Hours ..................... 412 Contact Information ............... 412 Domestic (United States) ............412 International ................
  • Page 20 ONTENTS Error Messages..............425 Weekly Update (7 Days Library) ..........426 Summary Messages ............426 Full URL Library Update (URLs, URL Keywords) ....427 All Library Updates (includes all other msgs.) ......427 IM and P2P Pattern File Update ........427 Newsgroup Library Update (News) ........
  • Page 21 ONTENTS If Pop-up Blocking is Enabled ..........448 Temporarily Disable Pop-up Blocking ........448 Mozilla Firefox Pop-up Blocker ............. 449 Add Override Account to the White List ........449 Windows XP SP2 Pop-up Blocker ..........450 Set up Pop-up Blocking ............450 Use the Internet Options dialog box........
  • Page 22 ONTENTS Windows option: Force reboot with user logged in ..482 Save settings .............. 482 Mobile Client Deployment to Windows Computers ... 483 Deployment to a group ..........483 Installation on a single computer ........ 486 Mobile Client Removal from Computers ......487 Uninstallation from a Windows group ......
  • Page 23: Introductory Section

    ILTER NTRODUCTORY ECTION R3000 Enterprise Filter 8e6 Technologies’ R3000 Enterprise Filter offers an enhanced solution for Internet filtering on a network, based on the methodologies employed by the company’s R3000 Enterprise Filter, R2000 Enterprise Edition, and R2000 Authentication Module products. As with these applications, the R3000 tracks each user’s online activity, and can be...
  • Page 24 NTRODUCTORY ECTION BOUT THIS UIDE See the R3000 Authentication User Guide at http:// www.8e6.com/docs/r3000_auth2.pdf for information on authentication. This user guide is organized into the following sections: • Introductory Section - This section is comprised of an overview on filtering, Web access logging, instant messaging and peer-to-peer blocking, and synchronizing multiple R3000 units.
  • Page 25: How To Use This User Guide

    NTRODUCTORY ECTION OW TO SE THIS UIDE the 8e6 Mobile Client. Appendix F features a glossary of technical terminology used in this user guide. • Index - This section includes an index of subjects and the first page numbers where they appear in this user guide.
  • Page 26: Terminology

    NTRODUCTORY ECTION OW TO SE THIS UIDE Terminology The following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box that opens in response to an entry you made in a dialog box, window, or screen.
  • Page 27 NTRODUCTORY ECTION OW TO SE THIS UIDE entry, or displays pertinent information. A text box is a type of field. • frame - a boxed-in area in a dialog box, window, or screen that includes a group of objects such as fields, text boxes, list boxes, buttons, radio buttons, check- boxes, and/or tables.
  • Page 28 NTRODUCTORY ECTION OW TO SE THIS UIDE • pop-up box or pop-up window - a box or window that opens after you click a button in a dialog box, window, or screen. This box or window may display information, or may require you to make one or more entries.
  • Page 29 NTRODUCTORY ECTION OW TO SE THIS UIDE • sub-topic - a subset of a main topic that displays as a menu item for the topic. The menu of sub-topics opens when a perti- nent topic link in the left panel—the navigation panel—of a screen is clicked.
  • Page 30 NTRODUCTORY ECTION OW TO SE THIS UIDE • tree - a tree displays in the naviga- tion panel of a screen, and is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign when the branch is collapsed.
  • Page 31: Overview

    NTRODUCTORY ECTION VERVIEW Overview The R3000’s Administrator console is used by the global administrator—and group administrator, as required—to configure the R3000 server to perform the following basic functions: • filter URLs (Web addresses) on the Internet • log traffic on the Internet and, if applicable for your organization: •...
  • Page 32: Environment Requirements

    NTRODUCTORY ECTION NVIRONMENT EQUIREMENTS Environment Requirements Workstation Requirements Minimum system requirements for the administrator include the following: • Windows 2000 or later operating system (not compatible with Windows server 2003) • Internet Explorer (IE) 5.5 or later • JavaScript enabled •...
  • Page 33: Chapter 1: Filtering Operations

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Chapter 1: Filtering Operations Operational Modes Based on the setup of your network, the R3000 can be configured to use one of these operational modes for filtering the network: • invisible mode • router mode •...
  • Page 34: Invisible Mode

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Invisible Mode If the R3000 is set up in the invisible mode, the unit will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment.
  • Page 35 1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS When users (Client PCs) make Internet requests, the traffic flows (1) through the network path without interruption. The R3000 captures the request as the user’s request (2) leaves the network. The R3000 then determines the action (3) to either block or pass the request.
  • Page 36: Router Mode

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Router Mode If the R3000 is set up in the router mode, the unit will act as an Ethernet router, filtering IP packets as they pass from one card to another. While all original packets from client PCs are allowed to pass, if the R3000 determines that a request is inappropriate, a block page is returned to the client to replace the actual requested Web page or service.
  • Page 37: Firewall Mode

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS WARNING: 8e6 recommends contacting one of our solutions engineers if you need assistance with router mode setup proce- dures. Firewall Mode The firewall mode is a modification of the router mode. With the R3000 set up in this mode, the unit will filter all requests. If the request is appropriate, the original packet will pass unchanged.
  • Page 38 R3000. WARNING: Contact a solutions engineer at 8e6 Technologies for setup procedures if you wish to use the firewall mode. Fig. 1:1-5 Firewall mode diagram, with filtering and cache setup...
  • Page 39: Group Types

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Group Types After the operational filtering mode is configured on the R3000, the group type(s) that will be used on the R3000 must be set up so that filtering can take place. In the Group section of the Administrator console, group types are structured in a tree format in the navigation panel.
  • Page 40: Ip Groups

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS IP Groups The IP group type is represented in the tree by the IP icon . A master IP group is comprised of sub-group members and/or individual IP members The global administrator adds master IP groups, adds and maintains override accounts at the global level, and estab- lishes and maintains the minimum filtering level.
  • Page 41: Filtering Profile Types

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Filtering Profile Types A filtering profile is used by all users who are set up to be filtered on the network. This profile consists of rules that dictate whether a user has access to a specified Web site or service on the Internet.
  • Page 42: Static Filtering Profiles

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS • override account profile - set up in either the global group section or the master group section of the console. • lock profile - set up under X Strikes Blocking in the Filter Options section of the profile.
  • Page 43: Active Filtering Profiles

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Active Filtering Profiles Active filtering profiles include the global group profile, over- ride account profile, time profile, and lock profile. NOTE: For information about authentication filtering profiles, see the R3000 Authentication User Guide. Global Filtering Profile The global filtering profile is created by the global adminis- trator.
  • Page 44: Filtering Profile Components

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Filtering Profile Components Filtering profiles are comprised of the following compo- nents: • library categories - used when creating a rule, minimum filtering level, or filtering profile for the global group or any entity •...
  • Page 45: Library Categories

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Library Categories A library category contains a list of Web site addresses and keywords for search engines and URLs that have been set up to be blocked or white listed. Library categories are used when creating a rule, the minimum filtering level, or a filtering profile.
  • Page 46: Service Ports

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Service Ports Service ports are used when setting up filter segments on the network (the range of IP addresses/netmasks to be detected by the R3000), the global (default) filtering profile, and the minimum filtering level. When setting up the range of IP addresses/netmasks to be detected, service ports can be set up to be open (ignored).
  • Page 47: Filter Settings

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS NOTE: If the minimum filtering level is not set up, global (default) filtering settings will apply instead. If an override account is established at the IP group level for a member of a master IP group, filtering settings made for that end user will override the minimum filtering level if the global administrator sets the option to allow the minimum filtering level to be bypassed.
  • Page 48: Filtering Rules

    1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Filtering Rules Filtering Levels Applied 1. The global (default) filtering profile applies to any user who does not belong to a master IP group. 2. If the minimum filtering level is defined, it applies to all master IP groups and members assigned filtering profiles.
  • Page 49 1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS trator allows override accounts to bypass the minimum filtering level, or if the override account was set up in the global group tree. NOTE: An override account set up in the master group section of the console takes precedence over an override account set up in the global group section of the console.
  • Page 50: Chapter 2: Logging And Blocking

    2: L NTRODUCTORY ECTION HAPTER OGGING AND LOCKING Chapter 2: Logging and Blocking Web Access Logging One of the primary functions of the R3000 is to log the activity of users on the Internet. Information captured in the R3000 log files are transferred to the Enterprise Reporter (ER) where they are “normalized”...
  • Page 51: Instant Messaging, Peer-To-Peer Blocking

    2: L NTRODUCTORY ECTION HAPTER OGGING AND LOCKING Instant Messaging, Peer-to-Peer Blocking The R3000 has options for blocking and/or logging the use of Instant Messaging and Peer-to-Peer services, and makes use of Intelligent Footprint Technology (IFT) for greatly increasing management and control of these popular—yet potentially harmful—applications.
  • Page 52: P2P Blocking

    2: L NTRODUCTORY ECTION HAPTER OGGING AND LOCKING P2P Blocking Peer-to-Peer (P2P) involves communication between computing devices—desktops, servers, and other smart devices—that are linked directly to each other. Using this feature of the R3000, groups and/or individual client machines can be set up to block the use of P2P services specified in the library category.
  • Page 53: Using Im And P2P

    2: L NTRODUCTORY ECTION HAPTER OGGING AND LOCKING Using IM and P2P To solely log IM and/or P2P user activity, settings need to be made in the Filter window. To additionally block specified groups and/or users from using components and features of IM and/or P2P, settings need to be made in the Group section of the Administrator console.
  • Page 54: Block P2P For All Users

    2: L NTRODUCTORY ECTION HAPTER OGGING AND LOCKING Block P2P for All Users To block P2P for all users on the network: • the P2P option in the Filter window must be activated • the global filtering profile must have the PR2PR library category set up to be blocked •...
  • Page 55: Block P2P For A Specific Entity

    2: L NTRODUCTORY ECTION HAPTER OGGING AND LOCKING Block P2P for a Specific Entity To block P2P for a specified group or user: • the P2P option in the Filter window must be activated • the PR2PR library category must be set up to be blocked for that entity •...
  • Page 56: Chapter 3: Synchronizing Multiple Units

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Chapter 3: Synchronizing Multiple Units R3000 Synchronization The R3000 can function in one of three modes—“Stand Alone” mode, “Source” mode, or “Target” mode—based on the setup within your organization. In a multi-R3000 server environment, all R3000 units should be set up with the same user profile data, so that no matter which R3000 server a user’s PC accesses on the network, that user’s Internet...
  • Page 57: Source Mode

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS UNCTIONAL ODES Stand Alone Mode In the Stand Alone mode, the R3000 functions as the only Internet filter on the network. This mode is used if there is only one R3000 on the network. Synchronization does not occur in this mode.
  • Page 58: Synchronization Setup

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Synchronization Setup To set up synchronization on an R3000 unit, a selection must be made in Setup window from the System section of the R3000 console to specify whether the R3000 will func- tion as a source server or as a target server.
  • Page 59: Types Of Synchronization Processes

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS WARNING: If an R3000 server is set up in the Target mode with a NAT device between the target and source server, be sure that ports 26262 and 26268 are open on the target server. This setup is required so that the target server can communicate with the source server.
  • Page 60: Library Synchronization Process

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS If the target server is rebooted for any reason (loss of power etc.) upon bootup, the target server will actively download and apply the current running configuration from the source server. It will then also receive future changes made on the source server.
  • Page 61: Delays In Synchronization

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Delays in Synchronization When a filtering profile is applied to the source server, there is a slight delay in the time it takes to apply the profile to the target server. This delay is caused by the amount of time it takes the source server to process the change, prepare the update for submission, send the update, and finally to acti- vate the update on the target server.
  • Page 62: Synchronized, Non-Synchronized Items

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Synchronized, Non-Synchronized Items It is important to note that while some items are synchro- nized to the target R3000s, they do not become permanent configurations on the target R3000. These items are in essence functionally synchronized, since they are configu- rations that the target R3000s will read from the source R3000 upon load.
  • Page 63: Synchronize All Items

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Synchronize All Items The following lists show which items will be synchronized when the option to synchronize all items is selected. Synchronized Items (All) • 8e6 Library additions/deletions • Custom library creations •...
  • Page 64: Non-Synchronized Items

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Non-synchronized Items • Filter control settings • Virtual IP and Authentication IP addresses • IP addresses • Default routes • Patch application • Synchronization settings • Filter Mode • NIC Configuration • Backup/Restore •...
  • Page 65: Synchronize Only Library Items

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Synchronize Only Library Items The following lists show which items will be synchronized when the option to synchronize only library items is selected. Synchronized Items (Library Only) • 8e6 Library additions/deletions • Custom library creations •...
  • Page 66 3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS • NT/LDAP User/Group: additions/deletions, changes, filter changes, profile activation/deactivation • Filter control settings • Virtual IP and Authentication IP addresses • IP addresses • Default routes • Patch application • Synchronization settings •...
  • Page 67: Server Maintenance Procedures

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Server Maintenance Procedures Source Server Failure Scenarios In the event that the source R3000 unit should fail, the target servers will continue to run using the last known configura- tion loaded from the source server. However, all dynamic authentication-based profiles will eventually time-out, since the source R3000 server can no longer verify user creden- tials.
  • Page 68: Use A Backup File To Set Up A Source Server

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Use a Backup File to Set up a Source Server In the event of a source server failure, the global adminis- trator should designate a target server as the new source server. Set up a Target Server as a Source Server 1.
  • Page 69: Set Up A Replacement Target Server

    3: S NTRODUCTORY ECTION HAPTER YNCHRONIZING ULTIPLE NITS Set up a Replacement Target Server Once the original source server is replaced or repaired, it can then be configured to replace the empty spot created by the movement of the target server to the position of source server.
  • Page 70: Chapter 4: Getting Started

    IP address on your network. NOTE: If you do not have the R3000IR Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you.
  • Page 71 4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Fig. 1:4-1 R3000 Introductory Window NOTE: The R3000 Introductory Window must be left open throughout your session. This window displays minimized when the Login dialog box opens. 4. When the Login dialog box opens, enter your Username and Password: Fig.
  • Page 72 4: G NTRODUCTORY ECTION HAPTER ETTING TARTED 5. Click OK to close the login dialog box and to access the welcome screen of the Administrator console: Fig. 1:4-3 Welcome screen On this screen, the R3000 Version Number displays in the Product frame, and dates for the Last Patch Update and Last Library Update display in the R3000 Enterprise Filter Status frame.
  • Page 73: Last Library Update Message

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Last Library Update message If it has been more than seven days since the R3000 last received updates to library categories, upon logging into the Administrator console a pop-up dialog box opens and displays the following message: ”Libraries were last updated more than 7 days ago.
  • Page 74 4: G NTRODUCTORY ECTION HAPTER ETTING TARTED , Last Library Update text Fig. 1:4-4 Welcome screen Click the checkbox “Do not show “Old Library Warning” dialog box in future” to disable the Last Library Update message pop-up box. After the libraries are updated, the welcome screen will appear as in Fig.
  • Page 75: Navigation Tips

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Navigation Tips Access Main Sections The Administrator console is organized into six sections, each accessible by clicking the corresponding button in the navigational bar at the top of the screen: • Home - clicking this button displays the welcome screen of the Administrator console.
  • Page 76 4: G NTRODUCTORY ECTION HAPTER ETTING TARTED • Help - clicking this button displays the Help screen. This screen includes navigational tips and a link to the PDF copy of this User Guide: Fig. 1:4-5 Help screen , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 77: Help Features

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Help Features Help features provide information about how to use windows in the Administrator console. Such features include help topics and tooltips. Access Help Topics Each of the main section screens contains a link beneath the banner.
  • Page 78: Tooltips

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Tooltips In any window that features the icon, additional information about that window can be obtained by hovering over that icon with your mouse, or by pressing the F1 key on your keyboard. •...
  • Page 79: Screen And Window Navigation

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED • Help pop-up box The Help pop-up box opens when you press the F1 key on your keyboard: Fig. 1:4-8 Help pop-up box Click OK to close the pop-up box. Screen and Window Navigation All screens are divided into two panels: a navigation panel to the left, and a window in the panel to the right.
  • Page 80: Topic Links

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Topic Links In System, Library, and Reporting screens, the navigation panel contains topic links. By clicking a topic link, the window for that topic displays in the right panel: Fig. 1:4-9 Selected topic and its corresponding window , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 81: Select Sub-Topics

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Select Sub-topics Some topics in System and Library screens consist of more than one window. For these topics, clicking a topic link opens a menu of sub-topics: Fig. 1:4-10 Sub-topics menu When a sub-topic from this menu is selected, the window for that sub-topic displays in the right panel of the screen.
  • Page 82: Navigate A Tree List

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Navigate a Tree List Tree lists are included in the navigation panel of Group and Library screens. Fig. 1:4-11 Tree menu A tree is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign, when that branch of the tree is collapsed.
  • Page 83: Tree List Topics And Sub-Topics

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Tree List Topics and Sub-topics Group and Library tree lists possess a menu of topics and sub-topics. Topics in the tree list display by default when the tree is opened. Examples of tree list topics are circled in Fig. 1:4- When a tree list topic is selected and clicked, a menu of sub- topics opens: Fig.
  • Page 84: Navigate A Window With Tabs

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Navigate a Window with Tabs In each section of the console, there are windows with tabs. When selecting a window with tabs from the navigation panel, the main tab for that window displays. Entries made in a tab must be saved on that tab, if the tab includes the Apply button.
  • Page 85: Console Tips And Shortcuts

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Console Tips and Shortcuts The following list of tips and shortcuts is provided to help you use windows in the Administrator console with greater efficiency. Navigation Path The navigation path displays at the top of each window: Fig.
  • Page 86: Refresh The Console

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED Refresh the Console Press F5 on your keyboard to refresh the Administrator console. This feature is useful in the event that more than one browser window is open simultaneously for the same R3000 server. Select Multiple Items When moving several items from one list box to another, or when deleting several items, the Ctrl and Shift keys can be...
  • Page 87: Calculate Ip Ranges Without Overlaps

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED • To paste text into an empty field, place the cursor in the field and then press the Ctrl and V keys. • To copy over existing text, highlight text currently in the field and then press the Ctrl and V keys.
  • Page 88: Log Off

    4: G NTRODUCTORY ECTION HAPTER ETTING TARTED • If the IP address field in the window on the console is empty, in this pop-up window enter the IP address, specify the Dotted Decimals Notation Netmask, and then click Calculate to display the Min Host and Max Host IP addresses.
  • Page 89: Global Administrator Section

    LOBAL DMINISTRATOR ECTION NTRODUCTION LOBAL DMINISTRATOR ECTION Introduction The Global Administrator Section of this user guide is comprised of four chapters, based on the layout of the Administrator console. This section is used by the autho- rized global administrator of the R3000 for configuring and maintaining the R3000 server.
  • Page 90: Chapter 1: System Screen

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Chapter 1: System screen The System screen is comprised of windows used for configuring and maintaining the server to authenticate users, and to filter, log, or block specified Internet content for each user based on an applied filtering profile. Fig.
  • Page 91 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Hardware Failure Detection, X Strikes Blocking, Warn Option Setting, and Customization. NOTE: If the synchronization feature is used and an R3000 is set up in the Target mode to synchronize both profile and library setting changes, settings in the Filter window and Customization windows cannot be edited, and the following topics and any asso- ciated sub-topics are not available: Block Page Authentication,...
  • Page 92: Control

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Control Control includes options for controlling basic R3000 server functions. Click the Control link to view a menu of sub- topics: Filter, Block Page Authentication, ShutDown, and Reboot. Fig. 2:1-2 System screen, Control menu , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 93: Filter Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Filter window The Filter window displays when Filter is selected from the Control menu. This window is used for specifying network filtering preferences on this server. Fig. 2:1-3 Filter window Local Filtering is used for specifying whether this server being configured will filter traffic on the network.
  • Page 94: Local Filtering

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN ator and proxy patterns that bypass filtering (see http:// www.8e6.com/r3000help/files/1system_proxy_block .html for a list of proxy pattern types set up to be blocked). Target(s) Filtering will only display if this server being config- ured is set up for synchronization in the Source mode.
  • Page 95: Enable Local Filtering Options

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Enable Local Filtering Options To enable Local Filtering, click “On”. The server will filter the specified Range to Detect on the network. To enable the detection of VLAN traffic on the network, at VLAN Detection, click “On”.
  • Page 96: Disable Options For Im, P2P

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TIP: Additionally, to block specified users from accessing P2P services, the 8e6 supplied “PR2PR” library category must be applied to the group or user’s filtering profile. Or, to block all users from accessing P2P services, the global filtering profile and minimum filtering level must have the “PR2PR”...
  • Page 97: Service Control

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN category sub-section in Chapter 2: Library screen from the Group Administrator Section for information on setting up a custom library category. See Global Group Profile window and Minimum Filtering Level window in Chapter 2: Group screen from the Global Administrator Section for information on allowing a library category to pass.) NOTE: After making all entries in this window, click Apply.
  • Page 98: Target(S) Filtering

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Target(s) Filtering The Target(s) Filtering frame only displays if the R3000 currently being configured is set up in the Source mode for synchronization. The default setting has All Target(s) Filtering “On”. Disable Filtering on Target Servers To disable All Target(s) Filtering, click the “Off”...
  • Page 99: Block Page Authentication Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Block Page Authentication window The Block Page Authentication window displays when Block Page Authentication is selected from the Control menu. This feature is used for entering criteria the R3000 server will use when validating a user’s account.
  • Page 100: Enter, Edit Block Page Options

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: This feature is not available if the synchronization feature is used, and this server being configured is set up in the Target mode to synchronize both profile and library setting changes. See the Block Page Customization window and Common Customization window in this chapter for information on custom- izing the 8e6 block page.
  • Page 101 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: For more information about the Override Account option, see information on the following windows in this user guide: • Global Administrator Section: Override Account window and Bypass Option window for the global group •...
  • Page 102: Block Page

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Block page When a user attempts to access Internet content set up to be blocked, the block page displays on the user’s screen: Fig. 2:1-5 Sample Block Page By default, the following data displays in the User/Machine frame of the block page: •...
  • Page 103 Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. By default, these links are included in the block page under the following conditions: •...
  • Page 104: Options Page

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Options page The Options page displays when the user clicks the following link in the block page: For further options, click here. Fig. 2:1-6 Options page The following items previously described for the Block page display in the upper half of the Options page: •...
  • Page 105: Option 2

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: Information about Option 1 is included in the R3000 Authentication User Guide. Option 2 The following phrase/link displays, based on options selected at the Re-authentication Options field: • Re-start your system and re-login - This phrase displays for Option 2, whether or not either of the other Re-authentication Options (Re-authentication, or Web- based Authentication) was selected.
  • Page 106: Option 3

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Option 3 Option 3 is included in the Options page, if “Override Account” was selected at the Re-authentication Options field. This option is used by any user who has an override account set up for him/her by the global group administrator or the group administrator.
  • Page 107: Shutdown Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN ShutDown window The ShutDown window displays when ShutDown is selected from the Control menu. This window is used for powering off the server. Fig. 2:1-9 ShutDown window Shut Down the Server In the ShutDown frame, click ShutDown to power off the server.
  • Page 108: Reboot Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Reboot window The Reboot window displays when Reboot is selected from the Control menu. This window is used for reconnecting the server on the network. Fig. 2:1-10 Reboot window , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 109: Reboot The Server

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Reboot the Server 1. In the Reboot frame, click Reboot to open the Reboot R3000 Enterprise Filter dialog box: Fig. 2:1-11 Reboot R3000 dialog box 2. Click Yes to close the dialog box and to launch the Server Status message box, informing you that the server is now disconnected: Fig.
  • Page 110 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN After the server is rebooted, the R3000 Enterprise Filter status message box closes, and the R3000 ready alert box opens: Fig. 2:1-14 R3000 ready alert box The Server connected alert box also opens, informing you that the server is connected, and that you must restart the server: Fig.
  • Page 111: Network

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Network Network includes options for configuring the R3000 server on the network. Click the Network link to view a menu of sub-topics: LAN Settings, NTP Servers, Regional Setting, and Block Page Route Table. Fig.
  • Page 112: Lan Settings Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu. This window is used for configuring network connection settings for the R3000. Fig. 2:1-17 LAN Settings window , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 113: Specify Lan Settings

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Specify LAN Settings 1. In the Host Name field, the default host name is R3000. Enter up to 50 alphanumeric characters for the name of the host for this server, such as R3000.LOGO.com. 2.
  • Page 114: Ntp Servers Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NTP Servers window The NTP Servers window displays when NTP Servers is selected from the Network menu. This window is used for specifying IP addresses of servers running Network Time Protocol (NTP) software. NTP is a time synchronization system for computer clocks throughout the Internet.
  • Page 115: Specify Network Time Protocol Servers

    1. Select the IP address from the Servers list box. 2. Click Delete. 3. Click Apply to apply your settings. WARNING: If using the R3000 with the 8e6 Technologies Enter- prise Reporter unit, be sure the ER unit is connected to the same NTP servers as the R3000.
  • Page 116: Regional Setting Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Regional Setting window The Regional Setting window displays when Regional Setting is selected from the Network menu. This window is used for specifying the time zone to be used by the R3000 and the language set type, if necessary.
  • Page 117: Specify The Time Zone, Language Set

    3. Click Apply to apply your settings, and to reboot the R3000. WARNING: If using the R3000 with an 8e6 Technologies Enter- prise Reporter unit, be sure each R3000 used by the ER is set up in the same time zone as the ER. These “like” settings ensure consistency when tracking the logging times of all users on the network.
  • Page 118: Block Page Route Table Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Block Page Route Table window The Block Page Route Table window displays when Block Page Route Table is selected from the Network menu. This window is used for building and maintaining a list of destina- tion based routers the server will use for communicating with other segments of the network.
  • Page 119: Add A Router

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Add a Router In the Route Table frame: 1. Enter the IP address. 2. Select the network subnet Mask from the pull-down menu. 3. In the Gateway field, enter the IP address of the portal to which packets will be transferred to and from the Internet.
  • Page 120: Administrator

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Administrator Administrator window The Administrator window displays when Administrator is selected from the navigation panel. This window is used for adding and maintaining global administrator accounts. Fig. 2:1-21 Administrator window TIP: The default Username is admin and the Password is user3. 8e6 recommends that you retain this default account in the event that the R3000 unit cannot be accessed.
  • Page 121: Add A Global Administrator Account

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN WARNING: Always be sure that at least one account is listed in this window at all times. Add a Global Administrator Account To add a global administrator account: 1. In the Account Details frame, enter the username in the Name field.
  • Page 122: Diagnostics

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Diagnostics Diagnostics includes options for setting up or running processes for maintaining the server. Click the Diagnostics link to view a menu of sub-topics: System Command, View Log File, Troubleshooting Mode, Active Profile Lookup, and Admin Audit Trail.
  • Page 123: System Command Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN System Command window The System Command window displays when System Command is selected from the Diagnostics menu. This window is used for viewing server statistics and for performing diagnostic tests on the server. Fig.
  • Page 124: Perform A Diagnostic Test, View Data

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Perform a Diagnostic Test, View Data 1. Select a diagnostic tool from the Command pull-down menu: ping(Ping), traceroute(Trace Route), ps(Process list), top(TOP CPU processes), ifconfig(NIC configura- tion), netstat(active connections), netstat(routing table), free(current memory usage), iostat(CPU usage), sar(system performance), and recent logins.
  • Page 125: Command Selections

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 3. Click the “X” in the upper right corner of the pop-up window to close it. Command Selections Ping The Ping diagnostic tool is used for verifying whether the R3000 can communicate with a machine at a given IP address within the network, and the speed of the network connection.
  • Page 126: Top Cpu Processes

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TOP CPU processes The TOP CPU processes diagnostic tool is used for analyzing how much memory and CPU power is being consumed by which processes. When Execute is clicked, the pop-up window displays the following information: the load average, number of processes that can run, current utilization by CPUs on the system, and memory and swap file space currently being used and currently available.
  • Page 127: Current Memory Usage

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Current memory usage When Current Memory Usage is selected and Execute is clicked, the pop-up window shows the amount of memory being used, and the amount of memory available for three intervals of one second each. CPU usage The CPU Usage diagnostic tool shows information on disk usage.
  • Page 128: View Log File Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View Log File window The View Log File window displays when View Log File is selected from the Diagnostics menu. This window is used for viewing the most recent log file results of various activi- ties and for troubleshooting.
  • Page 129: View Log Results

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View Log Results In the Log File Details frame: 1. Select the type of Log File to view: • “Realtime Traffic Log (shadow.log)” - used for viewing the Internet activity of all users on the network. •...
  • Page 130 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Fig. 2:1-26 View Log File, Results window 4. Click the “X” in the upper right corner of the pop-up window to close it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 131: Troubleshooting Mode Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Troubleshooting Mode window The Troubleshooting Mode window displays when Trouble- shooting is selected from the Diagnostics menu. This window is used if the server is not sending or receiving packets as normal. Fig.
  • Page 132: Use The Troubleshooting Mode

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Use the Troubleshooting Mode 1. Click Enable to begin working in the troubleshooting mode. 2. In the Packet Logging frame, select the Packet Logging Time from the available selections (10 seconds, 30 seconds, 60 seconds).
  • Page 133: Active Profile Lookup Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 8. After performing the fixes on the R3000 server, return to this window and click Disable to resume filtering the network. Active Profile Lookup window The Active Profile Lookup window displays when Active Profile Lookup is selected from the Diagnostics menu.
  • Page 134: Verify Whether A Profile Is Active

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: In order to use this diagnostic tool, IP groups and/or members must be set up in the Group section of the R3000, and each IP group and/or member must have a filtering profile. Verify Whether a Profile is Active 1.
  • Page 135 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TIP: In the Category Groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group. A check mark inside a green circle displays in the Pass, Allow, Warn, Block column for the filter setting assigned to the category group/library category for the end user.
  • Page 136 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN The following settings display beneath the Rule Details frame: • Blocked Ports (optional) - ports that have been set up to be blocked, if established. • Redirect URL (optional) - the URL that will be used for redirecting the user away from a page that is blocked, if established.
  • Page 137: Admin Audit Trail Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Admin Audit Trail window The Admin Audit Trail window displays when Admin Audit Trail is selected from the Diagnostics menu. This window is used for specifying FTP criteria so that a log of server changes made by an administrator will be sent to the FTP server.
  • Page 138: Specify Ftp Criteria

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Specify FTP Criteria 1. Enter the IP address of the FTP Server. 2. The log will be sent to the current default directory, unless a Remote Directory is specified. 3. At the Transfer Mode field, “Passive” is selected by default, indicating that transfers will be made via unre- stricted outgoing network connections.
  • Page 139: View

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View View the Log of Administrator Changes To view the log, click the View tab: Fig. 2:1-31 Admin Audit Trail window, View tab Click View Log to display data on recent activity. For each change made on the server, the log will contain the date and time the change was made (Time), IP address of the machine used by the administrator, administrator's User-...
  • Page 140: Alert

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Alert Alert includes options for setting up alert emails that notify designated individuals of problems on the network. Click the Alert link to view a menu of sub-topics: Alert Settings, and SMTP Server Settings. Fig.
  • Page 141: Alert Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Alert window The Alert window displays when Alert is selected from the navigation panel. This window is used for setting up and maintaining email addresses of contacts who will receive automated notifications if problems on the network are detected during the R3000’s self-monitoring process.
  • Page 142 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN troubleshooting the problem. In most cases, the reload procedure will fix the error, and no futher intervention will be required. However, if the error is not fixed—such as if a misconfiguration was made that causes a process to be unable to load on the system—the R3000 repeats this procedure until an administrator fixes the error.
  • Page 143: Enable The Alert Feature

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Enable the Alert Feature By default, the “Disable” radio button is selected. To enable the feature for sending automated email notifications: 1. Click the “Enable” radio button to activate all elements in the Emergency Email Notification frame.
  • Page 144: Smtp Server Settings Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN SMTP Server Settings window The SMTP Server Settings window is used for entering settings for the Simple Mail Transfer Protocol that will be used for sending email alert messages to specified adminis- trators.
  • Page 145: Verify Smtp Settings

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 3. By default, the Email queue size is 50. This can be changed to specify the maximum number of requests that can be placed into the queue awaiting an available outbound connection. 4.
  • Page 146: Patch

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Patch Patch includes options for uploading software updates. Click the Patch link to view a menu of sub-topics: Patch, and Patch Update Log. Fig. 2:1-36 System screen, Patch menu , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 147: Patch Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Patch window The Patch window displays when Patch is selected from the navigation panel. This window is used for viewing informa- tion about software updates previously applied to the server, and for viewing information about software updates currently available.
  • Page 148: Read Information About A Software Update

    HAPTER YSTEM SCREEN TIP: Click the link (“here”) at the bottom of the window to go to the Web page at 8e6 Technologies’ public site (http://www.8e6.com/ products/R3000/patches/r3000_patches.htm) where release notes about software updates can be obtained. Read Information about a Software Update...
  • Page 149: Select And Apply A Software Update

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Select and Apply a Software Update To apply a software update: 1. Go to the Available Patches frame and select the soft- ware update to be applied. NOTES: Software updates must be applied to the server in sequential order.
  • Page 150 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 4. After reading the contents of the End User License Agreement, click Yes if you agree to its terms. This action closes the EULA dialog box and opens the alert box veri- fying the software update application process: Fig.
  • Page 151: Undo An Applied Software Update

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: 8e6 recommends performing a backup of configuration files after applying a software update. (See the Backup/Restore window in this chapter for information on performing a backup.) Undo an Applied Software Update NOTE: Only the most recently applied software update can be uninstalled.
  • Page 152: Patch Update Log Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Patch Update Log window The Patch Update Log window displays when Patch Update Log is selected from the Patch menu. This window is used for viewing the software update log that provides the status on the R3000’s software update activity, including checks for new software updates, and downloaded and applied software updates.
  • Page 153: Download Log, View, Print Contents

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Download Log, View, Print Contents Download the Log 1. Click Download Log to open the alert box containing a message on how to download the log file to your worksta- tion, if using Windows XP. 2.
  • Page 154 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 3. Find the folder in which to save the file, and then enter the File name, retaining the “.zip” file extension. Click Save to begin downloading the zip file to your worksta- tion.
  • Page 155: View The Contents Of The Log

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View the Contents of the Log Once the software update log file has been downloaded to your workstation, you can view its contents. 1. Find the log file in the folder, and right-click on it to open the pop-up menu: Fig.
  • Page 156 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 3. If using WinZip, click I Agree to open the window containing the zip file: Fig. 2:1-49 WinZip window 4. Right-click the zip file to open the pop-up menu, and choose “View” to open the View dialog box: Fig.
  • Page 157: Save, Print The Log File Contents

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 5. Select “Internal ASCII text viewer”, and then click View to open the View window containing the log file contents: Fig. 2:1-51 View window Save, Print the Log File Contents With the log file displaying correctly formatted in WinZip’s View window, if you wish to save or print the contents of this file: 1.
  • Page 158: Synchronization

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Synchronization By default, the Synchronization pop-up menu includes the Setup option that lets you specify the R3000 server’s func- tion on the network: whether it will be a stand alone box, or whether it will send profile/library setting changes to—or receive such setting changes from—another R3000.
  • Page 159: Setup Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN WARNING: This version of synchronization only supports the use of unique IP addresses throughout a network. Setup window The Setup window displays when Setup is selected from the Synchronization menu. This window is used for establishing the function of the R3000, especially if there is more than one R3000 on the network.
  • Page 160: Using Only One R3000 On The Network

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Using Only One R3000 on the Network By default, the “Stand Alone” mode is selected in the Mode frame. This indicates that all settings on the R3000 server that is currently being configured apply only to that R3000. For the Stand Alone mode setting: 1.
  • Page 161 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN For the Source mode setting: 1. In the Mode frame, click “Source” to display the Source mode view: Fig. 2:1-54 Setup window, Source mode 2. At the Selective Synchronization field, by default “All” is selected.
  • Page 162 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: LAN 1 and LAN 2 IP addresses that display in this menu were previously entered in the LAN Settings window on this server. 4. In the Target IPs frame, enter the Target IP address of the R3000 server that will receive profile/library setting changes from this server being configured.
  • Page 163: Sync All Target Servers With The Same Settings

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Sync All Target Servers with the Same Settings If all target servers have been configured and now need to be set with the same settings, click Sync All from the source server. This action should only be performed if all target servers need to have the same user filtering profile/ library settings as the source server.
  • Page 164: Set Up An R3000 To Be A Target Server

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Set up an R3000 to be a Target Server An R3000 configured to be a target server will receive profile/library setting changes from the source server only. WARNING: If an R3000 server is set up in the Target mode with a NAT device between the target and source server, be sure that ports 26262 and 26268 are open on the target server.
  • Page 165 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN In the IP to Send frame, the LAN1 and LAN2 IP addresses set up in the LAN Settings window on this server display in the IP to Send pull-down menu. 2. In the Source IP frame, enter the Source IP address to use for sending profile/library setting changes to this server being configured.
  • Page 166: Status Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Status window The Status window displays when Status is selected from the Synchronization menu. This menu selection is available only if this server currently being configured is either set up in the Source mode or Target mode. If set up in the Source mode, this window is used for veri- fying that profile updates are being sent to the target server(s), as in the example below:...
  • Page 167: View The Sync Status Of Targets From The Source

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View the Sync Status of Targets from the Source If the server is set up in the Source mode, the R3000 System Time displays at the top of the Target(s) Status frame. This is the current date and time from the R3000 server—using the YYYY/MM/DD and HH:MM:SS format—...
  • Page 168: View Items In The Queue

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View Items in the Queue If a “FAULT” message displays in the Sync Status column for a target server, items still remain in the queue, waiting to be synced. To view items in the queue for a specified target server: 1.
  • Page 169: View Items Previously Synced To The Server

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View Items Previously Synced to the Server To view items previously synced to a specified target server: 1. In the History column for that server, click Details to open the History of Target pop-up window. 2.
  • Page 170: View The Sync Status Of The Target Server

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN View the Sync Status of the Target Server If the server is set up in the Target mode, the R3000 System Time displays above the Target Sync Status frame. This is the current date and time from the R3000 server—using the YYYY/MM/DD and HH:MM:SS format—and includes the UTC code for the time zone.
  • Page 171 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN • Connection Status - “OK” or “FAULT” displays, indi- cating whether or not there is a connection to the source server. • Last Successful Sync - The date and time of the last successful synchronization displays.
  • Page 172: Mode

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Mode Mode includes options for configuring the R3000 to filter the network. Click the Mode link to view a menu of sub-topics: Operation Mode and Proxy Environment Settings. Fig. 2:1-60 System screen, Mode menu , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 173: Operation Mode Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Operation Mode window The Operation Mode window displays when Operation Mode is selected from the Mode menu. This window is used for specifying the operational mode in which the R3000 will filter the network, and the settings the R3000 will use for “listening to”...
  • Page 174: Set The Operation Mode

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Set the Operation Mode The default Mode setting is “Invisible”. To change this setting, click the radio button corresponding to “Router”, “Firewall”, or “Mobile”—the latter if this R3000 will only be used for filtering end users who have the 8e6 Mobile Client installed on their workstations.
  • Page 175: Invisible Option: Specify The Block Page Delivery

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Invisible Option: Specify the Block Page Delivery The Block Page Delivery Method frame displays if the Invis- ible operation mode was selected. Specify the block page delivery method by making the following selection(s): Choose from either of the two Protocol Methods: •...
  • Page 176: Mobile Option: Specify The Mobile Client Control

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Mobile Option: Specify the Mobile Client Control The Mobile Client Control frame displays if the Mobile oper- ation mode was selected. At the Client Resynchronization Time field, specify the interval of minutes for the mobile R3000 to resynchronize the profile on the end user's workstation with the profile set up for him/her on the internal R3000.
  • Page 177: Proxy Environment Settings Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Proxy Environment Settings window The Proxy Environment Settings window displays when Proxy Environment Settings is selected from the Mode menu. This window is used for specifying whether the R3000 is in a proxy environment, and if the default Web server port number 80 will be enabled.
  • Page 178: Use A Local Proxy Server

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Use a Local Proxy Server In the Proxy Setting frame, the default setting is “Off”. To specify that a local proxy server is used in the environment: 1. Click the “On” radio button. This selection indicates that the R3000 will perform a reverse lookup on packets to detect the source address and origin of packets.
  • Page 179: Authentication

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Authentication Authentication includes options for configuring the R3000 to authenticate and re-authenticate users on the network. Click the Authentication link to view a menu of sub-topics: Enable/Disable Authentication, Authentication Settings, and Authentication SSL Certificate. Fig.
  • Page 180: Nic Mode

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NIC Mode NIC Mode window The NIC Mode window displays when NIC Mode is selected from the navigation panel. This window lets you specify the speed for the R3000’s Network Interface Card settings so that the R3000 can communicate with the network switch or hub.
  • Page 181: View The Nic Negotiation

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: The options available in this window depend on the hard- ware components installed for the R3000 unit. View the NIC Negotiation To verify or correct the negotiation for a NIC, click View NIC Negotiation to open a window containing results from the mii-tool and the ethtool about the status of the NIC mode(s): Fig.
  • Page 182: Nic Mode Speeds Chart

    10, 100, 1000 10, 100, 1000 R3000MSA (mini tower) 10, 100, 1000 10, 100 R3000MSA (1U) 10, 100, 1000 10, 100, 1000 R3000IR (mini tower) 10, 100, 1000 10, 100 R3000IR (1U) 10, 100, 1000 10, 100, 1000 , R3000 E ECHNOLOGIES...
  • Page 183: Backup/Restore

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Backup/Restore Backup/Restore window The Backup/Restore window displays when Backup/ Restore is selected from the navigation panel. This window is used for saving configuration settings and/or custom library additions/deletions on or off the server, and for restoring these settings/modifications later, if necessary.
  • Page 184: Backup Procedures

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN For each backup configuration created or uploaded via this window, a row is added to the Backup Configurations grid in the Restore frame. The newly added row includes the following information: Date the backup was executed, File- name of the backup file, general information about the Content of the file, and a Comment about the file.
  • Page 185: Perform A Backup

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Perform a Backup To back up configuration and/or library modifications: 1. In the Backup frame, click the Configuration and/or Library checkbox(es) as appropriate. 2. Click Backup to open the R3000 Backup dialog box: Fig.
  • Page 186: Download A File

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Download a File To download a file to your machine: 1. Select the file from the Backup Configurations grid. 2. Click Download to open the alert box containing a message on how to download the log file to your worksta- tion, if using Windows XP.
  • Page 187 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN After the file has completely downloaded, the Download complete dialog box opens: Fig. 2:1-70 Download complete box You can now open this file, open the folder where the file was saved, or close this dialog box. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 188: Perform A Restoration

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Perform a Restoration To restore backup data to the server, the backup file must be listed in the Backup Configurations grid, and the restoration function must be executed. If the backup file is not included in the Backup Configurations grid, you must upload it to the server.
  • Page 189: Restore Configurations To The Server

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 2. Click Browse to open the Choose file window: Fig. 2:1-72 Choose file window 3. Select the file to be uploaded. After the file is selected, the Choose file window closes. 4. In the pop-up window, type in a Comment about the file. 5.
  • Page 190: Remove A Backup File

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Remove a Backup File To remove a file from the Backup Configurations grid: 1. Select the file. 2. Click Delete. View Backup and Restoration Details To view details on backup and/or restoration activities: 1.
  • Page 191: Reset

    LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Reset Reset window The Reset window displays when Reset is selected from the navigation panel. This option is not available on the R3000IR. Fig. 2:1-74 Reset window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 192: Radius Authentication Settings

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Radius Authentication Settings Radius Authentication Settings window The Radius Authentication Settings window displays when Radius Authentication Settings is selected from the naviga- tion panel. This window is used for controlling filtering levels of dial-up users.
  • Page 193: Enable Radius

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN The Radius feature uses a Radius accounting server that determines which accounts will be filtered and how they will be filtered. The user profile in the Radius accounting server holds the filter definition for the user. Depending on your network setup, there may be more than one accounting server.
  • Page 194: Apply Settings

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN 4. In the Forward Mode field, specify whether accounting request packets will be delivered from the client (NAS or proxy server) to the Radius accounting server. To enable the Forward Mode option: •...
  • Page 195: Disable Radius

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Disable Radius To disable the Radius feature: 1. At the Radius Mode field, click the “Off” radio button. 2. Click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 196: Snmp

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN SNMP SNMP window The SNMP window displays when SNMP is selected from the navigation panel. This feature lets the global adminis- trator use a third party Simple Network Management Protocol (SNMP) product for monitoring and managing the working status of the R3000's filtering on a network.
  • Page 197: Enable Snmp

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN for each disk partition, time elapse since the box was last rebooted, and the amount of memory currently in usage. Enable SNMP The Monitoring mode is “Off” by default. To enable SNMP, click Enable in the Monitoring Mode frame.
  • Page 198: Hardware Failure Detection

    Hardware Failure Detection Hardware Failure Detection window The Hardware Failure Detection window displays when Hardware Failure Detection is selected from the navigation panel. This option is not available on the R3000IR. Fig. 2:1-77 Hardware Failure Detection window , R3000 E ECHNOLOGIES...
  • Page 199: Strikes Blocking

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN X Strikes Blocking X Strikes Blocking window The X Strikes Blocking window displays when X Strikes Blocking is selected from the navigation panel. This feature lets a global administrator set criteria for blocking a user's access to “unacceptable”...
  • Page 200: Configuration

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTES: The X Strikes Blocking topic does not display if the synchronization feature is used, and this server being configured is set up in the Target mode to synchronize both profile and library setting changes.
  • Page 201: Reset All Workstations

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN If “Defined” is selected, enter the number of minutes in the text box. The default setting is 5. 6. Specify a Redirect URL to be used when the end user is locked out from his/her workstation. By default, “Default "Alternate"...
  • Page 202 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Fig. 2:1-79 Sample lock page The text informs the user: “Your Internet privileges have been temporarily suspended. For assistance, contact your Administrator.” The following information might also display in the lock page: “You have been denied access according to your organization's Internet Usage Policy.
  • Page 203: Overblocking Or Underblocking

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Overblocking or Underblocking NOTES: In order to prevent overblocking, unacceptable Internet images/links are allowed to pass by if they display within the four- second tolerance time range of a given strike. Thus, only one strike will count against a user who visits a Web page embedded with multiple, unacceptable images/links, if these images/links load within four seconds of that strike.
  • Page 204: Email Alert

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN If these configuration settings do not block users often enough • the time span for the maximum number of strikes may need to be reduced • the maximum number of strikes may need to be reduced Email Alert Click the Email Alert tab to display Email Alert: Fig.
  • Page 205: Set Up Email Alert Criteria

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Set up Email Alert Criteria 1. In the Minutes Past Midnight Before Starting Time Interval (0-59) field, enter the number of minutes past midnight that a locked workstation email alert will first be sent to the specified recipient(s).
  • Page 206: Set Up Email Alert Recipients

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Set up Email Alert Recipients 1. Enter the Email Address of an individual who will receive locked workstation email alerts. 2. Click Add to include the email address in the Current Email Alerts list box. NOTE: The maximum number of email alert recipients is 50.
  • Page 207: Logon Accounts

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Logon Accounts Click the Logon Accounts tab to display Logon Accounts: Fig. 2:1-82 X Strikes Blocking window, Logon Accounts tab Set up Users Authorized to Unlock Workstations 1. Enter the User ID of a staff member who is authorized to unlock workstations.
  • Page 208: Deactivate An Authorized Logon Account

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: When an authorized staff member is added to this list, that user’s User ID is automatically added to the Current Un-Acces- sible Users list box in the Logon Accounts tab of the Real Time Probe window.
  • Page 209: Categories

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Categories Click the Categories tab to display Categories: Fig. 2:1-83 X Strikes Blocking window, Categories tab Set up Categories to Receive Strikes or No Strikes 1. Select library categories from the “No Strike” Categories list box.
  • Page 210: Go To X Strikes Unlock Workstation Gui

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: Library categories in the “Strike” Categories list box will only be effective for filtering profiles with the X Strikes Blocking Filter Option enabled. Go to X Strikes Unlock Workstation GUI When the global administrator clicks Go to X Strikes Unlock Workstation GUI, either the Re-login window or the X Strikes Unlock Workstation pop-up window opens.
  • Page 211: Strikes Unlock Workstation

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN X Strikes Unlock Workstation The following information displays in the X Strikes Unlock Workstation pop-up window: IP Address, User Name, and Expire Date/Time of currently locked workstations. Fig. 2:1-85 X Strikes Unlock Workstation window NOTE: An authorized staff member can click a link in an email alert, or type in http://x.x.x.x:88/XStrike.html in the address field of a browser window—in which “x.x.x.x”...
  • Page 212: Set Up An Email Address To Receive Alerts

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Set up an Email Address to Receive Alerts To send locked workstation information to a designated administrator: 1. Enter the email address in the Email Address to be Subscribed/Unsubscribed text box. 2. Click Subscribe. Remove an Email Address from the Alert List To remove an administrator's email address from the notifi- cation list:...
  • Page 213: Warn Option Setting

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Warn Option Setting Warn Option Setting window The Warn Option Setting window displays when Warn Option Setting is selected from the navigation panel. This feature lets a global administrator specify the number of minutes for the interval of time in which a warning page will redisplay for the end user who accesses a URL in a library category with a Warn setting for his/her profile.
  • Page 214: Specify The Interval For Re-Displaying The Warn Page

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTES: If using the synchronization feature, the Warn Option Setting window is available in the Stand Alone and Source mode. This topic does not display if this server being configured is set up in the Target mode to synchronize both profile and library setting changes.
  • Page 215: Customization

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Customization Customization includes options to customize settings for HTML pages that display for end users who execute a command that triggers the associated pop-up window to open. Click the Customization link to view a menu of sub- topics: Common Customization, Authentication Form, Lock Page, Block Page, Warn Page, and Profile Control.
  • Page 216: Common Customization Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: Refer to the R3000 Authentication User Guide for infor- mation on using the Authentication Form Customization window. Common Customization window The Common Customization window displays when Common Customization is selected from the Customization menu.
  • Page 217: Enable, Disable Features

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN trator contact information. These details can be modified, as necessary. Enable, Disable Features 1. Click “On” or “Off” to enable or disable the following elements in the HTML pages, and make entries in fields to display customized text, if necessary: •...
  • Page 218 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN • Help Link URL - By default, http://www.8e6.com/tech- support/deniedresponse.html displays as the help link URL. Enter the URL to be used when the end user clicks the help link text (specified in the Help Link Text field).
  • Page 219: Lock Page Customization Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Lock Page Customization window The Lock Page Customization displays when Lock Page is selected from the Customization menu. This window is used with the X Strikes Blocking feature, and lets you customize text in the lock page end users will see when attempting to access Internet content blocked for their profiles, and their workstations are currently locked.
  • Page 220: Edit Entries, Setting

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TIP: An entry in any of the fields in this window is optional. Edit Entries, Setting 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the lock page.
  • Page 221 Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized lock page.
  • Page 222: Block Page Customization Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Block Page Customization window The Block Page Customization window displays when Block Page Customization is selected from the Customization menu. This feature is used if you want to display customized text and include a customized link in the block page end users will see when attempting to access Internet content blocked for their profiles.
  • Page 223: Add, Edit Entries

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TIP: An entry in any of the fields in this window is optional, but if an entry is made in the Link Text field, a corresponding entry must also be made in the Link URL field. Add, Edit Entries 1.
  • Page 224 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Fig. 2:1-92 Sample Customized Block Page By default, the following data displays in the User/ Machine frame: • User/Machine field - The username displays for the NT/LDAP user. This field is blank for the IP group user. •...
  • Page 225 DMINISTRATOR ECTION HAPTER YSTEM SCREEN • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. By default, these links are included in the block page under the following conditions: • For further options, click here. - This phrase and link...
  • Page 226: Warn Page Customization Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Warn Page Customization window The Warn Page Customization window displays when Warn Page is selected from the Customization menu. This window is used with the Warn Option Setting feature, and lets you customize text in the pop-up window end users will see if attempting to access a URL in a library category set up with a Warn setting for his/her profile.
  • Page 227: Add, Edit Entries

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TIP: An entry in any of the fields in this window is optional. Add, Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the warning page.
  • Page 228 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Fig. 2:1-94 Sample Customized Warning Page By default, the following data displays in the User/ Machine frame: • User/Machine field - The username displays for the NT/LDAP user. This field is blank for the IP group user. •...
  • Page 229 DMINISTRATOR ECTION HAPTER YSTEM SCREEN • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following buttons are included in the warning page: • Continue - Clicking this button closes the warning page and takes the user to the URL he/she requested.
  • Page 230: Profile Control Window

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Profile Control window The Profile Control window displays when Profile Control is selected from the Customization menu. This window is used with the Override Account feature, and lets you customize text in the pop-up window end users with override accounts will see when logging into their override accounts.
  • Page 231: Edit Entries

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN TIP: An entry in any of the fields in this window is optional. Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the profile control pop-up window.
  • Page 232: Chapter 2: Group Screen

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Chapter 2: Group screen The Group screen is comprised of windows and dialog boxes used for adding IP groups and/or NT/LDAP domains, and for creating filtering profiles for IP/NT/LDAP groups and their members. Fig.
  • Page 233 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN then sets up and maintains groups, and creates filtering profiles for groups and users. The navigation panel at the left of the screen contains a hier- archical list of groups set up in a tree format. At the root of this tree is Group.
  • Page 234: Global Group

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Global Group Global Group includes options for creating and maintaining groups. Click the Global Group link to view a menu of sub- topics: Range to Detect, Rules, Global Group Profile, Over- ride Account, Upload/Download Global Profile, Minimum Filtering Level, and Refresh All.
  • Page 235: Range To Detect Window

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Range to Detect window The Range to Detect window displays when Range to Detect is selected from the Global Group menu. This window is used for defining segments of network traffic to be detected by the R3000 in the invisible or router mode.
  • Page 236: Add A Segment To The Network

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN The main window (Fig. 2:2-3) lets you add segments to the network, or modify or remove existing segments. The Current Ranges list box includes a list of segments previ- ously added using this feature. The Mandatory Settings box provides examples of settings that can be made.
  • Page 237 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 2. Click one of the following buttons to select the procedure for adding the segment: • Start the Setup Wizard - clicking this button takes you to the Range to Detect Setup Wizard. Follow the instructions in the Range to Detect Setup Wizard sub- section to complete the addition of the segment on the network.
  • Page 238: Range To Detect Setup Wizard

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Range to Detect Setup Wizard Click the Start the Setup Wizard button to display Step 1 of the Range to Detect Setup Wizard. The Wizard is comprised of six steps. An entry is required in Step 1, but not in Steps 2 - 5.
  • Page 239 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 1. Choose the appropriate option for entering the IP address(es): • IP / Netmask - use these fields to specify a range of IP addresses • Individual IP - use this field to enter a single IP address 2.
  • Page 240 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 2: Optional In this step you define the destination IP address(es) to be filtered. NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames.
  • Page 241 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 3: Optional In this step you define the source IP address(es) to be excluded from filtering. Fig. 2:2-7 Range to Detect Setup Wizard window, Step 3 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 242 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 4: Optional In this step you define the destination IP address(es) to be excluded from filtering. Any entries from the list box in Step 1 automatically display in the list box above. NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames.
  • Page 243 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 5: Optional In this step you enter destination port numbers to be excluded from filtering. Fig. 2:2-9 Range to Detect Setup Wizard window, Step 5 1. In the Individual Port field, enter the port number to be excluded from filtering.
  • Page 244 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 6 In this final step of the Wizard you review your entries and make modifications, if necessary. Fig. 2:2-10 Range to Detect Setup Wizard window, Step 6 1. Review the contents in all list boxes. 2.
  • Page 245: Range To Detect Advanced Settings

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN • click Finish to accept all your entries. This action takes you to the main Range to Detect Settings window where the segment you entered now displays in the Current Ranges list box. Range to Detect Advanced Settings Click the Advanced Settings button to display the Range to Detect Advanced Settings window:...
  • Page 246: Modify A Segment Of The Network

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN TIP: Use the Calculator to calculate IP ranges without any over- laps. Enter the IP address, select the Netmask, and then click Calculate to display results in the Min Host and Max Host fields. Click Close to exit.
  • Page 247: Rules Window

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Rules window The Rules window displays when Rules is selected from the Global Group menu. This window is used for adding a filtering rule when creating a filtering profile for an entity. Fig.
  • Page 248: Add A Rule

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Add a Rule To create a new rule: 1. Click New Rule to populate the Rule # field with the next consecutive rule number available. 2. Enter a unique Rule Description that describes the theme for that rule.
  • Page 249: Modify A Rule

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
  • Page 250: Global Group Profile Window

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Global Group Profile window The Global Group Profile window displays when Global Group Profile is selected from the Global Group menu. This window is used for viewing/creating the global (default) filtering profile that will be used by all users on the network unless a unique filtering profile is created for an entity.
  • Page 251: Category Profile

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Category Profile Category Profile displays by default when Global Group Profile is selected from the Global Group menu, or when the Category tab is clicked. This tab is used for assigning filter settings to category groups/library categories for the global group profile.
  • Page 252 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN • Block - URLs in this category will be blocked. NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
  • Page 253: Port

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports for the global filtering profile. Fig. 2:2-14 Global Group Profile window, Port tab , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 254: Create, Edit A List Of Service Ports

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Create, Edit a List of Service Ports All service ports are filtered by default. To block a service port from being accessed by global filtering profile users: 1. Enter the port number in the Port field. 2.
  • Page 255: Default Redirect Url

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Default Redirect URL Default Redirect URL displays when the Default Redirect URL tab is clicked. This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked for the global filtering profile.
  • Page 256: Filter Options

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings. Filter Options Filter Options displays when the Filter Options tab is clicked.
  • Page 257: Create, Edit The Filter Options

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Create, Edit the Filter Options 1. Click the checkbox(es) corresponding to the option(s) to be applied to the global group filtering profile: “X Strikes Blocking”, “Google/Yahoo! Safe Search Enforcement”, “Search Engine Keyword Filter Control”, “URL Keyword Filter Control”.
  • Page 258 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Google/Yahoo! Safe Search Enforcement With the Google/Yahoo! Safe Search Enforcement option enabled, Google and Yahoo!’s “strict” SafeSearch Filtering option will be used whenever end users perform a Google or Yahoo! Web search or Image search. WARNINGS: This feature is not compatible with the proxy envi- ronment as it will cause overblocking.
  • Page 259 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Search Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled, search engine keywords can be set up to be blocked. When a user enters a keyword in the search engine, if that keyword has been set up to be blocked, the search will not be performed.
  • Page 260 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN URL Keyword Filter Control With the URL Keyword Filter Control option enabled, URL keywords can be set up to be blocked. When a user enters a keyword in the address line of a browser window, if that keyword has been set up to be blocked, the user will be denied access to that site or service.
  • Page 261: Override Account Window

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Override Account window The Override Account window displays when Override Account is selected from the Global Group menu. This window is used for creating an override account that allows an NT, LDAP, or IP group user to bypass settings at the minimum filtering level.
  • Page 262: Add An Override Account

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTES: A user can have only one override account. If an over- ride account was previously created for a user in a master IP group, only that override account will be effective, unless that account is deleted from the IP group.
  • Page 263: Category Profile

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the override account profile. Fig. 2:2-18 Override Account pop-up window, Rule tab To create the category profile: 1. Select a filtering rule from the available choices in the Available Filter Levels pull-down menu.
  • Page 264 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
  • Page 265: Redirect Url

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 5. Click another tab (Redirect or Filter Options) to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window. Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked.
  • Page 266: Filter Options

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN If “Custom URL” is selected, enter the redirect URL in the corresponding text box. The user will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings to the override account profile.
  • Page 267 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 1. Click the checkbox(es) corresponding to the option(s) to be applied to the override account filtering profile: • “X Strikes Blocking” - With the X Strikes Blocking option enabled, if the user attempts to access inappro- priate sites on the Internet, he/she will be locked out from his/her workstation after a specified number of tries within a fixed time period.
  • Page 268 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: To set up search engine keywords in a Search Engine Keywords window, see the following sections of this user guide for the specified library type: • 8e6 Supplied Categories - see Chapter 3: Library screen, Search Engine Keywords window.
  • Page 269: Edit An Override Account

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Edit an Override Account Change the Password To change an override account’s password: 1. In the Current Accounts frame, select the username from the list box. 2. In the Account Details frame, enter the username in the Name field.
  • Page 270: Delete An Override Account

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Delete an Override Account To delete an override account: 1. In the Current Accounts frame, select the username from the list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 271: Upload/Download Ip Profile Window

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Upload/Download IP Profile window The Upload/Download IP Profile window displays when Upload/Download Global Profile is selected from the Global Group menu. This window is used for uploading or down- loading a text file containing filtering profiles of multiple users, groups, or MAC addresses.
  • Page 272: Upload Ip Profiles

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Upload IP Profiles 1. Click Upload File to open the Upload IP Profiles pop-up window: Fig. 2:2-22 Upload IP Profiles pop-up window 2. Click Browse to open the Choose file window in which you find and select the file containing the IP profiles to be uploaded.
  • Page 273: Download Profile

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Download Profile If profiles have been created and/or uploaded to the server: 1. Click Download File to open a browser window containing the profiles: Fig. 2:2-23 Download IP Profiles window The contents of this window can viewed, printed, and/or saved.
  • Page 274: Minimum Filtering Level Window

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Minimum Filtering Level window The Minimum Filtering Level window displays when Minimum Filtering Level is selected from the Global Group menu. This window is used for establishing the minimum filtering level that will apply to all users who belong to a group, and to any group using a filtering profile other than the global (default) filtering profile.
  • Page 275 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Fig. 2:2-24 Minimum Filtering Level window, Min. Filtering Categories By default, “Child Pornography” and “Pornography/Adult Content” are assigned a Block filter setting, and all other active library categories are set to Pass. Filter settings are designated by the check mark inside a green circle in the Pass or Block column.
  • Page 276: Create, Edit Minimum Filtering Categories

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Create, Edit Minimum Filtering Categories To create the categories portion of the minimum filtering level profile: 1. Double-click the column (Pass, Block) in the row corre- sponding to that category group/library category to move the check mark to that column: •...
  • Page 277: Port

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports at the minimum filtering level. Fig. 2:2-25 Minimum Filtering Level window, Port tab Create, Edit a List of Service Ports All service ports are filtered by default.
  • Page 278 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 3. Click Apply to apply your settings at the minimum filtering level. To remove a port number from the list box: 1. Select the port number. 2. Click Remove. 3. Click Apply to apply your settings at the minimum filtering level.
  • Page 279: Minimum Filtering Bypass Options

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Minimum Filtering Bypass Options Minimum Filtering Bypass Options displays when the Min. Filter Bypass tab is clicked. This tab is used for specifying whether users in a master IP group will be allowed to bypass the minimum filtering level with an override account or an exception URL.
  • Page 280: Specify Minimum Filtering Bypass Options

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Specify Minimum Filtering Bypass Options To allow a user to override settings made at the minimum filtering level: 1. In the Override Account frame, click the “On” checkbox. Any user who has an override account will be able to access content blocked at the minimum filtering level.
  • Page 281: Refresh All

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Refresh All Refresh All Main Branches From the Global Group menu, click Refresh All to refresh the main branches of the tree. This action should be performed whenever authentication has been enabled or disabled.
  • Page 282 2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN IP includes options for adding a master IP group and to refresh the tree list. Click the IP link to view a menu of sub- topics: Add Group, and Refresh. Fig. 2:2-27 Group screen, IP menu , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 283: Add Group

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Add Group Add a Master IP Group From the IP group menu: 1. Choose Add Group to open the Create New Group dialog box: Fig. 2:2-28 Create New Group box 2. Enter up to 20 characters for the Group Name. NOTES: The name of the master IP group must be less than 20 characters;...
  • Page 284: Refresh

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: Information on defining the group and its members and establishing their filtering profiles can be found in the Group Administrator Section of this user guide. Refresh Refresh IP Groups From the IP group menu, click Refresh whenever changes have been made in this branch of the tree.
  • Page 285: Chapter 3: Library Screen

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Chapter 3: Library screen The Library screen is comprised of windows and dialog boxes used for adding and maintaining library categories. Library categories are used when creating or modifying filtering profiles. Fig. 2:3-1 Library screen A list of main topics displays in the navigation panel at the left of the screen: Updates, Library Lookup, Customer Feed- back Module, Category Weight System, NNTP Newsgroup,...
  • Page 286 3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Click Updates to display a menu of sub-topics: Configura- tion, Manual Update, Additional Language Support, Library Update Log, and Emergency Update Log. Click Library Lookup, Customer Feedback Module, Cate- gory Weight System, or NNTP Newsgroup to select that topic.
  • Page 287: Updates

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Updates Updates includes options for making configurations for library category activities. Click the Updates link to view a menu of sub-topics: Configuration, Manual Update, Addi- tional Language Support, Library Update Log, and Emer- gency Update Log.
  • Page 288: Configuration Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Configuration window The Configuration window displays when Configuration is selected from the Updates menu. This window is used for making settings to allow the R3000 to receive 8e6 supplied library category updates on a daily basis. Fig.
  • Page 289: Set A Time For Updates To Be Retrieved

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Set a Time for Updates to be Retrieved 1. In the Schedule Time frame, by default “1:00 am” displays for the Current automatic update time. At this pull-down menu, specify the time at which library updates will be retrieved.
  • Page 290: Manual Update Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Manual Update window The Manual Update to 8e6 Supplied Categories window displays when Manual Update is selected from the Updates menu. This window is used for updating specified 8e6 supplied library categories on demand from the update server, if the R3000 has not received daily updates due to an occurrence such as a power outage.
  • Page 291: Specify The Type Of On Demand Update

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Specify the Type of On Demand Update 1. Choose from the following service options by clicking the corresponding radio button: • Weekly Update - Select this option to update URL library categories with additions and deletions, and to update search engine keywords, newsgroup libraries, and IM/P2P pattern files.
  • Page 292: Additional Language Support Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Additional Language Support window The Additional Language Support window displays when Additional Language Support is selected from the Updates menu. This window is used for including additional 8e6- supported languages in library downloads. Fig.
  • Page 293 3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN includes the language selection(s) in addition to the default “None” selection. To make an optional selection for a primary language, choose the language from the (Optional) Select Primary Language pull-down menu. TIP: To move a language selection back to the Unselected Languages list box, select the item and then click the left arrow.
  • Page 294: Library Update Log Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Library Update Log window The Library Update Log window displays when Library Update Log is selected from the Updates menu. This window is used for viewing transfer activity of library updates from the update server to your R3000, and for downloading the activity log.
  • Page 295: View The Library Update Process

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN View the Library Update Process When performing a manual (on demand) library update, click View Log to display contents from the log file with the status of the library update. Keep clicking this button to continue viewing log file data.
  • Page 296 3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Fig. 2:3-8 Save As pop-up window 3. Find the folder in which to save the file, and then enter the File name, retaining the “.zip” file extension. Click Save to begin downloading the zip file to your worksta- tion.
  • Page 297: View The Contents Of The Log

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN View the Contents of the Log Once the log file has been downloaded to your workstation, you can view its contents. 1. Find the log file in the folder, and right-click on it to open the pop-up menu: Fig.
  • Page 298 3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN 3. If using WinZip, click I Agree to open the window containing the zip file: Fig. 2:3-12 WinZip window 4. Right-click the zip file to open the pop-up menu, and choose “View” to open the View dialog box: Fig.
  • Page 299: Save, Print The Log File Contents

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Fig. 2:3-14 View window Save, Print the Log File Contents With the log file displaying correctly formatted in WinZip’s View window, if you wish to save or print the contents of this file: 1.
  • Page 300 3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN 3. Paste the contents from the clipboard into the Notepad file: Fig. 2:3-15 Notepad The correctly formatted Notepad file can now be saved and/or printed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 301: Emergency Update Log Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Emergency Update Log window The Emergency Update Log window displays when Emer- gency Update Log is selected from the Updates menu. This window is used for viewing transfer activity of emergency software updates from the update server to your R3000, and for downloading the activity log.
  • Page 302: View The Emergency Software Update Process

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN View the Emergency Software Update Process Click View Log to display contents from the emergency software update log file with the status of the software update. NOTES: See Appendix B: Traveler Log Messages for information about messages that display in the log file.
  • Page 303: Library Lookup

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Library Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel. This window is used for verifying whether a URL or search engine keyword or keyword phrase exists in a library category, and to remove it, if necessary.
  • Page 304: Url Lookup, Removal

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN URL Lookup, Removal Perform a URL Check To see if a URL has been included in the library: 1. In the URL Lookup frame, enter the URL. For example, enter http://www.coors.com, coors.com, or use a wild- card by entering *.coors.com.
  • Page 305: Remove A Url

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Remove a URL To remove the URL: 1. Select the item from the Result Category list box. 2. Click Remove. Search Engine Keyword Lookup, Removal Perform a Search Engine Keyword Check To see if a search engine keyword or keyword phrase has been included in any library category: 1.
  • Page 306: Customer Feedback Module

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Customer Feedback Module Customer Feedback Module window The Customer Feedback Module window displays when Customer Feedback Module is selected from the navigation panel. This window is used for enabling the Customer Feed- back Module feature, in which the most frequently visited non-categorized URLs in your R3000's filter log will be FTPed to 8e6 on a daily basis.
  • Page 307: Disable Customer Feedback Module

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN WARNING: This feature is enabled by default. Please refer to the sub-section Enable Customer Feedback Module to review the contents of the disclaimer that applies when this feature is enabled. Disable Customer Feedback Module 1.
  • Page 308 URLs collected by the Customer Feed- back Module and sent to 8e6 Technologies. At no time will any personal information collected be released publicly, nor will the Web request data be used for any...
  • Page 309 HAPTER IBRARY SCREEN Technologies’ Acceptable Use Policy or other user poli- cies; or to protect 8e6 Technologies and its Customers. “Your agreement to activate the Customer Feedback Module will be transmitted back to 8e6 Technologies once you click the ‘Accept’ button.”...
  • Page 310: Category Weight System

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Category Weight System Category Weight System window The Category Weight System window displays when Cate- gory Weight System is selected from the navigation panel. This feature lets you choose which category will be logged and reported for a URL request that exists in multiple cate- gories (possibly both 8e6 supplied and custom library cate- gories) with the same operational precedence.
  • Page 311: View The Current Selections

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN View the Current Selections This window contains two list boxes: • “No Weight” Categories - Populated with 8e6 supplied categories • “Weight” Categories - Pre-populated by default with cate- gories 8e6 suggests you might want to use for this feature.
  • Page 312: Weighting Library Categories

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Weighting Library Categories 1. Select the category from the "No Weight" Categories list box. TIP: Multiple categories can be selected by clicking each cate- gory while pressing the Ctrl key on your keyboard. Blocks of cate- gories can be selected by clicking the first category, and then pressing the Shift key on your keyboard while clicking the last category.
  • Page 313: Nntp Newsgroup

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN NNTP Newsgroup NNTP Newsgroup window The NNTP Newsgroup window displays when NNTP News- group is selected from the navigation panel. This window is used for adding or removing a newsgroup from the libraries. Fig.
  • Page 314: Add A Newsgroup To The Library

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Add a Newsgroup to the Library To add a newsgroup to the library: 1. In the Newsgroup frame, enter the Newsgroup address. 2. Click Add. If the newsgroup already exists, an alert box will open to inform you that it exists.
  • Page 315: Category Groups

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Category Groups Category Groups is represented by a tree of library category groups, with each group comprised of 8e6 supplied library categories. 8e6 supplied library categories are updated regularly with new URLs via Traveler, 8e6’s executable program that supplies updates to the R3000.
  • Page 316 3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN NOTE: See the Custom Categories sub-section of the Group Administrator Section for information on setting up customized category groups and library categories. WARNING: The maximum number of library categories that can be saved is 250. This figure includes both 8e6 supplied catego- ries and custom categories.
  • Page 317: Library Details Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Library Details window The Library Details window displays when Library Details is selected from the library category’s menu of sub-topics. This window is a view only window. Fig. 2:3-24 Library Details window View Library Details This window displays the Group Name, Description, and Short Name of the 8e6 supplied library category.
  • Page 318: Urls Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN URLs window The URLs window displays when URLs is selected from the library category’s menu of sub-topics. This window is used for viewing, or adding and/or removing a URL from a library category.
  • Page 319: View A List Of Urls In The Library Category

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN View a List of URLs in the Library Category To view a list of all URLs that either have been added or deleted: 1. Click the View tab. 2. Make a selection from the pull-down menu for “Addition List”, “Deletion List”, “Wildcard Addition List”, or “Wild- card Deletion List”.
  • Page 320: Add Or Remove Urls, Reload The Library

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Add or Remove URLs, Reload the Library The Action tab is used for making entries in the URLs window for adding or removing a URL, or reloading the library. Add a URL to the Library Category To add a URL to the library category: 1.
  • Page 321: Add A Wildcard Url To The Library Category

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Add a Wildcard URL to the Library Category NOTE: Wildcards are to be used for blocking only. They are not designed to be used for the exceptions function or the always allowed white listing function. To add a URL containing a wildcard to the library category: 1.
  • Page 322: Remove A Url From The Library Category

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Remove a URL from the Library Category To remove a URL or wildcard URL from the library category: 1. Click the Action tab. 2. Enter the URL in the Edit URL List frame or Edit Wild- Card URL List frame, as pertinent.
  • Page 323: Url Keywords Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN URL Keywords window The URL Keywords window displays when URL Keywords is selected from the library category’s menu of sub-topics. This window is used for adding and removing URL keywords from a library category. A library category uses URL keywords to block a user’s access to Internet addresses containing keywords included in its list.
  • Page 324: View A List Of Url Keywords

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked categories.
  • Page 325: Upload A List Of Url Keywords To The Library

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Upload a List of URL Keywords to the Library Before uploading a text file with URL keyword additions or deletions, in the Upload URL Keyword File frame, specify whether the contents of this file will add to the current file, or overwrite the current file on the server, by clicking the “Append”...
  • Page 326: Upload A List Of Url Keyword Deletions

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Upload a List of URL Keyword Deletions To upload a text file with URL keyword deletions: 1. Click Upload To Deletion File to open the Upload Library Keyword pop-up window (see Fig. 2:3-28). 2.
  • Page 327: Search Engine Keywords Window

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Search Engine Keywords window The Search Engine Keywords window displays when Search Engine Keywords is selected from the library cate- gory’s menu of sub-topics. This window is used for adding and removing search engine keywords/phrases to and from a library category.
  • Page 328: View A List Of Search Engine Keywords

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN NOTE: If the feature for search engine keyword filtering is not enabled in a filtering profile, search engine keywords can be added in this window but search engine keyword filtering will not be in effect for the user(s).
  • Page 329: Remove A Search Engine Keyword From The Library

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Remove a Search Engine Keyword from the Library To remove a search engine keyword/phrase from the library category: 1. In the Edit Search Keyword List frame, enter up to 75 alphanumeric characters in the Keyword field. 2.
  • Page 330: Upload A List Of Search Engine Keyword Deletions

    3: L LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Upload a List of Search Engine Keyword Deletions To upload a text file with search engine keyword/phrase deletions: 1. Click Upload To Deletion to open the Upload Library Keyword pop-up window (see Fig. 2:3-28). 2.
  • Page 331: Chapter 4: Reporting Screen

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Chapter 4: Reporting screen The Reporting screen contains options for transferring and/ or reviewing Internet usage data collected by the R3000. Fig. 2:4-1 Reporting screen From the navigation panel at the left of the screen, click Report Configuration to perform an on demand log transfer to the Enterprise Reporter (ER).
  • Page 332: Report Configuration

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN NOTE: Information on configuring the Enterprise Reporter (ER) can be found in the Enterprise Reporter User Guide. Report Configuration Report Configuration window The Report Configuration window displays when Report Configuration is selected from the navigation panel. This window lets you perform a log transfer on demand.
  • Page 333: Real Time Probe

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Real Time Probe Real Time Probe window The Real Time Probe window displays when Real Time Probe is selected from the navigation panel. This feature lets the probe administrator monitor a user's Internet usage in real time to see if that user is using the Internet appropri- ately.
  • Page 334: Configuration

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Configuration Enable Real Time Probes 1. On the Configuration tab, click “On”. 2. Click Save to enable the Real Time Probes feature. As a result, all elements in this window become activated. Set up Real Time Probes 1.
  • Page 335: Remove Ips From The White List

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Remove IPs from the White List 1. Select the IP address(es) from the Current White list of IPs list box. 2. Click Delete to remove the IP address(es) from the white list. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 336: Report Recipients

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Report Recipients Click the Report Recipients tab to display Email Report: Fig. 2:4-4 Real Time Probe window, Report Recipients tab Specify Email File Criteria 1. Click the radio button corresponding the to the Email Format to be used for the file: “Plain Text”...
  • Page 337: Set Up Email Addresses To Receive Reports

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Set up Email Addresses to Receive Reports 1. Enter the Email Address of an individual who will receive completed probe reports. 2. Click Add to include the email address in the Current List of Completed Reports to be Emailed list box.
  • Page 338: Logon Accounts

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Logon Accounts Click the Logon Accounts tab to display Logon Accounts: Fig. 2:4-5 Real Time Probe window, Logon Accounts tab Set up Users Authorized to Create Probes 1. Enter the User ID of a staff member who is authorized to create real time probes.
  • Page 339: Deactivate An Authorized Logon Account

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN NOTE: When an authorized staff member is added to this list, that user’s User ID is automatically added to the Current Un-Acces- sible Users list box in the Logon Accounts tab of the X Strikes Blocking window.
  • Page 340: Go To Real Time Probe Reports Gui

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Go to Real Time Probe Reports GUI When the global administrator clicks Go to Real Time Probe Reports GUI, either the Re-login window or the Real Time Probe Reports pop-up window opens. Re-login window The Re-login window opens if the user’s session needs to be validated:...
  • Page 341: Real Time Probe Reports

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Real Time Probe Reports The Real Time Probe Reports window is comprised of the View and Create tabs. The View tab displays by default (see Fig. 2:4-11), showing the global administrator information on all active probes.
  • Page 342 4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN The Current Probe Count displays the Total number of active probes, and the number of probes Created Under This Account. The Maximum Probes to Run/Schedule Simultaneously entered on the Configuration tab displays. 1.
  • Page 343 4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN • “Category”: Select the library category to be probed. This selection generates a report with data for the specified library category. NOTE: Up to 250 characters will be accepted for the IP Address, User Name, or URL.
  • Page 344: View Real Time Probe Details

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN View Real Time Probe Details Click the View tab to view details about active probes: Fig. 2:4-8 Real Time Probe Reports, View tab The Display Name shows the name assigned to the probe on the Create tab.
  • Page 345 4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN By selecting a probe, buttons for the probe become acti- vated, based on the state of the probe. The following options are available for each of the probe statuses: • Completed: View, Properties, Delete, Email •...
  • Page 346 4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN The following actions can be performed in this box: • Click a URL to open a window that accesses the desig- nated site. • If the probe is currently in progress, clicking Stop halts the real time probe and changes this button to “Email”.
  • Page 347 4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Stop, Delete options Clicking Stop halts the probe and gives it a Completed status. This option is also available in the Real Time Infor- mation box via the “Stop” button. Clicking Delete opens the following dialog box, asking if you want to delete the probe: Fig.
  • Page 348: Usage Graphs

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Usage Graphs Usage Graphs window The Usage Graphs window displays when Usage Graphs is selected from the navigation panel. This window is used for viewing and analyzing system usage data for a specified time period within the past 14 days.
  • Page 349: Select A Graph To View

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Select a Graph to View 1. From the available menu choices, select either “Recent Trend” or one of the “Daily Peaks” dates. 2. Click View to open a separate browser window containing the specified graph. Recent Trend The Recent Trend graph includes the following information: date range, and Number of Hits per Hour for a given date:...
  • Page 350: Daily Peaks

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Daily Peaks The Daily Peaks graph includes the following information: date, and Number of Hits per Second at Peak Time for a given Time using the HH:MM format: Fig. 2:4-15 Daily Peaks graph Click the “X”...
  • Page 351: Shadow Log Format

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Shadow Log Format Shadow Log Format window The Shadow Log Format window displays when Shadow Log Format is selected from the navigation panel. If the R3000's reporting device is the 8e6 Enterprise Reporter (ER), this window is used for specifying the log format the R3000 will use for sending logs to the ER.
  • Page 352: Specify The Shadow Log Format

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Specify the Shadow Log Format The window is comprised of the Log Format frame containing radio buttons corresponding to the following options: “Auto-detect”, “Post 2.0 log format (manual)”, “Post 1.9 log format (manual)”, and “Pre 1.9 log format (manual)”. WARNING: When making a selection in this window, be sure to first identify the software versions currently being used by the R3000 and the ER.
  • Page 353: Post 2.0 Log Format Option

    4: R LOBAL DMINISTRATOR ECTION HAPTER EPORTING SCREEN Post 2.0 log format option If this R3000 currently has the 2.0 or higher software update applied, the Post 2.0 log option should be selected, since the ER 4.1 or higher software update uses the new log structure.
  • Page 354: Roup Dministrator Ection

    ROUP DMINISTRATOR ECTION NTRODUCTION ROUP DMINISTRATOR ECTION Introduction The Group Administrator Section of this user guide is comprised of two chapters that include information on func- tions performed by the group administrator. Chapter 1 includes information on setting up and main- taining master IP groups and group members.
  • Page 355: Chapter 1: Group Screen

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Chapter 1: Group screen Group administrators use group screen windows to add members to a master IP group, create sub-groups and/or individual IP members, and define and maintain members’ filtering profiles. A member is associated with an IP or MAC address and may contain a netmask within a valid IP address range.
  • Page 356 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Double-click the IP branch of the tree to open it and to display the master IP group. Double-click the master IP group to open it and to display any IP sub-groups and/or individual IP members previously set up in the tree list.
  • Page 357: Refresh

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Refresh Refresh the Master IP Group, Member Click Refresh whenever a change has been made to the master IP group or member level of the tree. Fig. 3:1-2 Group screen, IP menu , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 358: Master Ip Group

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Master IP Group Master IP group includes options for defining and main- taining group accounts, setting up an override account and/ or exception URLs to bypass global settings, and uploading or downloading IP profiles. Click the master IP group’s link to view a menu of sub-topics: Group Details, Members, Override Account, Group Profile, Exception URL, Time Profile, Upload/Download IP Profile, Add Sub Group, Add...
  • Page 359: Group Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Group window The Group window displays when Group Details is selected from the menu. This window is used for viewing the Group Name and for changing the password of the group adminis- trator.
  • Page 360: Members Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN 2. Click Apply to apply your settings. Members window The Members window displays when Members is selected from the menu. This window is used for adding and managing members of a master IP group. For the invisible and router modes, a member is comprised of an associated IP address, and a sub-group may also contain a netmask.
  • Page 361: Add The Ip Address Of The Member

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Add the IP Address of the Member If using the invisible or router mode: 1. Specify whether to add an IP address range with or without a netmask by selecting either “Source IP” or “Source IP Start / End”.
  • Page 362: Override Account Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Override Account window The Override Account window displays when Override Account is selected from the menu. This window is used for creating an override account that allows an end user from a master IP group to bypass settings at the minimum filtering level.
  • Page 363: Add An Override Account

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTES: Override accounts can be created for any authorized user. In order for a user with an override account to access cate- gories and ports set up to be blocked at the master IP group level, the global administrator must first activate the option to allow an override account to bypass minimum filtering level settings.
  • Page 364: Category Profile

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the override account profile. Fig. 3:1-7 Override Account pop-up window, Rule tab To create the category profile: 1. Select a filtering rule from the available choices in the Available Filter Levels pull-down menu.
  • Page 365 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
  • Page 366: Redirect Url

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN 5. Click another tab (Redirect or Filter Options) to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window. Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked.
  • Page 367: Filter Options

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig. 3:1-9 Override Account pop-up window, Filter Options tab Click the checkbox(es) corresponding to the option(s) to be applied to the override account filtering profile: •...
  • Page 368 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN • “Google/Yahoo! Safe Search Enforcement” - With the Google/Yahoo! Safe Search Enforcement option enabled, Google and Yahoo!’s “strict” SafeSearch Filtering option will be enforced if the user performs a Google or Yahoo! Web search or Image search. WARNING: If this option is used in conjunction with the X Strikes Blocking feature and the user is performing an inappropriate Google or Yahoo! Image search, the number of strikes that user...
  • Page 369: Edit An Override Account

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: To set up URL keywords in a URL Keywords window, see the URL Keywords window in Chapter 2. Edit an Override Account Change the Password To change an override account’s password: 1.
  • Page 370: Modify An Override Account

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Modify an Override Account To modify an override account: 1. In the Current Accounts frame, select the username from the list box. 2. Click View/Modify to open the pop-up window. 3. Click the tab in which to make modifications (Rule, Redi- rect, Filter Options).
  • Page 371: Group Profile Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Group Profile window The Group Profile window displays when Group Profile is selected from the group menu. This window is used for viewing/creating the group’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options.
  • Page 372: Create, Edit A List Of Selected Categories

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: In order to use this tab, filtering rules profiles must already have been set up by the global administrator. By default, “Rule0 Minimum Filtering Level” displays in the Available Filter Levels pull-down menu, and the Minimum Filtering Level box displays “Child Pornography”...
  • Page 373 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Block) in the row corresponding to that category group/ library category to move the check mark to that column: • Pass - URLs in this category will pass to the end user. •...
  • Page 374: Redirect Url

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Redirect URL Redirect URL displays when the Redirect URL tab is clicked. This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked at the group level.
  • Page 375: Filter Options

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings. Filter Options Filter Options displays when the Filter Options tab is clicked.
  • Page 376: Create, Edit The Filter Options

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Create, Edit the Filter Options 1. Click the checkbox(es) corresponding to the option(s) to be applied to the sub-group filtering profile: “X Strikes Blocking”, “Google/Yahoo! Safe Search Enforcement”, “Search Engine Keyword Filter Control”, “URL Keyword Filter Control”.
  • Page 377 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Search Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled, search engine keywords can be set up to be blocked. When a user enters a keyword in the search engine, if that keyword has been set up to be blocked, the search will not be performed.
  • Page 378: Exception Url Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN WARNING: If this feature is activated, use extreme caution when setting up URL keywords for filtering. If a keyword that is entered in a browser’s address window contains the same consecutive characters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked catego- ries.
  • Page 379: Block Url Frame

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN NOTE: Settings in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator. Users with an override account will be able to access URLs set up to be blocked in this window, if the global administrator acti- vates bypass settings in the Minimum Filtering Bypass Options tab.
  • Page 380: Time Profile Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Time Profile window The Time Profile window displays when Time Profile is selected from the group menu. This window is used for setting up or modifying a filtering profile to be activated at a specified time.
  • Page 381: Add A Time Profile

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Add a Time Profile To create a time profile: 1. Select the Begin Time and End Time range from the list of military hours (1-0, or 1:00 a.m. to midnight) and minutes (0-59). 2.
  • Page 382: Category Profile

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the time profile. Fig. 3:1-15 Time Profile pop-up window, Rule tab NOTE: See the Override Account window, Category Profile sub- section in this chapter for information about entries that can be made for this component of the filtering profile.
  • Page 383: Redirect Url

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked. Fig. 3:1-16 Time Profile pop-up window, Redirect URL tab NOTE: See the Override Account window, Redirect URL sub- section in this chapter for information about entries that can be made for this component of the filtering profile.
  • Page 384: Filter Options

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the time profile. Fig. 3:1-17 Time Profile pop-up window, Filter Options tab NOTE: See the Override Account window, Filter Options sub- section in this chapter for information about entries that can be made for this component of the filtering profile.
  • Page 385: Exception Url

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Exception URL The Exception tab is used for allowing users to be blocked from accessing specified URLs and/or to be allowed to access specified URLs blocked at the minimum filtering level. Fig. 3:1-18 Time Profile pop-up window, Exception tab NOTE: Settings in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator.
  • Page 386 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN To block the group’s access to a URL: 1. In the Block URL field, enter the URL. 2. Click Add to include the URL in the Block URLs list box. To allow the URL to be accessed by the group again: 1.
  • Page 387: Modify A Time Profile

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Modify a Time Profile To modify an existing time profile: 1. Select the time range from the Current Time Profiles list box. 2. Click View/Modify to open the pop-up window. 3. Click the tab in which to make modifications (Rule, Redi- rect, Filter Options, Exception).
  • Page 388: Upload/Download Ip Profile Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Upload/Download IP Profile window The Upload/Download IP Profile window displays when Upload/Download IP Profile is selected from the group menu. This window is used for uploading or downloading a text file containing filtering profiles of multiple users or sub- groups.
  • Page 389: Upload Ip Profiles

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Upload IP Profiles 1. Click Upload File to open both the refresh message dialog box and the Upload IP Profiles pop-up window: Fig. 3:1-20 Upload IP Profiles pop-up window NOTE: Leave the message dialog box open until the file containing the profile has been uploaded.
  • Page 390: Download Profile

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Download Profile If profiles have been created and/or uploaded to the server: 1. Click Download Profile to open a browser window containing the profiles: Fig. 3:1-21 Download IP Profiles window The contents of this window can viewed, printed, and/or saved.
  • Page 391: Add Sub Group

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Add Sub Group Add an IP Sub Group From the group menu: 1. Click Add Sub Group to open the Create Sub Group dialog box: Fig. 3:1-22 Create Sub Group box 2. Enter the Group Name for the sub-group. NOTES: The name of the sub-group must be less than 20 char- acters;...
  • Page 392: Add Individual Ip

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN WARNING: When adding a sub-group to the tree list, sub-group users will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window. The minimum filtering level is established by the global administrator.
  • Page 393: Delete Group

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN 3. Click OK to close the dialog box and to add the individual IP member to the master IP group tree. WARNING: When adding an Individual IP member to the tree list, the user will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window.
  • Page 394: Paste Sub Group

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Paste Sub Group The Paste Sub Group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists. A sub-group can be “pasted”—or copied—to a group if the Copy Sub Group function was first performed at the sub- group level.
  • Page 395: Sub Group

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Sub Group Sub Group includes options for creating and maintaining the filtering profile for the sub-group. Click the sub-group’s link to view a menu of sub-topics: Sub Group Details, Members, Sub Group Profile, Exception URL, Time Profile, Delete Sub Group, and Copy Sub Group.
  • Page 396: Sub Group (Ip Group) Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Sub Group (IP Group) window The Sub Group (IP Group) window displays when Sub Group Details is selected from the menu. This window is used for viewing and adding or editing details on an IP group member.
  • Page 397: View Ip Sub-Group Details

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN View IP Sub-Group Details If the sub-group was previously defined, the fields in the Sub Group Details frame cannot be edited. The following infor- mation displays: • Sub Group Name • IP Range •...
  • Page 398 1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN 1. In the IP Address frame, click the appropriate radio button corresponding to the type of Member IP address range to be entered: IP address with netmask, or IP address range. TIP: Use the IP Range pull-down menu to view the IP address(es) that can be entered in these fields.
  • Page 399: Members Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Members window The Members window displays when Members is selected from the menu. This window is used for modifying the sub- group’s Member IP address, if using the invisible or router mode. If using the mobile mode, MAC address(es) can be selected for inclusion in the sub-group.
  • Page 400: Modify Sub-Group Members

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Modify Sub-Group Members The Modify Sub Group Member frame is comprised of the IP Address and MAC Address frames. 1. In the IP Address frame, specify whether to add or edit an IP address range with or without a netmask by selecting either “Member IP”...
  • Page 401: Sub Group Profile Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Sub Group Profile window The Sub Group Profile window displays when Sub Group Profile is selected from the sub-group menu. This window is used for viewing/creating the sub-group’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options.
  • Page 402: Delete Sub Group

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Delete Sub Group Delete an IP Sub-Group To delete a sub-group, choose Delete Sub Group from the sub-group menu. This action removes the sub-group from the tree. Copy Sub Group The Copy Sub Group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists.
  • Page 403: Individual Ip

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Individual IP Individual IP includes options for creating and maintaining the filtering profile for the Individual IP member. Click the individual IP member’s link to view a menu of sub-topics: Members, Individual IP Profile, Exception URL, Time Profile, Delete Individual IP.
  • Page 404: Member Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Member window The member window displays when Members is selected from the menu. This window is used for modifying the indi- vidual IP member’s IP address, if using the invisible or router mode. If using the mobile mode, the member’s MAC address can be selected for inclusion in the sub-group.
  • Page 405: Individual Ip Profile Window

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN 3. Click Modify to apply your changes. Individual IP Profile window The Individual IP Profile window displays when Individual IP Profile is selected from the individual IP member menu. This window is used for viewing/creating the member’s filtering profile.
  • Page 406: Delete Individual Ip

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Delete Individual IP Delete an Individual IP Member To delete an individual IP member, choose Delete Individual IP from the individual IP member menu. This action removes the member from the tree. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 407: Chapter 2: Library Screen

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Chapter 2: Library screen Group administrators use windows and dialog boxes in the Library screen to look up URLs and to add and maintain custom library categories for a group. Library categories are used when creating or modifying filtering profiles.
  • Page 408: Library Lookup

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Library Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel. This window is used for verifying whether or not a URL or search engine keyword or keyword phrase exists in a library category.
  • Page 409: Look Up A Url

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Look up a URL 1. In the URL Lookup frame, enter the URL. For example, enter http://www.coors.com, coors.com, or use a wild- card by entering *.coors.com. A wildcard entry finds all URLs containing text that follows the period (.) after the asterisk (*).
  • Page 410: Look Up A Search Engine Keyword

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Look up a Search Engine Keyword To see if a search engine keyword or keyword phrase has been included in any library category: 1. In the Search Engine Keyword Lookup frame, enter the Search Engine Keyword or keyword phrase, up to 75 alphanumeric characters.
  • Page 411: Custom Categories

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Custom Categories Custom Categories includes options for adding a custom category to the tree list and to refresh the menu. Click the Custom Categories link to view a menu of topics: Add Cate- gory, and Refresh.
  • Page 412: Add Category

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Add Category A unique custom library category should be created only if it does not exist in the Category Groups tree, and if any sub- group needs to use that library category. Custom library categories for a group must be maintained by the group administrator.
  • Page 413: Refresh

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN TIP: If this is the first custom category you are adding, you may need to double-click “Custom Categories” to open the tree list. NOTE: The category must have URLs, URL keywords, and/or search keywords added to its profile in order for it to be effective.
  • Page 414: Custom Library Category

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Custom library category When a custom library category is created, its long name displays in the Custom Categories tree list. Click the custom library category link to view a menu of sub-topics: Library Details, URLs, URL Keywords, Search Engine Keywords, and Delete Category.
  • Page 415: Library Details Window

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Library Details window The Library Details window displays when Library Details is selected from the library category’s menu of sub-topics. This window is used for editing the long name of the custom library category, and for viewing name criteria previously entered.
  • Page 416: View, Edit Library Details

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN View, Edit Library Details The following display and cannot be edited: Custom Cate- gories Group Name and library category Short Name. 1. The long Description name displays and can be edited. 2. After modifying the description for the library category, click Apply to save your entry.
  • Page 417: Urls Window

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN URLs window The URLs window displays when URLs is selected from the custom library category’s menu of sub-topics. This window is used for viewing, adding and/or removing a URL from a custom library category’s master URL list or master wildcard URL list.
  • Page 418: View A List Of Urls In The Library Category

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN View a List of URLs in the Library Category To view a list of all URLs that either have been added or deleted from the master URL list or master wildcard URL list: 1.
  • Page 419: Add Or Remove Urls Or Wildcard Urls

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Add or Remove URLs or Wildcard URLs The Action tab is used for making entries in the URLs window for adding or removing a URL or wildcard URL, uploading a master URL list or master wildcard URL list, or reloading the library.
  • Page 420: Add A Wildcard Url To The Library Category

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Add a Wildcard URL to the Library Category NOTE: Wildcards are to be used for blocking only. They are not designed to be used for the exceptions function or the always allowed white listing function. To add a URL containing a wildcard to the library category: 1.
  • Page 421: Remove A Url From The Library Category

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Remove a URL from the Library Category To remove a URL or wildcard URL from the library category: 1. Click the Action tab. 2. Enter the URL in the Edit URL List frame or Edit Wild- Card URL List frame, as pertinent.
  • Page 422: Upload A Master List To The Library

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Upload a Master List to the Library Upload a Master List of URLs To upload a master file with URL additions: 1. Click Upload Master to open the Upload Custom Library URL pop-up window: Fig.
  • Page 423 2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN 4. Click Upload File to display the results of the library file content validation in the Library File Content/IP Lookup Options pop-up window: Fig. 3:2-10 Library File Content/IP Lookup Options URLs contained in the file are listed under the column for either Valid URL or Invalid URL.
  • Page 424: Upload A Master List Of Wildcard Urls

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN selected, IP addresses that correspond to URLs in the uploaded file will be blocked along with the URLs. • “Upload the file without IP Lookup” - If this option is selected, an IP lookup for IP addresses that correspond to URLs in the uploaded file will not be performed.
  • Page 425 2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN 3. Select the file to be uploaded. TIP: A wildcard URL text file must contain one wildcard URL per line. WARNING: The text file uploaded to the server will overwrite the current file. NOTE: Before the file is uploaded to the server, it will first be vali- dated 4.
  • Page 426: Reload The Library

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN If the file contains valid wildcard URLs, click Upload to open the Upload Successful pop-up window. NOTE: In order for the URLs to take effect, library categories must be reloaded. Reload the Library After all changes have been made to library windows, click Reload Library to refresh.
  • Page 427: Url Keywords Window

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN URL Keywords window The URL Keywords window displays when URL Keywords is selected from the custom library category’s menu of sub- topics. This window is used for adding or removing a URL keyword from a custom library category’s master list.
  • Page 428: View A List Of Url Keywords

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked categories.
  • Page 429: Upload A List Of Url Keywords To The Library

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Upload a List of URL Keywords to the Library To upload a text file containing URL keyword additions: 1. In the Upload Master URL Keyword File frame, click Upload Master to open the Upload Library Keyword pop-up window: Fig.
  • Page 430: Search Engine Keywords Window

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Search Engine Keywords window The Search Engine Keywords window displays when Search Engine Keywords is selected from the custom library category’s menu of sub-topics. This window is used for adding and removing search engine keywords and phrases to and from a custom library category’s master list.
  • Page 431: View A List Of Search Engine Keywords

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN NOTE: If the feature for search engine keyword filtering is not enabled in a filtering profile, search engine keywords can be added in this window but search engine keyword filtering will not be in effect for the user(s).
  • Page 432: Remove A Search Engine Keyword

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Remove a Search Engine Keyword To remove a search engine keyword or keyword phrase from a library category: 1. In the Edit Search Keyword List frame, enter up to 75 alphanumeric characters in the Keyword field. 2.
  • Page 433: Delete Category

    2: L ROUP DMINISTRATOR ECTION HAPTER IBRARY SCREEN Delete Category Delete a Custom Category To delete a custom library category, choose Delete Cate- gory from the menu. This action removes the library cate- gory from the Custom Categories list. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 434: Technical Support / Product Warranties

    ECHNICAL UPPORT RODUCT ARRANTIES Technical Support For technical support, visit 8e6 Technologies’s Technical Support Web page at http://www.8e6.com/support.html, or contact us by phone, by email, or in writing. Hours Regular office hours are from Monday through Friday, 8 a.m. to 5 p.m. PST.
  • Page 435: Office Locations And Phone Numbers

    ECHNICAL UPPORT RODUCT ARRANTIES ECHNICAL UPPORT Office Locations and Phone Numbers 8e6 Corporate Headquarters (USA) 828 West Taft Avenue Orange, CA 92865-4232 Local 714.282.6111 714.282.6116 Domestic US 1.888.786.7999 International +1.714.282.6111 8e6 Taiwan RM B2, 13F, No. 49, Sec. 3, Minsheng E. Rd. Taipei 104 Taiwan, R.O.C.
  • Page 436: Support Procedures

    ECHNICAL UPPORT RODUCT ARRANTIES ECHNICAL UPPORT Support Procedures When you contact our technical support department: • You will be greeted by a technical professional who will request the details of the problem and attempt to resolve the issue directly. • If your issue needs to be escalated, you will be given a ticket number for reference, and a senior-level technician will contact you to resolve the issue.
  • Page 437: Product Warranties

    ARRANTIES Product Warranties Standard Warranty 8e6 Technologies warrants the medium on which the 8e6 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “Warranty Period”) from the date of delivery. This standard Warranty Period applies to both new and refurbished equip- ment for a period of one year from the delivery date.
  • Page 438: Technical Support And Service

    RODUCT ARRANTIES Technical Support and Service 8e6 Technologies will provide initial installation support and technical support for up to 90 days following installation. 8e6 Technologies provides after-hour emergency support to 8e6 server customers. An after hours technician can be reached by voice line.
  • Page 439: Extended Warranty (Optional)

    If parts are discontinued from production during the Warranty Period, immediate replacement product(s) or hardware parts will be available for exchange with defective parts from 8e6 Technologies’ local reseller or distributor. Extended Technical Support and Service Extended technical support is available to customers under a Technical Support Agreement.
  • Page 440: Appendices Section

    PPENDICES ECTION PPENDIX PPENDICES ECTION Appendix A Filtering Profile Format and Rules A filtering profile must be set up in a specified format, containing the following items: 1. Filtering profile criteria: • Rule number (Rule0, Rule1, etc.), or • rule criteria: a.
  • Page 441 PPENDICES ECTION PPENDIX Block the defined port number(s) • Port Numbers: 21 = FTP (File Transfer Protocol) 80 = HTTP (Hyper Text Transfer Protocol) 119 = NNTP (Network News Transfer Protocol) 443 = HTTPS (Secured HTTP Transmission) Other • Filter Mode Values: Default, Block Mode Monitoring Mode Bypassing Mode...
  • Page 442 PPENDICES ECTION PPENDIX • Category Codes: For the list of category codes (short names) and their corresponding descriptions (long names), go to http:// www.8e6.com/r3000help/files/ 2group_textfile_cat.html#cat NOTE: The list of library category codes and corresponding descriptions is subject to change due to the addition of new cate- gories and modification of current categories.
  • Page 443: Appendix B

    PPENDICES ECTION PPENDIX Appendix B Traveler Log Messages Your R3000 receives 8e6 supplied library category updates and software updates via Traveler, 8e6’s executable program for updating the R3000 server. You can run Trav- eler on demand via the Manual Update to 8e6 Supplied Categories window, or schedule Traveler to launch at a specified time via the Configuration window.
  • Page 444: General Activity

    PPENDICES ECTION PPENDIX General Activity Startup, Finish • Logging to: <log file> • Start running Traveler • Traveler has finished running. Command Executed More than Once • Traveler is running, cannot start another traveler. • Installscript is running, cannot start another traveler. •...
  • Page 445: Library Download Process

    PPENDICES ECTION PPENDIX Library Download Process • <filename> needs to be updated. • <filename> does not need to be updated. • Preparing for download • Prepare for download -- Fail • Downloading files • Processing downloaded files • Processing downloaded files -- Fail •...
  • Page 446: Customer Feedback Module Option

    PPENDICES ECTION PPENDIX Customer Feedback Module Option • To start CFM • To run CFM • Starting usage feedback/reporting upload • Running usage feedback/reporting upload Library Update Process • Wrong Argument! • Error occurred during the Traveler process! • Connection is lost. •...
  • Page 447: Error Messages

    PPENDICES ECTION PPENDIX Error Messages • Running Traveler encounters an exception. • Alert emails could not be read. "<email alert configuration file>" does not exist. • Reloading library encounters an exception • Send alert encountered an exception • Traveler exits after reaching time limit: <time limit> mins •...
  • Page 448: Weekly Update (7 Days Library)

    PPENDICES ECTION PPENDIX Weekly Update (7 Days Library) • Download library update: • Download thread interrupted during retries. • Successfully downloaded <deleted category> • Failed to download <deleted category> • Failed to download <category> library • Successfully downloaded <category> library •...
  • Page 449: Full Url Library Update (Urls, Url Keywords)

    PPENDICES ECTION PPENDIX Full URL Library Update (URLs, URL Keywords) • Download full library: • Failed to download <category> library • Successfully download <category> library! • Failed to unzip <category> • Full URL Library Update has completed. All Library Updates (includes all other msgs.) •...
  • Page 450: Search Engine Keywords Library Update

    PPENDICES ECTION PPENDIX Search Engine Keywords Library Update • Download keyword library: • Fail to download <category> keyword library due to connection fail! • Successfully downloaded <category> • Fail to download <category> • Search Engine Keyword Library Update has successfully completed.
  • Page 451: Appendix C

    PPENDICES ECTION PPENDIX Appendix C Create a Custom Block Page 8e6 offers ways for you to customize the block page so that the page can have a different look while retaining the infor- mation/functionality provided in 8e6’s default block page. NOTE: The solutions provided in this appendix will only let you customize the Block page, not the Options page.
  • Page 452: Option 2: Modify The R3000 Console

    PPENDICES ECTION PPENDIX Option 2: Modify the R3000 console • PROS: Can be done from the R3000 console. • CONS: Must be set up for each sub-group. 1. Make modifications in one of the redirect URL tabs: • Go to: Group > IP > “Group Name” > “Sub-Group Name”...
  • Page 453: Part Ii: Customize The Block Page

    PPENDICES ECTION PPENDIX Part II: Customize the Block Page 1. Set up a Web server A Web server must be set up to hold the customized block page. 2. Create a customized block page The customized block page must be accessible via this link: http://<server for block_page>[:<port for block page>]/ <blockpage>...
  • Page 454: Implement The "Further Option" (Optional)

    PPENDICES ECTION PPENDIX Implement the “further option” (optional) The “further option” is included in 8e6’s default block page. If used, the <block page> needs to provide a link back to R3000’s Options page and post the required hidden form data (shown in the table below): Name Description: Value SITE...
  • Page 455: Reference

    PPENDICES ECTION PPENDIX Reference HTML <!-- Description: Sample HTML for R3000 customized block page --> <!-- Replace <R3000 IP> with real IP before using --> <!-- Revision: 1 --> <!-- Date: 03/08/2004 --> <html> <head> <script language=javascript> function parseData(str, start, end) result = "";...
  • Page 456 PPENDICES ECTION PPENDIX document.block.USER.value = user; function showData(){ document.write("URL:" + document.block.URL.value + "<br>"); document.write("IP:" + document.block.IP.value + "<br>"); document.write("CAT:" + document.block.CAT.value + "<br>"); document.write("USER:" + document.block.USER.value + "<br>"); function do_options(){ document.block.action="http://<R3000 IP>:81/cgi/block.cgi" document.block.submit(); </script> </head> <body> <form method=post name=block > <input type=hidden name="SITE"...
  • Page 457: Cgi Written In Perl

    PPENDICES ECTION PPENDIX CGI written in Perl There are two methods for CGI written in Perl: One lets you embed data in the query string to pass data to the Options CGI, and the other lets you use Java Script to post form data to the Options CGI.
  • Page 458: Use Java Script To Post Form Data

    PPENDICES ECTION PPENDIX block.cgi?URL=$url&IP=$ip&CAT=$cat&USER=$user&STEP=STEP2\">click here</a><br>\n"; print "</body>\n"; print "</html>\n"; Use Java Script to post form data #!/usr/bin/perl # Original Filename: cusp_block2.cgi # File Type: # Description: Sample Perl script for R3000 customized block page # Replace the <R3000 IP> with the real IP before using. # This script uses Java Script to post form data to # options CGI # Revision:...
  • Page 459 PPENDICES ECTION PPENDIX print "<form method=post name=block>\n"; print "<input type=hidden name=\"SITE\" value=\"_BLOCK_SITE_\">\n"; print "<input type=hidden name=\"IP\" value=\"$ip\">\n"; print "<input type=hidden name=\"URL\" value=\"$url\">\n"; print "<input type=hidden name=\"CAT\" value=\"$cat\">\n"; print "<input type=hidden name=\"USER\" value=\"$user\">\n"; print "<input type=hidden name=\"STEP\" value=\"STEP2\">\n"; print "<br>R3000 Customized Block Page (CGI written with Perl using Java Script to post form data)<br>\n";...
  • Page 460: Cgi Written In C

    PPENDICES ECTION PPENDIX CGI written in C * cusc_block.c * Description: sample C source code of CGI for customized block page * Replace <R3000 IP> with real IP and recompile before using * Revision: 1 * Date: 03/08/2004 #include <stdio.h> struct { char *name;...
  • Page 461 PPENDICES ECTION PPENDIX unescape_url(paramv); paramn = (char *)makeword(paramv, '='); to_upper(paramn); if (strcmp(paramn, "IP") == 0) strcpy(szIP, paramv); else if (strcmp(paramn, "URL") == 0) strcpy(szURL, paramv); else if (strcmp(paramn, "CAT") == 0) strcpy(szCategory, paramv); else if (strcmp(paramn, "USER") == 0) strcpy(szUserName, paramv); getnextquery(&paramv);...
  • Page 462 PPENDICES ECTION PPENDIX printf("<html>\n"); printf("<head>\n"); printf("<script language=\"JavaScript\">\n"); printf("function do_options()\n"); printf("{\n"); printf("document.block.action=\"http://<R3000 IP>:81/cgi/ block.cgi\"\n"); printf("document.block.submit()\n"); printf("}\n"); printf("</script>\n"); printf("</head>\n"); printf("<form method=post name=block >\n"); printf("<input type=hidden name=\"SITE\" value=\"_BLOCK_SITE_\">\n"); printf("<input type=hidden name=\"IP\" value=\"%s\">\n", szIP); printf("<input type=hidden name=\"URL\" value=\"%s\">\n", szURL); printf("<input type=hidden name=\"CAT\" value=\"%s\">\n", szCategory); printf("<input type=hidden name=\"USER\"...
  • Page 463 PPENDICES ECTION PPENDIX url[x] = x2c(&url[y+1]); y+=2; url[x] = '\0'; char x2c(char *what) register char digit; digit = (what[0] >= 'A' ? ((what[0] & 0xdf) - 'A')+10 : (what[0] - '0')); digit *= 16; digit += (what[1] >= 'A' ? ((what[1] & 0xdf) - 'A')+10 : (what[1] - '0'));...
  • Page 464 PPENDICES ECTION PPENDIX char *word; int ll; wsize = 102400; ll=0; word = (char *) malloc(sizeof(char) * (wsize + 1)); while(1) word[ll] = (char)fgetc(f); if(ll==wsize) word[ll+1] = '\0'; wsize+=102400; word = (char *)realloc(word,sizeof(char)*(wsize+1)); --(*cl); if((word[ll] == stop) || (feof(f)) || (!(*cl))) if(word[ll] != stop) ll++;...
  • Page 465 PPENDICES ECTION PPENDIX void getquery(char *paramd, char **paramv) if (paramd == NULL) *paramv = NULL; else *paramv = (char *)strtok(paramd, "&"); void getnextquery(char **paramv) *paramv = (char *)strtok(NULL, "&"); , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 466: Appendix D

    PPENDICES ECTION PPENDIX Appendix D Override Pop-up Blockers An override account user with pop-up blocking software installed on his/her workstation will need to temporarily disable pop-up blocking in order to authenticate him/herself via the Options page: Fig. D-1 Options page This appendix provides instructions on how to use an over- ride account if typical pop-up blocking software is installed, as in the following products: Yahoo! Toolbar, Google...
  • Page 467: Yahoo! Toolbar Pop-Up Blocker

    PPENDICES ECTION PPENDIX Yahoo! Toolbar Pop-up Blocker If Pop-up Blocking is Enabled 1. In the Options page (see Fig. D-1), enter your Username and Password. 2. Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button—this action opens the override account pop-up window.
  • Page 468 PPENDICES ECTION PPENDIX Fig. D-3 Allow pop-ups from source 3. Select the source from the Sources of Recently Blocked Pop-Ups list box to activate the Allow button. 4. Click Allow to move the selected source to the Always Allow Pop-Ups From These Sources list box. 5.
  • Page 469: Google Toolbar Pop-Up Blocker

    PPENDICES ECTION PPENDIX Google Toolbar Pop-up Blocker If Pop-up Blocking is Enabled 1. In the Options page (see Fig. D-1), enter your Username and Password. 2. Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button—this action opens the override account pop-up window.
  • Page 470: Adwaresafe Pop-Up Blocker

    PPENDICES ECTION PPENDIX AdwareSafe Pop-up Blocker If Pop-up Blocking is Enabled 1. In the Options page (see Fig. D-1), enter your Username and Password. 2. Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button—this action opens the override account pop-up window.
  • Page 471: Mozilla Firefox Pop-Up Blocker

    PPENDICES ECTION PPENDIX Mozilla Firefox Pop-up Blocker Add Override Account to the White List 1. From the browser, open the Preferences dialog box. 2. Go to the Category list box and select Privacy & Security > Popup Windows to display the Popup Windows page: Fig.
  • Page 472: Windows Xp Sp2 Pop-Up Blocker

    PPENDICES ECTION PPENDIX Windows XP SP2 Pop-up Blocker Set up Pop-up Blocking There are two ways to enable the pop-up blocking feature in the IE browser. Use the Internet Options dialog box 1. From the IE browser, go to the toolbar and select Tools > Internet Options to open the Internet Options dialog box.
  • Page 473: Temporarily Disable Pop-Up Blocking

    PPENDICES ECTION PPENDIX Use the IE Toolbar In the IE browser, go to the toolbar and select Tools > Pop- up Blocker > Turn On Pop-up Blocker: Fig. D-8 Toolbar setup When you click Turn On Pop-up Blocker, this menu selec- tion changes to Turn Off Pop-up Blocker and activates the Pop-up Blocker Settings menu item.
  • Page 474: Use The Ie Toolbar

    PPENDICES ECTION PPENDIX Add Override Account to the White List There are two ways to disable pop-up blocking for the over- ride account and to add the override account to your white list. Use the IE Toolbar 1. With pop-up blocking enabled, go to the toolbar and select Tools >...
  • Page 475: Set Up The Information Bar

    PPENDICES ECTION PPENDIX Use the Information Bar With pop-up blocking enabled, the Information Bar can be set up and used for viewing information about blocked pop- ups or allowing pop-ups from a specified site. Set up the Information Bar 1. Go to the toolbar and select Tools > Pop-up Blocker > Pop-up Blocker Settings to open the Pop-up Blocker Settings dialog box (see Fig.
  • Page 476 PPENDICES ECTION PPENDIX 3. Click the Information Bar for settings options: Fig. D-11 Information Bar menu options 4. Select Always Allow Pop-ups from This Site—this action opens the Allow pop-ups from this site? dialog box: Fig. D-12 Allow pop-ups dialog box 5.
  • Page 477: 8E6 Mobile Client

    PPENDICES ECTION PPENDIX Appendix E 8e6 Mobile Client 8e6 Mobile Client performs Internet filtering and blocking on mobile PCs physically located outside your organization. This product is comprised of an “external” mobile R3000 filtering appliance and Administrator console configured in the mobile mode, profiles of end users—working at home or on the road—uploaded to the R3000 set in the mobile mode, and Mobile Client software installed on end users’...
  • Page 478: Environment Requirements

    PPENDICES ECTION PPENDIX Environment Requirements Workstation Requirements Minimum system requirements for the administrator include the following: • Windows 2000 or XP operating system running IE 6.0 or higher, or Firefox 1.0 or higher • Macintosh OS X Version 10.4 running Safari, Firefox 1.0 or higher, or IE 6.0 or higher •...
  • Page 479: Work Flow Overview

    PPENDICES ECTION PPENDIX Work Flow Overview Mobile Client Installed on a Mobile PC For mobile PCs located outside of the organization: • a mobile R3000 filtering appliance set in the mobile mode is used for obtaining the end user’s profile and for logging his/her Internet activity •...
  • Page 480: Network Operations Overview

    PPENDICES ECTION PPENDIX Network Operations Overview 8e6 Mobile Client on the Network The following diagram illustrates the functionality of the 8e6 Mobile Client product in conjunction with an existing, internal R3000 filtering appliance and an 8e6 ER (Enter- prise Reporter) reporting appliance on the network: Fig.
  • Page 481: Enterprise Reporter

    PPENDICES ECTION PPENDIX URL is found and the site is disallowed, the Mobile Client software blocks the connection to the Web server. Enterprise Reporter A. The mobile R3000 appliance sends logs to the local Enterprise Reporter (ER) for processing. B. Using the ER Web Client, an administrator can generate customized reports on the remote end user in minutes.
  • Page 482: Mobile Server Section

    IP address on your network. NOTE: If you do not have the R3000 Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you. The basic requirements for initial network setup are as follows: •...
  • Page 483: Configure The R3000 To Use The Mobile Mode

    PPENDICES ECTION PPENDIX Configure the R3000 to use the Mobile Mode The Operation Mode window is used for setting up the external mobile R3000 to use the mobile mode for filtering mobile PCs. 1. In the Mode frame, select “Mobile” to display frames used for configuring the R3000 in the mobile mode: Fig.
  • Page 484 PPENDICES ECTION PPENDIX 4. In the Mobile Client Control frame, at the Client Resyn- chronization Time field, specify the interval of minutes for the external R3000 to resynchronize the profile on the end user's workstation with the profile set up for him/her on the internal R3000.
  • Page 485: Add Mac Addresses To The Master Ip Group

    PPENDICES ECTION PPENDIX Add MAC Addresses to the Master IP Group In the mobile mode, the master IP group Members window is used for adding mobile PC MAC addresses. MAC addresses are used for obtaining mobile PC members’ filtering profiles. , master IP group with MAC addresses Fig.
  • Page 486: Select Mac Addresses For A Sub Group

    PPENDICES ECTION PPENDIX NOTES: Follow steps 2-3 for each MAC address to be added. To remove a member from the Current Members list box, select the MAC address from the list box, and then click Remove. Select MAC Addresses for a Sub Group In the mobile mode, the sub-group Members window is used for selecting MAC addresses for inclusion in the sub- group.
  • Page 487 PPENDICES ECTION PPENDIX 1. In the IP Address frame, specify whether to add or edit an IP address range with or without a netmask by selecting either “Member IP” or “Member IP Start / End”. • If “Member IP” was selected, enter the IP address and specify the netmask in the Member IP fields.
  • Page 488: View Sub Group Mac Addresses

    PPENDICES ECTION PPENDIX View Sub Group MAC Addresses When using the mobile mode, the Sub Group (IP Group) window is used for viewing this sub-group’s MAC addresses previously added in the sub-group’s Members window. , view MAC Addresses Fig. E:2-4 Sub Group (IP Group) window MAC addresses display in the Member MAC(s) list box in the MAC Address frame.
  • Page 489: Add A Mac Address To An Individual Member

    PPENDICES ECTION PPENDIX Add a MAC Address to an Individual Member When using the mobile mode, the Individual IP’s Member window is used for selecting the member’s MAC address for inclusion in the sub-group. Fig. E:2-5 Member window with MAC Address 1.
  • Page 490: Upload Mac Address File For Global, Ip Group

    PPENDICES ECTION PPENDIX Upload MAC Address File for Global, IP Group A file containing multiple MAC addresses can be uploaded to the global group or master IP group using the Upload/ Download IP Profile window. Fig. E:2-6 Global Group’s Upload/Download IP Profile window WARNING: Any existing profiles will be overwritten by the contents of the uploaded file.
  • Page 491 PPENDICES ECTION PPENDIX following entries might be made in the global group profile file: 150.100.30.2,A,J CHAT R GPORN I,1, ,1 00:04:21:AF:33:E1,A,J CHAT R GPORN I,1, ,1 Using this example, in the master IP group’s profile file, the following entries would be made for the end user whose username is “rreynolds”: rreynolds,150.100.30.2,A,J CHAT R GPORN I,1, ,1 rreynolds,00:04:21:AF:33:E1,A,J CHAT R GPORN I,1, ,1...
  • Page 492: Mobile Client Section

    PPENDICES ECTION PPENDIX Mobile Client Section The Mobile Client Section of this user guide contains infor- mation on how the Windows network administrator uses the 8e6 Mobile Client Windows Deployment Kit to install the 8e6 Mobile Client on the network, configure the Mobile Client via the 8e6 Mobile Client Configuration Editor, deploy the Mobile Client to Windows and Macintosh OS X end user workstations, and uninstall the Mobile Client.
  • Page 493: Download And Install The Deployment Kit

    PPENDICES ECTION PPENDIX Download and Install the Deployment Kit To download the 8e6 Mobile Client Windows Deployment Kit to your machine: 1. Insert the CD-ROM that was sent with your R3000 server into your machine. 2. Open the 8e6MobileClient folder and find the .msi file for the 8e6 Mobile Client application.
  • Page 494 PPENDICES ECTION PPENDIX After the file has downloaded to your machine, the File Download dialog box closes and the Security Warning dialog box opens: Fig. E:3-3 Security Warning dialog box. 5. Click Run to close the Security Warning dialog box and to launch the 8e6 Mobile Client Windows Deployment Kit Installation Wizard: Fig.
  • Page 495 PPENDICES ECTION PPENDIX Fig. E:3-5 Destination Folder step of wizard 7. Specify the destination folder to be used, and then click Next to go to the page that confirms the installation process is ready to begin: Fig. E:3-6 Installation process ready to begin 8.
  • Page 496 PPENDICES ECTION PPENDIX Fig. E:3-7 Installation process in progress The following page displays when the installation process is complete: Fig. E:3-8 Installation complete 9. Click Finish to close the wizard dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 497: Access The Mobile Client Configuration Editor

    PPENDICES ECTION PPENDIX Access the Mobile Client Configuration Editor Once the 8e6 Mobile Client has been installed, the Mobile Client Configuration Editor should be used for specifying parameters to be used by the Mobile Client on your network. The 8e6 Mobile Client Configuration Editor can be found at Start >...
  • Page 498: Select The Package: Windows Or Macintosh Os X

    PPENDICES ECTION PPENDIX Select the Package: Windows or Macintosh OS X 1. In the Mobile Client Configuration Editor pop-up window, select File > Open... to open the Open dialog box: Fig. E:3-10 Open dialog box 2. Select the file to be configured, based on the end users’ type of machine: •...
  • Page 499 PPENDICES ECTION PPENDIX Fig. E:3-11 Windows package opened Fig. E:3-12 Macintosh package opened , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 500: Configure The Mobile Client For Deployment

    PPENDICES ECTION PPENDIX Configure the Mobile Client for Deployment NOTE: Before exiting the 8e6 Mobile Client Configuration Editor, be sure to go to File > Save as... to save your entries. Add, remove mobile R3000 1. Click the ellipses (...) button to the right of the Mobile filter host(s) field to open the Add/Remove Mobile Filter Host(s) dialog box: Fig.
  • Page 501: Add, Remove Internal R3000

    PPENDICES ECTION PPENDIX Add, remove internal R3000 1. Click the ellipses (...) button to the right of the Internal filter host(s) field to open the Add/Remove Internal Filter Host(s) dialog box: Fig. E:3-14 Add/Remove Internal Filter Host(s) 2. In the IP or Host Name field, enter the public IP address or hostname of your internal filter host.
  • Page 502: Add Proxy Address Or Host Name

    PPENDICES ECTION PPENDIX Add proxy address or host name 1. If your organization is using a proxy server on the network, in the Proxy address or host name field, enter the IP address or host name of your proxy server. 2.
  • Page 503: Option: Block All Urls If Filter Cannot Be Found

    PPENDICES ECTION PPENDIX Fig. E:3-16 Proxy address fields populated Option: Block all URLs if filter cannot be found The “Block all URLs if filter cannot be found” checkbox is checked by default. This setting indicates that if the Mobile Client cannot detect the mobile R3000, all URLs requested by the end user will be blocked.
  • Page 504: Windows Option: Force Reboot With User Logged In

    PPENDICES ECTION PPENDIX Windows option: Force reboot with user logged in Normally, the Mobile Client is installed during the worksta- tion boot cycle when the Windows Group Policy manager runs a software assignment policy. However, if another mechanism is used to deploy the installation, the end user may be logged in at the time of the installation and thus will be presented with a reboot prompt.
  • Page 505: Mobile Client Deployment To Windows Computers

    PPENDICES ECTION PPENDIX Mobile Client Deployment to Windows Computers Deployment to a group The modified 8e6client.msi file is distributed to multiple Windows workstations using Windows Group Policy by creating a Group Policy Object (GPO) that assigns this soft- ware to the required computers on the network. NOTE: The procedure suggested below presumes that you are using the free add-on Group Policy Management Console (GPMC) provided by Microsoft.
  • Page 506 PPENDICES ECTION PPENDIX 3. Link the new policy: a. In the GPMC, select the domain or organizational unit for which the policy should be applied. b. Right-click, choose "Link an existing GPO", and then select the new policy you created in step 2. Click OK. c.
  • Page 507 PPENDICES ECTION PPENDIX 5. Enable the policy link: Return to the new policy link in the GPMC for the target domain or Organizational Unit, right-click, and then choose "Link Enabled". 6. Test the deployment: a. Select one of the workstations within the scope of the policy and refresh its policies by running gpup- date.exe.
  • Page 508: Installation On A Single Computer

    PPENDICES ECTION PPENDIX Installation on a single computer The 8e6 Mobile Client is manually installed on an single Windows workstation by following these procedures: 1. Go to the folder in which the modified 8e6client.msi file was downloaded, and click the .msi file icon to launch the automatic installation process on the current workstation: Fig.
  • Page 509: Mobile Client Removal From Computers

    PPENDICES ECTION PPENDIX Mobile Client Removal from Computers Uninstallation from a Windows group If the Group Policy that was used for installing the Mobile Client on workstations is removed, the Mobile Client will still remain installed on target workstations. In order to use the Group Policy framework to uninstall the Mobile Client, the Mobile Client Remover (8e6purge.msi) must be deployed using the Group Policy, just as the installer was deployed.
  • Page 510 PPENDICES ECTION PPENDIX 2. Find the 8e6 Mobile Client program and click Remove in Windows XP, and Change/Remove in Windows 2000 to open the Uninstall 8e6 Mobile Client dialog box: Fig. E:3-19 Uninstall 8e6 Mobile Client dialog box 3. Click UNINSTALL to close the Uninstall 8e6 Mobile Client dialog box, and to open the Uninstall dialog box: Fig.
  • Page 511 PPENDICES ECTION PPENDIX Fig. E:3-21 Generate a key In the Machine ID field, enter or paste the eight-digit ID number from the Uninstall dialog box. In this example: 23526528 6. Click the Generate button to display the generated six- character Uninstall key: Fig.
  • Page 512 PPENDICES ECTION PPENDIX Fig. E:3-23 Uninstall the Mobile Client 8. Click OK to begin the uninstallation process. When the Mobile Client has been uninstalled, a message displays asking you to restart the machine: Fig. E:3-24 Restart message 9. Click Restart to restart the machine. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 513: Glossary

    PPENDICES ECTION PPENDIX Appendix F Glossary This glossary includes definitions for terminology used in this user guide. 8e6 supplied category - A library category that was created by 8e6, and includes a list of URLs, URL keywords, and search engine keywords to be blocked. always allowed - A filter category or port given this desig- nation will be included in the white list.
  • Page 514 PPENDICES ECTION PPENDIX associated filtering profiles. The global administrator config- ures the R3000, sets up master IP groups, and performs routine maintenance on the server. group administrator - An authorized administrator of the network who maintains a master IP group, setting up and managing members within that group.
  • Page 515 PPENDICES ECTION PPENDIX machine name - Pertains to the name of the user’s work- station machine (computer). master IP group - An IP group set up in the tree menu in the Group section of the console, comprised of sub-groups and/or individual IP filtering profiles.
  • Page 516 PPENDICES ECTION PPENDIX accomplished via a creative translation of inside “fake” IP addresses into outside real IP addresses. open setting - A setting assigned to a service port or library category when creating a rule, or when setting up a filtering profile or the minimum filtering level.
  • Page 517 PPENDICES ECTION PPENDIX Radius - This feature is used for controlling the filtering levels of dial-up users. The Radius accounting server deter- mines which accounts will be filtered and how they will be filtered. The user profile in the Radius accounting server holds the filter definition for the user.
  • Page 518 PPENDICES ECTION PPENDIX managing the working status of the R3000’s filtering on a network. sub-group - An entity of a master IP group with an associ- ated member IP address, and filtering profile. synchronization - A process by which two or more machines run in parallel to each other.
  • Page 519 PPENDICES ECTION PPENDIX white list - A list of approved library categories for a speci- fied entity’s filtering profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 520 PPENDICES ECTION PPENDIX , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 521: Index

    NDEX Numerics 8e6 Mobile Client 455 8e6 Mobile Client Windows Deployment Kit 470 8e6 supplied category 23 definition 491 Active connections diagnostic tool 104 active filtering profiles 21 Active Profile Lookup window 111 Additional Language Support window 270 Admin Audit Trail window 115 Administrator menu 98 Administrator window 98 alert box, terminology 4...
  • Page 522 NDEX calculator 65 category 8e6 supplied category 294 codes 420 custom categories 389 custom category 23 library 23 category codes 420 Category Groups menu 293 category profile global 229 IP group 349 minimum filtering level 252 Category Weight System menu 288 Category Weight System window 288 checkbox, terminology 4 Common Customization window 194...
  • Page 523 NDEX Emergency Update Log window 279 Enterprise Reporter 1 environment requirements 10 Exception URL window 356 field, terminology 4 filter option codes 420 filter options global group 234 filter setting 25 definition 491 Filter window 71 filtering 420 category codes 420 hierarchy diagram 27 profile components 22 profile types 19...
  • Page 524 NDEX global group 17 category profile 229 default redirect URL 233 filter options 234 menu 212 override account 239 port profile 231 Global Group Profile window 228 Google Web Accelerator 75 Google/Yahoo! Safe Search Enforcement global group filter option 236 grid, terminology 5 group create IP group 261...
  • Page 525 NDEX Individual IP 381 individual IP member add to group 370 definition 492 delete 384 profile type 20 Individual IP Profile window 383 instant messaging 29 definition 492 Internet Explorer 10 invisible mode 12 definition 492 diagram 12 diagram with port monitoring 13 IP group 18 category profile 349 create 261...
  • Page 526 NDEX lookup 281 manual updates 268 patch update 269 search engine keywords, 8e6 supplied category 305 search engine keywords, custom category 408 update categories 268 update logs 272 URL keywords, 8e6 supplied category 301 URL keywords, custom category 405 URLs, 8e6 supplied category 296 URLs, custom category 395 weekly update 269 library categories 23...
  • Page 527 NDEX block page authentication 79 lookup library 281 machine name, definition 493 Macintosh 456 Manual Update to 8e6 Supplied Categories 268 Manual Update window 268 master IP group 18 definition 493 filtering profile 20 maintenance 336 setup 261 master list 305 definition 493 Member window Individual IP MAC address 467...
  • Page 528 NDEX definition 493 NetBIOS definition 493 Network Address Translation (NAT), definition 493 Network menu 89 network requirements 10 Network Time Protocol (NTP) 92 NIC Configuration diagnostic tool 104 NIC Mode menu 158 NIC Mode Speeds Chart 160 NIC Mode window 158 NNTP Newsgroup menu 291 NNTP Newsgroup window 291 NTP Servers window 92...
  • Page 529 NDEX global administrator 99 override account 340 patch emergency update logs 279 update logs 130 Patch menu 124 patch update 269 Patch Update Log window 130 Patch window 125 patches 125 PDC, definition 494 peer-to-peer 29 definition 494 Ping 103 pop-up blocking, disable 444 pop-up box/window, terminology 6 port profile...
  • Page 530 NDEX R2000 1 R3000 Enterprise Filter 1 R3000 Quick Start Guide 460 R3000IR 48 radio button, terminology 6 Radius definition 495 Radius Authentication Settings menu 170 Radius Authentication Settings window 170 Range to Detect window 213 Real Time Probe 495...
  • Page 531 NDEX Safari 456 screen, terminology 6 search engine definition 495 search engine keyword 8e6 supplied category 305 custom category 408 Search Engine Keyword Filter Control global group filter option 237 search engine keyword filtering 237 Search Engine Keywords window 305 custom category 408 self-monitoring process 119 service port 24...
  • Page 532 NDEX synchronization 136 backup procedures 45 definition 496 delays 39 overview 34 server maintenance 45 setup 36 Setup window 137 Status window 144 sync items 40 Synchronization menu 136 System Command window 101 System Performance diagnostic tool 105 system requirements 10 System screen 53 Target mode 35 technical support 412...
  • Page 533 NDEX update add patch to server 125 emergency patches 279 library categories 272 patches 130 Updates menu 265 Upload/Download IP Profile window 249 MAC addresses 468 UPS 67 URL Keyword Filter Control global group filter option 238 URL keyword filtering 238 URL Keywords window 301 8e6 supplied category 301 custom category 405...
  • Page 534 NDEX window, terminology 8 Windows 2000 456 Windows XP 456 workstation requirements 10 X Strikes Blocking global group filter option 235 X Strikes Blocking window 177 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...

This manual is also suitable for:

R3000

Table of Contents