Page 2
, R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 3
8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the exam- ples herein.
Page 4
, R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
ONTENTS ..........1 NTRODUCTORY ECTION R3000 Enterprise Filter ............... 1 About this Manual ............... 1 How to Use this Manual .............. 3 Conventions ..................3 Terminology ..................4 Overview ..................9 Environment Requirements ............. 10 Workstation Requirements .............. 10 Network Requirements ..............10 Chapter 1: Filtering Operations ..........
Page 6
Block IM for a Specific Entity ........31 Block P2P for a Specific Entity ........32 Chapter 3: Synchronizing Multiple Units ........ 33 R3000 Synchronization ..............33 Synchronization Setup ..............35 Setting up a Source Server ............35 Setting up a Target Server ............35 Types of Synchronization Processes ..........
Page 8
CPU usage................98 System performance ............99 Recent logins ..............99 View Log File window ............. 100 View Log Results .............. 101 Troubleshooting Mode window ..........102 Use the Troubleshooting Mode ......... 103 viii , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 9
Setup window ................. 115 Using Only One R3000 on the Network ......116 Using More than One R3000 on the Network ....116 Set up an R3000 to be a Source Server..... 116 Sync All Target Servers with the Same Settings ..119 Set up an R3000 to be a Target Server......
Page 10
X Strikes Blocking ................. 153 X Strikes Blocking window ............153 Configuration..............154 Set up Blocking Criteria ..........154 Reset All Workstations..........155 X Strikes Block Page ..........155 Overblocking or Underblocking........156 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 11
Global Group Profile window ..........177 Category Profile ..............178 Create, Edit a List of Selected Categories....178 Port..................179 Create, Edit a List of Service Ports......180 Default Redirect URL ............181 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 13
View Transfer Activity to the ER ......... 230 Other Device ..............231 Enter or Edit Server Information ......... 231 View Transfer Activity to the Reporting Device... 233 Real Time Probe ................234 Real Time Probe window ............234 xiii , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 14
Remove an Override Account ........... 258 Add Sub Group ............... 259 Add an IP Sub Group ............259 Delete Group ................259 Delete an IP Group Profile ..........259 Paste Sub Group ..............260 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 15
URL Lookup, Removal ............284 Search Engine Keyword Lookup, Removal....... 285 Reload the Library............. 285 Custom Category ................286 Add Category ................287 Add a Custom Library Category........287 Refresh ................... 288 Refresh the Library............288 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 16
ECHNICAL UPPORT RODUCT ARRANTIES Technical Support ..............305 Hours ..................... 305 Contact Information ............... 305 Domestic (United States) ............305 International ................305 E-Mail ..................306 Address .................. 306 Support Procedures ..............306 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 17
PPENDICES ECTION Appendix A ................310 Configurations for ER Reporting ........... 310 Entries in the R3000 Administrator GUI ........310 Entries in the ER Administrator GUI ........312 Appendix B ................313 Filtering Profile Format and Rules ..........313 Rule Criteria ................313 Appendix C ................
Page 18
Show 8e6’s information in the block page (optional) .. 325 Implement the “further option” (optional) ....326 Customized block page examples ......326 Part III: Restart the R3000 ............326 Reference ................327 HTML ................327 CGI written in Perl ............. 329 Embed data in query string.........
These administrators are referred to as “group administrators” throughout this manual. Additional information is provided for administrators of networks that use the R3000 with 8e6’s Enterprise Reporter (ER) for both filtering and reporting. , R3000 E...
Page 20
R3000 box—to create group administrator accounts, and to make configura- tions that will enable the R3000 to filter the entire network. • Group Administrator Section - This section includes...
WARNING: The “warning” icon is followed by italicized text cautioning you about making entries in the application, executing certain processes or procedures, or the outcome of specified actions. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
One or more tree lists also can display in this panel. When an item in the tree list is double-clicked, the tree list opens to reveal items that can be selected. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 23
GUI, by changing the order of the columns. • list box - an area in a dialog box, window, or screen that accommo- dates and/or displays entries of items that can be added or removed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 24
• screen - a main object of an appli- cation that displays across your monitor. A screen can contain panels, windows, frames, fields, tables, text boxes, list boxes, icons, buttons, and radio buttons. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
By clicking the link for a topic, the window for that topic displays in the right panel of the screen, or a menu of sub-topics opens. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 26
Other types of windows include pop-up windows, login windows, or ones from the system such as the Save As or Choose file windows. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
To help you become familiar with the R3000 and how it functions on the network, Chapter 1 of this section of the User Guide provides an overview on filtering. Chapter 2 gives insight into Web site access logging, and instant messaging and peer-to-peer setup procedures.
WIndows server 2003) • Internet Explorer (IE) 5.5 or later • JavaScript enabled • Java Virtual Machine • Java Plug-in (use the version specified for the R3000 software version) Network Requirements • High speed connection from the R3000 server to the client workstations •...
HAPTER ILTERING PERATIONS Chapter 1: Filtering Operations Operational Modes Based on the setup of your network, the R3000 can be configured to use one of these operational modes for filtering the network: • invisible mode • router mode • firewall mode...
ILTERING PERATIONS Invisible Mode If the R3000 is set up in the invisible mode, the unit will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment. The unit will only intercept a session if an inappropriate request was submitted by a client.
Page 31
(4) is sent to the Internet server. An R3000 set up in the invisible mode can also work in the router mode. Figure 1:1-2 illustrates an example of a monitor mode setup, with the R3000 connected to the managed switching hub.
ILTERING PERATIONS Router Mode If the R3000 is set up in the router mode, the unit will act as an Ethernet router, filtering IP packets as they pass from one card to another. While all original packets from client PCs are allowed to pass, if the R3000 determines that a request is inappropriate, a block page is returned to the client to replace the actual requested Web page or service.
Firewall Mode The firewall mode is a modification of the router mode. With the R3000 set up in this mode, the unit will filter all requests. If the request is appropriate, the original packet will pass unchanged. If the request is inappropriate, the original packet will be blocked from being routed through.
Page 34
Figure 1:1-5 illustrates an example of a firewall mode setup in which requests are always sent to the caching server. In this scenario the R3000 will be affected if the caching proxy server contains unfiltered, “bad” cached pages. 8e6 recom- mends that cached content is cleared or expired after installing the R3000.
NOTES: If authentication is enabled, the global administrator can also access the NT and LDAP branches of the tree. If multiple R3000 units are set up on the network and the synchro- nization feature is used, an R3000 that is set up to receive profile changes will only display the Global Group type in the tree list.
The group administrator creates and maintains sub-groups and their filtering profiles. Fig. 1:1-6 IP diagram, with a sample group and its sub-groups , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
A URL can be specified for use instead of the standard block page when users attempt to access material set up to be blocked. Various filter options can be enabled. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
If any user needs access to a specified URL that is set up to be blocked, the group administrator can create an override account for that user. This account grants the user access to areas set up to be blocked on the Internet. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
(default) filtering profile • filter settings - used by service ports, filtering profiles, rules, and the minimum filtering level to indicate whether users should be granted or denied access to specified Internet content , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
However, unlike 8e6 supplied categories, a custom cate- gory can be deleted. NOTE: 8e6 cannot provide updates to custom categories. Main- taining the list of URLs and keywords is the responsibility of the global or group administrator. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Service ports are used when setting up filter segments on the network (the range of IP addresses/netmasks to be detected by the R3000), the global (default) filtering profile, and the minimum filtering level. When setting up the range of IP addresses/netmasks to be detected, service ports can be set up to be open (ignored).
• ignore - if the filter segment detected on the network has a service port set up to be ignored, that service port will be bypassed , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
IP sub-groups. However, if an IP sub-group user has an override account, that user can override his/her IP profile and possibly the minimum filtering level—if the global administrator allows override accounts to bypass the minimum filtering level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Chapter 2: Logging and Blocking Web Access Logging One of the primary functions of the R3000 is to log the activity of users on the Internet. Information captured in the log can be transferred to a reporting appliance, to be viewed on a PC monitor or output to a printer.
When the IM module is loaded on the server, the R3000 compares packets on the network with IM libraries stored on the R3000 server. If a match is found, the R3000 checks the user’s profile to see whether the user’s connection to the IM service should be blocked, and then performs the appro- priate action.
When the P2P module is loaded on the server, the R3000 compares packets on the network with the P2P library stored on the R3000 server. If a match is found, the R3000 checks the user’s profile to see whether the user’s connec- tion to the P2P service should be blocked, and then performs the appropriate action.
• the global group profile must have both the INSTMS and CHAT library categories set up to be blocked • the minimum filtering level profile must have both the INSTMS and CHAT library categories set up to be blocked. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
IM traffic with the Range to Detect feature is desired • the minimum filtering level profile should not have IM blocked, unless blocking all IM traffic with the Range to Detect feature is desired. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
P2P traffic with the Range to Detect feature is desired • the minimum filtering level profile should not have P2P blocked, unless blocking all P2P traffic with the Range to Detect feature is desired. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Alone” mode, “Source” mode, or “Target” mode—based on the setup within your organization. In a multi-R3000 server environment, all R3000 units should be set up with the same user profile data, so that no matter which R3000 server a user’s PC accesses on the network, that user’s Internet usage is appropriately filtered and blocked.
R3000 appliances on the network. Whenever a filtering configuration change is made on the source R3000 unit, that change is sent to all target R3000 units that have been identified by the source unit via the Synchronization Setup window of the R3000 GUI. This means that all filtering configuration should be made on the source R3000 unit.
This entry identifies the location of each target unit on the network. WARNING: If an R3000 server is set up in the Source mode with a Network Address Translation (NAT) device between the source and target server(s), be sure that ports 26262, 26268, and 88 are open on the source server.
YNCHRONIZING ULTIPLE NITS WARNING: If an R3000 server is set up in the Target mode with a NAT device between the target and source server, be sure that ports 26262 and 26268 are open on the target server. This setup is required so that the target server can communicate with the source server.
Once locally applied on the source server, this update will be placed in a queue for submission to target R3000 servers. The source server will then send the information in the queue to all target servers.
The delay in activating a library change can take a little longer than in activating a filtering profile change. This is due to the fact that the library on the R3000 is loaded into the physical memory. When a change is made to the library, a new library must be loaded into memory with the changes.
R3000s will read from the source R3000 upon load. These items will then be updated on an as needed basis from the source R3000. For purpose of differentiation, these items will be referred to as functionally synchronized for purposes of this manual.
As can be seen by these lists, static configuration options— such as library changes—will be synchronized. All active options—such as profile changes—will be functionally synchronized. One time configuration options on the R3000—such as reporting configurations, or IP addresses—will not be synchronized. , R3000 E ECHNOLOGIES...
NITS Server Maintenance Procedures Source Server Failure Scenarios In the event that the source R3000 unit should fail, the target servers will continue to run using the last known configura- tion loaded from the source server. However, all dynamic authentication-based profiles will eventually time-out, since the source R3000 server can no longer verify user creden- tials.
5. Go to the Reboot window (accessible via System > Control) and reboot the server. 6. Once the R3000 is rebooted, reconnect to the GUI and access the Backup/Restore window. 7. Upload the last good configuration from the failed source server to the new source server.
IP address on your network. NOTE: If you do not have the R3000 Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you.
Page 63
HAPTER ETTING TARTED Fig. 1:4-1 R3000 Introductory Window NOTE: The R3000 Introductory Window must be left open throughout your session. This window displays minimized when the Login dialog box opens. 4. When the Login dialog box opens, enter your Username and Password: Fig.
Page 64
5. Click OK to close the login dialog box and to access the welcome screen of the Administrator GUI: Fig. 1:4-3 Welcome screen On this screen, the R3000 Version Number displays in the Product frame, and dates for the Last Library Update and Last Patch Update display in the R3000 Enterprise Filter Status frame.
ECTION HAPTER ETTING TARTED If it has been more than seven days since the R3000 last received updates to library categories, the following message displays above the Product frame:”Libraries were last updated 7+ days ago. Please use the Weekly Update option.”...
Page 66
Internet activities. • Help - clicking this button displays the Help screen. This screen includes navigational tips and a link to this User Guide: Fig. 1:4-4 Help screen , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Click a link to go to a specified topic. 2. To view Help Topics for another section, click the tab for that section. 3. Click Close Window to close the Help Topics window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
• Hover Display The yellow tooltip box displays when you hover over the icon with your mouse: Fig. 1:4-6 Tooltip mouseover effect To close the tooltip box, move the mouse away from the icon. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 69
HAPTER ETTING TARTED • Help pop-up box The Help pop-up box opens when you press the F1 key on your keyboard: Fig. 1:4-7 Help pop-up box Click OK to close the pop-up box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
In System, Library, and Reporting screens, the control panel contains topic links. By clicking a topic link, the window for that topic displays in the right panel: Fig. 1:4-8 Selected topic and its corresponding window , R3000 E ECHNOLOGIES NTERPRISE ILTER...
For these topics, clicking a topic link opens a menu of sub-topics: Fig. 1:4-9 Sub-topics menu When a sub-topic from this menu is selected, the window for that sub-topic displays in the right panel of the screen. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
(+) sign, when that branch of the tree is collapsed. By double-clicking the entity, a minus (-) sign replaces the plus sign, and all branches within that branch of the tree display. An item in the tree is selected by clicking it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
When a tree list topic is selected and clicked, a menu of subtopics opens: Fig. 1:4-11 Tree list topics and sub-topics Clicking a sub-topic displays the corresponding window in the right panel, or opens a pop-up window or alert box, as appropriate. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Entries made in a tab must be saved on that tab (except in the Time Profile window). NOTE: In the Time Profile window, entries can only be saved on the primary tab. Fig. 1:4-12 Window with tabs , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The navigation path displays at the top of each window: Fig. 1:4-13 Navigation path This path reminds you of your location in the GUI. The entire path shows the screen name, followed by the topic name, and sub-topic name if applicable. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Refresh the GUI Press F5 on your keyboard to refresh the Administrator GUI. This feature is useful in the event that more than one browser window is open simultaneously for the same R3000 server. Select Multiple Items When moving several items from one list box to another, or when deleting several items, the Ctrl and Shift keys can be used to expedite this task.
Note that the pop-up window displays the IP address, Netmask, Min Host, and Max Host. 2. After making a note of this information, click the “X” to close the IP Calculator. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 1:4-15 Select an Option box 2. Click Yes to close the Administrator GUI. 3. Click the “X” in the upper right corner of the R3000 Intro- ductory Window to close it. WARNING: If you need to turn off the server, see the ShutDown window of the System screen in the Global Administrator Section.
The Global Administrator Section of this manual is comprised of four chapters, based on the layout of the GUI. This section is used by the authorized global administrator of the R3000 for configuring and maintaining the R3000 server. The global administrator is responsible for integrating the...
Control settings, Network settings, Administrator account information, Diagnostics, Alert contacts, Patch, Synchroni- zation, operation Mode, Authentication settings (see the R3000 Authentication User Guide for information about this topic), NIC Mode, Backup/Restore operations, Reset settings, Radius Authentication Settings, SNMP, and X Strikes Blocking.
ECTION HAPTER YSTEM SCREEN NOTE: If the synchronization feature is used, an R3000 set up in the Target mode will not include Authentication, Radius Authenti- cation Settings, and X Strikes Blocking menu items. Click your selection to choose a main topic from this list, or to view a menu of sub-topics, if applicable.
Blocking is used for specifying whether this server being configured will log and block Instant Messaging (IM) and/or Peer-to-Peer (P2P) services for users. HTTPS Filtering lets you set the level of filtering for HTTPS sites on R3000s set , R3000 E ECHNOLOGIES NTERPRISE ILTER...
The default setting has Local Filtering “On”. Disable Local Filtering If you have multiple R3000 servers on the network, you may wish to disable local filtering on the source server and use the server primarily for authenticating users who log on the network.
Disable Options for IM, P2P To disable Instant Messaging and/or P2P logging and blocking, click the “Off” radio button for the selected option(s). NOTE: After making all entries in this window, click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Specify your preference for filtering HTTPS sites in the HTTPS Filtering frame. Select from the following settings for the HTTPS Filtering Level: • “None” - if you do not want the R3000 to filter HTTPS sites • “Low” - if you want the R3000 to filter HTTPS sites...
ECTION HAPTER YSTEM SCREEN Target(s) Filtering The Target(s) Filtering frame only displays if the R3000 currently being configured is set up in the Source mode for synchronization. The default setting has All Target(s) Filtering “On”. Disable Filtering on Target Servers To disable All Target(s) Filtering, click the “Off”...
Block Page Authentication Block Page Authentication displays by default and is used for entering criteria the R3000 server will use when vali- dating a user’s account. Information entered/selected in this tab is used by the block page that displays when an end user attempts to access a site or service that is set up to be blocked.
YSTEM SCREEN NOTES: See Appendix D: Create a Custom Block Page for infor- mation on how to create a customized block page. Refer to the R3000 Authentication User Guide for more informa- tion on authentication. Enter, Edit Block Page Options...
Page 89
Logon Script Path field, \\PDCSHARE\scripts displays by default. In this field, enter the path of the logon script that the R3000 will use when re-authenticating users on the network, in the event that a user's machine loses its connection with the server, or if the server is rebooted.
• IP field - The user’s IP address displays. • Category field - The name of the library category that blocked the user’s access to the URL displays. If the content the user attempted to access is blocked by an , R3000 E ECHNOLOGIES NTERPRISE ILTER...
• HELP - Clicking this link takes the user to 8e6’s Tech- nical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. Optional Links...
• BACK and HELP links • User/Machine frame contents The frame beneath the User/Machine frame includes infor- mation for options (1, 2, 3, and/or 4) based on settings made in the Block Page Authentication tab. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 93
Logon Script Path field. When the user clicks this link, a window opens: Fig. 2:1-7 Re-authentication option The user should click the logon.bat icon to run a script that will re-authenticate his/her profile on the network. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 94
Internet content. NOTE: See Appendix E: Override Pop-up Blockers for informa- tion on how a user with an override account can authenticate if a pop-up blocker is installed on his/her workstation. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 95
NOTE: See Appendix E: Override Pop-up Blockers for informa- tion on how a user can restore his/her profile and/or NET USE connection if a pop-up blocker is installed on his/her workstation. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
TIP: An entry in any of the fields in this tab is optional, but if an entry is made in the Link Text field, a corresponding entry must also be made in the Link URL field. , R3000 E ECHNOLOGIES NTERPRISE...
Page 97
Enter the e- mail address of the recipient at your organization who should be contacted by users on the network, in the event that Internet content is incorrectly blocked. 3. Click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 2:1-10 ShutDown window Shut Down the Server In the ShutDown frame, click ShutDown to power off the server. To restart the server, the GUI needs to be reac- cessed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
ECTION HAPTER YSTEM SCREEN Reboot window The Reboot window displays when Reboot is selected from the Control menu. This window is used for reconnecting the server on the network. Fig. 2:1-11 Reboot window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Server Status message box, informing you that the server is now disconnected: Fig. 2:1-13 Server Status: disconnect message When the Server Status box closes, the R3000 Enter- prise Filter status message box opens and informs you that the server is rebooting itself, and how much time has elapsed since this process began: Fig.
Page 101
Fig. 2:1-16 Server connected alert box 3. Click OK to close the R3000 ready alert box. 4. Click OK to close the Server connected alert box. 5. You must now re-access the GUI.
ECTION HAPTER YSTEM SCREEN Network Network includes options for configuring the R3000 server on the network. Click the Network link to view a menu of subtopics: LAN Settings, NTP Servers, Regional Setting, and Block Page Route Table. Fig. 2:1-17 System screen, Network menu...
YSTEM SCREEN LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu. This window is used for configuring network connection settings for the R3000. Fig. 2:1-18 LAN Settings window , R3000 E ECHNOLOGIES...
HAPTER YSTEM SCREEN Enter, Edit LAN Settings 1. In the Host Name field, the default host name is R3000. Enter the name of the host for this server, such as R3000.LOGO.com. 2. Enter or edit the following information, as necessary: •...
IP addresses of servers running Network Time Protocol (NTP) software. NTP is a time synchronization system for computer clocks throughout the Internet. The R3000 will use the actual time from a clock at a specified IP address. Fig. 2:1-19 NTP Servers window...
128.59.35.142, 142.3.100.15, and 129.132.98.11. NOTE: Any IP address following the first entry in the Servers list box is only used in the event that the R3000 cannot access the primary time NTP server specified. IP addresses are used in the order in which they display in the list box.
Regional Setting window The Regional Setting window displays when Regional Setting is selected from the Network menu. This window is used for specifying the time zone to be used by the R3000. Fig. 2:1-20 Regional Setting window , R3000 E...
3. Click Apply to apply your settings. WARNING: If using the R3000 with an 8e6 Technologies Enter- prise Reporter unit, be sure each R3000 used by the ER is set up in the same time zone as the ER. These “like” settings ensure consistency when tracking the logging times of all users on the network.
Fig. 2:1-21 Block Page Route Table window NOTE: See the Block Page window for information on setting up block pages. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
5. Click Apply to apply your settings. Remove a Router To remove one or more routers from the IP/Mask list box: 1. Select the router(s) from the list box. 2. Click Delete. 3. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
TIP: The default Username is admin and the Password is user3. 8e6 recommends that you retain this default account in the event that the R3000 unit cannot be accessed. An authorized 8e6 Technologies technical representative may need to use this user- name and password when troubleshooting the unit.
4. Click Modify to apply your settings. Delete a Global Administrator Account To delete a global administrator account: 1. Select the username from the Current User list box. 2. Click Delete. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Click the Diagnostics link to view a menu of sub-topics: System Command, View Log File, Troubleshooting Mode, Active Profile Lookup, and Admin Audit Trail. Fig. 2:1-23 System screen, Diagnostics menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 2:1-24 System Command window WARNING: Diagnostics tools utilize system resources, impacting the R3000’s performance. The following diagnostic tool options are available from the pull-down menu: ping(Ping), traceroute(Trace Route), ps(Process list), top(TOP CPU processes), ifconfig(NIC...
Ping The Ping diagnostic tool is used for verifying whether the R3000 can communicate with a machine at a given IP address within the network, and the speed of the network connection. Enter the IP address or host name of the specific Internet address to be contacted (pinged), and then click Execute to display results in the Result box below.
CPU usage The CPU Usage diagnostic tool shows information on disk usage. When Execute is clicked, the Results box shows the average CPU usage, as well as the usage by device and file system/partition. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The Recent Logins diagnostic tool is used for showing infor- mation on administrator login activity. When Execute is clicked, the Result box displays a row of data for each time an administrator logged on the R3000 server. , R3000 E ECHNOLOGIES...
The View Log File window displays when View Log File is selected from the Diagnostics menu. This window is used for viewing the most recent log file results of various activi- ties and for troubleshooting. Fig. 2:1-25 View Log File window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
NIC card. NOTE: For information about the “wbwatch Log (wbwatch.log)” and “Authentication Log (AuthenticationServer.log)” options, see the View log results section in the R3000 Authentication User Guide. • “Admin GUI Server Log (AdminGUIServer.log)” - used for viewing information on entries made by the admin- istrator in the GUI.
Fig. 2:1-26 Troubleshooting Mode window WARNING: This tool utilizes system resources, impacting the R3000’s performance. When you click Enable the R3000 will stop filtering the network. After you finish making the necessary changes to the server, be sure to click Disable to terminate your Troubleshooting Mode session.
(TCP); Address Resolution Protocol (ARP); packets destined to a specified port (80, 443, 81); packets destined to the R3000; packets sent to or from port 20 or 21; or packets sent to the Virtual IP address’s port 137 or 139.
"source" R3000 server. Fig. 2:1-27 Active Profile Lookup window NOTE: In order to use this diagnostic tool, IP sub-groups must be set up in the Group section of the R3000, and each IP sub-group must have a filtering profile. , R3000 E...
FTP server. The log of changes made on the server can be viewed in this window. Admin Audit Trail The Admin Audit Trail tab displays by default: Fig. 2:1-28 Admin Audit Trail window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
5. Type in the Password to be used, and type it again in the Confirm Password field. 6. Click Apply to apply your settings. FTP the Log on Demand Click FTP Now to transfer the log on demand. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
(Time), IP address of the machine used by the administrator, administrator's User- name, and a brief description of the Action performed on the server. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
This window is used for setting up and main- taining e-mail addresses of contacts who will receive auto- mated notifications if problems on the network are detected during the R3000’s self-monitoring process. Fig. 2:1-30 Alert window , R3000 E...
Page 128
FTP server. Action should be taken to prevent the hard drive from reaching 100 percent utilization. • Log File Transmission - If the R3000 is unable to send log files as scheduled to an ER server or a third party...
2. After all edits have been made, click Apply to apply your settings. Disable the Alert Feature 1. Click the “Disable” radio button. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 2:1-31 Patch window NOTE: Available patches for the R3000 come from downloads made to the server via Traveler, 8e6’s executable program that can run on demand or be set to run at a scheduled time.
NOTE: Patches must be applied to the server in sequential order. TIP: Click the link (“here”) at the bottom of the window to go to the Web page at 8e6 Technologies’ public site (http:// www.8e6.com/products/R3000/patches/r3000_patches.htm) where release notes about patches can be obtained.
Synchronization By default, the Synchronization pop-up menu includes the Setup option that lets you specify the R3000 server’s func- tion on the network: whether it will be a stand alone box, or whether it will send profile changes to—or receive profile changes from—another R3000.
The Setup window displays when Setup is selected from the Synchronization menu. This window is used for establishing the function of the R3000, especially if there is more than one R3000 on the network. When there are multiple R3000 servers, it is important to set up one as a "source" server and others as "targets,"...
An R3000 configured to be a “source” server will send profile changes to other R3000 (“target”) servers. WARNING: If an R3000 server is set up in the Source mode with a Network Address Translation (NAT) device between the source and target server(s), be sure that ports 26262, 26268, and 88 are open on the source server.
Page 135
3. In the Target IPs frame, enter the Target IP address of the R3000 server that will receive profile changes from this server being configured. NOTE: If a target server is set up with a NAT device, the NAT IP address must be used instead of the target server’s own IP...
Page 136
NOTE: This test only verifies whether this server can contact the target server(s). In order for synchronization to be operable on the network, the target server(s) must also be able to contact this source server being configured. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Two scenarios in which this feature might be used involve restoring backup data to the R3000 server: • In the first scenario, library configurations from a previous date in time are restored to the source server, and each target server needs to have these same library configurations as well.
An R3000 configured to be a target server will receive profile changes from the source server only. WARNING: If an R3000 server is set up in the Target mode with a NAT device between the target and source server, be sure that ports 26262 and 26268 are open on the target server.
Page 139
NOTE: This test only verifies whether this server can contact the source server. In order for synchronization to be operable on the network, the source server must also be able to contact this target server being configured. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Fig. 2:1-36 Status window, Source mode If set up in the Target mode, this window is used for verifying that profile updates are being received from the source server. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
YSTEM SCREEN View the Sync Status of Targets from the Source If the server is set up in the Source mode, the R3000 System Time displays at the top of the Target(s) Status frame. This is the current date and time from the R3000 server—using the YYYY/MM/DD and HH:MM:SS format—...
1. In the Current Queue column for that server, click Details to open the Queue of Target pop-up window: Fig. 2:1-37 Queue of Target pop-up window 2. Click Close to close the pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Fig. 2:1-38 History of Target pop-up window 4. Click Close to close the pop-up window. Place Items in Queue for Syncing To place new sync items in queue for the target server(s), click Test Sync. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
YSTEM SCREEN View the Sync Status of the Target Server If the server is set up in the Target mode, the R3000 System Time displays above the Target Sync Status frame. This is the current date and time from the R3000 server—using the YYYY/MM/DD and HH:MM:SS format—and includes the...
Synced to the Server in this section for information on accessing and viewing the contents of this window. Mode Mode includes options for configuring the R3000 to filter the network. Click the Mode link to view a menu of sub-topics: Operation Mode and Proxy Environment Settings.
Mode is selected from the Mode menu. This window is used for specifying the operational mode in which the R3000 will filter the network, and the settings the R3000 will use for “listening to” traffic and sending traffic. Fig. 2:1-41 Operation Mode window Set the Operation Mode The default Mode setting is “Invisible”.
Address Resolution Protocol method to find the best possible destination MAC address of a specified host, usually the R3000 gateway. • “Send Block to Specified Host MAC Address” - using this preferred method, the block page will always be sent to the MAC address of a specified host, usually the R3000 gateway.
Proxy Environment Settings is selected from the Mode menu. This window is used for specifying whether the R3000 is in a proxy environment, and if the default Web server port number 80 will be enabled. Fig. 2:1-42 Proxy Environment Settings window...
1. Click the “On” radio button. This selection indicates that the R3000 will perform a reverse lookup on packets to detect the source address and origin of packets. 2. Click Apply to apply your setting.
ECTION HAPTER YSTEM SCREEN Authentication Authentication includes options for configuring the R3000 to authenticate and re-authenticate users on the network. Click the Authentication link to view a menu of sub-topics: Enable/Disable Authentication, Authentication Settings, Authentication SSL Certificate, and Authentication Form Customization.
The NIC Mode window displays when NIC Mode is selected from the control panel. This window lets you specify the speed for the R3000’s Network Interface Card settings so that the R3000 can communicate with the network switch or hub. Fig. 2:1-44 NIC Mode window By default the NIC mode for Ethernet 0 and Ethernet 1 is set to “Auto”.
NIC. Modify the NIC Mode Setting WARNING: If changing the NIC mode, be sure the hub/switch to which the R3000 is connected will support the selected NIC mode. An incorrect setting may prevent you from accessing the R3000 GUI.
For an Interface with an “Up” status, the Link status (Up or Down) displays to the right of the Interface status. NIC Mode Speeds Chart Below is a chart of NIC speeds for various R3000 models: Model LAN 1 (eth0) LAN 2 (eth1)
Fig. 2:1-46 Backup/Restore window WARNING: A backup should be created and downloaded off the R3000 server whenever a change is made to filtering settings on the R3000 server. , R3000 E ECHNOLOGIES...
These backup files can be uploaded to a new server, eliminating the need to re- enter the same settings from the old R3000 in the GUI of the new R3000. NOTE: See Server Maintenance Procedures from the Introduc- tory Section’s Chapter 3: Synchronizing Multiple Units, for an...
To back up configuration and/or library modifications: 1. In the Backup frame, click the Configuration and/or Library checkbox(es) as appropriate. 2. Click Backup to open the R3000 Backup dialog box: Fig. 2:1-47 R3000 Backup dialog box 3. Type in the Filename for the backup file.
“.gz” file: Fig. 2:1-48 Save file alert box 3. Click OK to close the alert box and to open the File Download dialog box: Fig. 2:1-49 File Download dialog box , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 159
Down- load to display field: Fig. 2:1-51 Download complete dialog box You can now open this file, open the folder where the file was saved, or close this dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
WARNING: Be sure the file you are restoring uses the same version of the software currently used by the R3000 Administrator GUI. Refer to the Patch window for available updates to the R3000’s software. (See the Patch window for more information about software updates.)
Backup Configurations grid. Restore Configurations to the Server To restore configurations or library modifications from a previous backup: 1. Select the file from the Backup Configurations grid. 2. Click Restore to overwrite the current settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Select the file. 2. Click Delete. View Backup and Restoration Details To view details on backup and/or restoration activities: 1. Click Log to open the Backup/Restore Log pop-up box: Fig. 2:1-54 Backup/Restore pop-up box , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 163
The following information displays for each row: the date and time a process was attempted to be executed, and a Message indicating whether that process succeeded or failed. 2. Click OK to close the pop-up box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 2:1-55 Reset window WARNING: When Reset is clicked, all settings made on the R3000 server will be removed and the box will be restored to its original state. Any patches applied to the server subsequent to receiving this box will need to be reapplied.
The Radius feature uses a Radius accounting server that determines which accounts will be filtered and how they will be filtered. The user profile in the Radius accounting server holds the filter definition for the user. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Order to transfer the most significant byte first. • Click the radio button corresponding to Host Byte Order to use the byte order stored in the server (big endian or little endian order). , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The NAS will forward accounting request packets to the Radius accounting server. 2. Check the box for Use R3000 IP as Source IP, if the IP address of the R3000 server (eth0 or eth1) should be used when forwarding packets instead of the IP address of the NAS.
ECTION HAPTER YSTEM SCREEN Apply Settings Click Apply to save your settings. Disable Radius To disable the Radius feature: 1. At the Radius Mode field, click the “Off” radio button. 2. Click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
R3000's filtering on a network. Fig. 2:1-57 SNMP window The following aspects of the R3000 are monitored by SNMP: data traffic sent/received by a NIC, CPU load average at a given time interval, amount of free disk space for each disk partition, time elapse since the box was last rebooted, and the amount of memory currently in usage.
1. To remove one or more IP addresses from the list, select each IP address from the Access control list, using the Ctrl key for multiple selections. 2. Click Delete. 3. Click Save Changes. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
NOTE: X Strikes Blocking settings are effective only for filtering profiles with the X Strikes Blocking filter option enabled. (See Filter Options in the Group screen section for information on setting up the X Strikes Blocking filter option.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Choose either “Unlimited”, or “Defined”. If “Defined” is selected, enter the number of minutes in the text box. The default setting is 5. 5. Click Save to save your configuration settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Internet privileges were temporarily suspended for a total of ‘X’ (amount of time),” in which ‘X’ represents the number of minutes/hours the user will be locked out from Internet usage on that workstation. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
0 seconds, the second at 4 seconds, the third at 8 seconds, the fourth at 12 seconds, and the fifth at 16 seconds. If the configuration settings for this example overblock too many users too frequently: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
• the maximum number of strikes may need to be reduced Email Alert Click the Email Alert tab to display Email Alert: Fig. 2:1-60 X Strikes Blocking window, Email Alert tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The Daily Schedule pop-up window that shows the alert time schedule in the (HH:MM:SS) format: Fig. 2:1-61 The Daily Schedule pop-up window Click Close to close the pop-up window. 3. Click Save to save the field entries. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Remove Email Alert Recipients 1. Select the email address(es) from the Current Email Alerts list box. 2. Click Delete to remove the email address(es) from list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
NOTE: When an authorized staff member is added to this list, that user’s User ID is automatically added to the Current Un- Accessible Users list box in the Logon Accounts tab of the Real Time Probe window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
“No Strike” Categories list box. 3. Click Apply to apply your settings. NOTE: Library categories in the “Strike” Categories list box will only be effective for filtering profiles with the X Strikes Blocking Filter Option enabled. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The Re-login window opens if the user’s session needs to be validated: Fig. 2:1-64 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the GUI. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
NOTE: An authorized staff member can click a link in an email alert, or type in http://x.x.x.x:88/XStrike.jsp in the address field of a browser window—in which “x.x.x.x” is the IP address of the R3000—to view locked workstation criteria. Unlock a Workstation To unlock a specified workstation: 1.
1. Enter the email address in the Email Address to be Subscribed/Unsubscribed text box. 2. Click Unsubscribe. Close the Pop-up Window Click the “X” in the upper right corner of the pop-up window to close the window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
For the NT and LDAP domain options, the global adminis- trator must first set up authentication in order to enable NT/ LDAP options. The administrator then sets up and main- tains groups, and creates filtering profiles for groups and users. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 185
Information on creating filtering profiles for IP sub-groups can be found in the Group Administrator Section of this manual. If using the synchronization feature, if the R3000 server being configured is set up in the Target mode, the only branch that displays in the tree is Global Group.
Upload/Download IP Profiles, Minimum Filtering Level, and Refresh All. Fig. 2:2-2 Group screen, Global Group menu NOTE: If the synchronization feature is used and this R3000 being configured is set up in the Target mode, the only sub-topic that displays is Range to Detect.
Detect is selected from the Global Group menu. This window is used for defining segments of network traffic to be detected by the R3000. Service ports that should be open— ignored by the R3000—are also defined in this window. Fig. 2:2-3 Range to Detect window NOTE: Segments of network traffic should not be defined if using the firewall mode.
1. Enter the IP address and netmask in the Include IP fields. These entries specify the range of IP addresses that will be detected by the R3000. 2. If an IP address in this specified range should be excluded, enter that IP address and netmask in the Exclude IP fields.
NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the R3000, thus enabling it to handle more traffic. If a destination IP address range will be used: 1.
1. In the Destination Port frame, verify that the number of the service port displays in the Ignore Port(s) display field. 2. Enter this service port number in the Port field. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Remove a Segment from the Network To remove an IP address range from being detected on the network: 1. Select the item from the Current Ranges list box. 2. Click Remove. 3. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
“Rule 2 BLOCK PORN”, and “Rule 3 Block IM and Porn”. By default, “Rule 1” displays in the Rule # field”, “BYPASS” displays in the Rule Description field, and Uncategorized Sites are allowed to Pass. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
4. Click the “Pass” or “Block” radio button to specify whether all Uncategorized Sites should pass or be blocked. 5. Click Add Rule to include your rule to the list that displays in the pull-down menu. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Select the rule from the Current Rules pull-down menu. 2. Make your modifications. 3. Click Modify Rule. Remove a Rule To delete a rule: 1. Select the rule from the Current Rules pull-down menu. 2. Click Delete Rule. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Category, Port, Default Redirect URL, and Filter Options. Entries in these tabs comprise the profile string for the global group. Fig. 2:2-5 Global Group Profile window, Category tab , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Ctrl key on your keyboard. Blocks of cate- gories can be selected by clicking the first category, and then pressing the Shift key on your keyboard while clicking the last category. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
4. Click Apply to apply your settings at the global level. Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports for the global filtering profile. Fig. 2:2-6 Global Group Profile window, Port tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. Click Apply to apply your settings at the global level. To remove a port number from the list box: 1. Select the port number. 2. Click Remove. 3. Click Apply to apply your settings at the global level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
1. Click the checkbox(es) corresponding to the option(s) to be applied to the global group filtering profile: “X Strikes Blocking”, “Google Safe Search”, “Search Engine Keyword Filter Control”, “URL Keyword Filter Control”. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 201
Search Engine Keywords window of 8e6 Supplied library categories and custom library categories. NOTES: Search engine keyword filtering relies on an exact keyword match. For example, if the word “sex” is set up to be , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Page 202
URLs that are not even within blocked catego- ries. For example, if all URL keywords containing “sex” are blocked, users will not be able to access a non-pornographic site such as “http://www.essex.com”. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
NOTE: For examples of entries to include in a profile file, go to http://www.8e6.com/r3000help/files/2group_ipprofiles.html. WARNING: Any existing profiles will be overwritten by the contents of the uploaded file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 204
Fig. 2:2-11 Upload IP Profiles pop-up confirmation window 5. Click the “X” in the upper right corner of the pop-up box to close it. 6. Click Reload Now to reload the new profiles. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
8e6 supplied library categories and service ports. These settings can be bypassed if a user in an IP subgroup has an override account. (See the Override Account window for more information.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Fig. 2:2-13 Minimum Filtering Level window, Min. Filtering Categories By default, “Child Porn” and “General Pornography” display in the Blocked Categories list box, and the Pass Categories list box contains all other active library categories. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Shift key on your keyboard while clicking the last category. 3. Click Apply to apply your settings for the minimum filtering level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Enter the port number in the Port field. 2. Click Add. Each port number you add displays in the Block Port(s) list box. 3. Click Apply to apply your settings at the minimum filtering level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
IP sub-group will be allowed to bypass the minimum filtering level with an override account or an exception URL. Fig. 2:2-15 Minimum Filtering Level window, Min. Filter Bypass tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
2. Click Save to apply your settings. (See the Exception URL window in the Group Administrator Section for more information.) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
If authentication is enabled, when Refresh All is clicked, the NT and LDAP branches of the tree display. When authenti- cation is disabled, when Refresh All is clicked only the IP branch of the tree displays. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Page 212
IP includes options for adding an IP group and to refresh the tree list. Click the IP link to view a menu of sub-topics: Add Group, and Refresh. Fig. 2:2-16 Group screen, IP menu , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Group Administrator Section of this manual. Refresh Refresh IP Groups From the IP group menu, click Refresh whenever changes have been made in this branch of the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Main topics in this section include the following: Updates, Library Lookup, CFM, NNTP Newsgroup, 8e6 Supplied Categories, and Custom Category. NOTE: If the synchronization feature is used, an R3000 set up in the Target mode will only display the Updates and Library Lookup topics.
Page 215
See Appendix C for information on messages that display in the Library Update Log window. The 8e6 Supplied Categories Instant Messaging (IM) library cate- gory only includes Library Details and URLs sub-topics. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Updates includes options for making configurations for library category activities. Click the Updates link to view a menu of sub-topics: Configuration, Manual Update, and Library Update Log. Fig. 2:3-2 Library screen, Updates menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Configuration window The Configuration window displays when Configuration is selected from the Updates menu. This window is used for making settings to allow the R3000 to receive 8e6 supplied library category updates on a daily basis. Fig. 2:3-3 Configuration window Set a Time for Updates to be Retrieved 1.
1. In the Transfer Type frame, by default “Passive” is selected, indicating that transfers will be made via unre- stricted outgoing network connections. Click “Active” if transfers will be initiated by the server. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
This window is used for updating specified 8e6 supplied library categories on demand from the update server, if the R3000 has not received daily updates due to an occurrence such as a power outage. Fig. 2:3-4 Manual Update window NOTE: The Configuration window should be used for scheduling the R3000 to automatically download libraries on a daily basis.
• Patch Update - Select this option to download new patches for the R3000, if available. Any patches that are downloaded can be found in the System section of the GUI, in the Patch window. Using that window, a patch can be selected and applied.
The Library Update Log window displays when Library Update Log is selected from the Updates menu. This window is used for viewing transfer activity from the update server to your R3000. Fig. 2:3-5 Library Update Log window , R3000 E...
Keep clicking this button to continue viewing log file data. NOTE: See Appendix C: Library Update Log Messages for infor- mation about messages that display in the log file. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
To see if a URL has been included in the library: 1. In the URL Lookup frame, enter the URL. For example, in the URL field enter http://www.beer.com, or use a wild- card by entering *.beer.com or *beer.com. A wildcard , R3000 E ECHNOLOGIES NTERPRISE ILTER...
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
This window is used for enabling the Customer Feedback Module feature, in which the most frequently visited non-categorized URLs in your R3000's filter log will be FTPed to 8e6 on a daily basis. The URLs collected by 8e6 will be reviewed and added to 8e6's stan- dard library categories, as appropriate, so they can be blocked.
Web request data or Internet usage information to 8e6 Technologies’ server for statistical analysis. 8e6 Technologies may gather information relating to types of sites requested by end users at your choice by enabling the CFM on 8e6 Technologies’ prod- ucts. , R3000 E ECHNOLOGIES...
Page 227
However, it is possible that some personal infor- mation may be contained in the URLs collected by the CFM and sent to 8e6 Technologies. At no time will any personal information collected be released publicly, nor will the Web request data be used for any purpose other...
Page 228
LOBAL DMINISTRATOR ECTION HAPTER IBRARY SCREEN Fig. 2:3-9 Note dialog box 6. If you do not have a firewall, or if you agree to open your firewall to cfm.8e6.com, click Accept to proceed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
To add a newsgroup to the library: 1. In the Newsgroup frame, enter the Newsgroup address. 2. Click Add. If the newsgroup already exists, an alert box will open to inform you that it exists. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
Administrator Section for information on setting up customized library categories. WARNING: The maximum number of library categories that can be saved is 250. This figure includes both 8e6 supplied catego- ries and custom categories. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
This window is a view only window. Fig. 2:3-12 Library Details window View Library Details This window displays the Description and Short Name of the 8e6 supplied library category. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 2:3-13 URLs window, Action tab NOTE: For the Instant Messaging library category, the IP field replaces the URL field on the Action tab. The IP address must be entered in order to block the instant messaging service. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
View tab, and make a selection from the pull-down menu for “Addition List”, or “Deletion List”. Click View List to display the specified items in the Select List list box: Fig. 2:3-14 URLs window, View tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
TIP: Multiple URLs can be selected by clicking each URL while pressing the Ctrl key on your keyboard. Blocks of URLs can be selected by clicking the first URL, and then pressing the Shift key on your keyboard while clicking the last URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
URL keyword filtering.) WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Upload URL Keyword File frame, specify whether the contents of this file will add to the current file, or overwrite the current file on the server, by clicking the “Append” or “Overwrite” radio button. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
4. Click Upload File to upload this file to the server. NOTE: A URL keyword text file must contain one URL keyword per line. WARNING: The text file uploaded to the server will overwrite the current file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
NOTE: Master lists cannot be uploaded to any 8e6 supplied library category. See the Custom Category sub-section of the Group Administrator Section of this manual for information on uploading a master list to the server. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
To add a search engine keyword to the library category: 1. Enter the Search Keyword in the Edit Search Keyword List frame. 2. Click Add to display the keyword in the Select List list box below. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. Click Upload File to upload this file to the server. NOTE: A search engine keywords text file must contain one keyword per line. WARNING: The text file uploaded to the server will overwrite the current file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
Internet activities of specified users in real time. NOTE: Information on configuring the Enterprise Reporter (ER) to work with the R3000 can be found in Appendix A of the Appen- dices Section. WARNING: A version of the Enterprise Reporter prior to 3 should not be configured to work with the R3000.
Specify the Reporting Device By default, no option is selected at the Export field. If R3000 logs will be exported to a reporting application: 1. Click the checkbox corresponding to the reporter to be used for transferring logs: “8e6 Enterprise Reporter”, or “Other Device”.
If “8e6 Enterprise Reporter” was selected, the 8e6 Enter- prise Reporter tab displays by default. On this tab, you need to specify criteria for the ER server that will receive logs from the R3000. Fig. 2:4-3 Report Configuration window, 8e6 ER option, ER tab Edit ER Server Information In the Log File Transfer Configuration frame, by default the IP address 1.2.3.6 displays in the Remote Server list box.
2. Click Remove. View Transfer Activity to the ER After the ER has been configured and logs have been trans- ferred from the R3000 to the ER, you can view transfer activity. Fig. 2:4-4 Report Configuration window, 8e6 ER option, Log tab 1.
If “Other Device” was selected, the Other Device tab displays by default. On this tab, you need to specify criteria for the reporter that will receive logs from the R3000. Fig. 2:4-5 Report Configuration window, Other Device option and tab...
Page 250
8 = updates occur every eight hours, at these intervals of time: 8, 16, 24. 12 = updates occur every 12 hours, at these intervals of time: 12, and 24. 24 = updates occur every 24 hours. 2. Click Save. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
HAPTER EPORTING SCREEN View Transfer Activity to the Reporting Device After logs have been transferred from the R3000 to the reporting device, the Log tab can be clicked to view transfer activity. On this tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
Probe is selected from the control panel. This feature lets the probe administrator monitor a user's Internet usage in real time to see if that user is using the Internet appropri- ately. Fig. 2:4-6 Real Time Probe window, Configuration tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Exclude an IP Address from Real Time Probing 1. Enter the Excluded IP Address of a machine to be bypassed from real time probing. 2. Click Add to add the IP address in the Current White list of IPs. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
EPORTING SCREEN Remove IPs from the White List 1. Select the IP address(es) from the Current White list of IPs list box. 2. Click Delete to remove the IP address(es) from the white list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Format to be used for the file: “Plain Text” or “HTML”. By default, “HTML” is selected. 2. Enter the Maximum File Size of an Email Report (MB) that can be sent. The default is 5 MB. 3. Click Save. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Remove Email Addresses 1. Select the email address(es) from the Current List of Completed Reports to be Emailed list box. 2. Click Delete to remove the email address(es) from list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
NOTE: When an authorized staff member is added to this list, that user’s User ID is automatically added to the Current Un- Accessible Users list box in the Logon Accounts tab of the X Strikes Blocking window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
(See Chapter 1: System screen, X Strikes Blocking for information on reseting strikes and unlocking workstations.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
The Re-login window opens if the user’s session needs to be validated: Fig. 2:4-9 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the GUI. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
“x.x.x.x” is the IP address of the R3000—to only see probes he/she created. Create a Real Time Probe Click the Create tab to enter and specify criteria for the report you wish to generate: Fig.
Page 261
This selection generates a report with data for all URLs containing the consecutive characters you specified. In this example, if mail is entered, “http:// www.hotmail.com” and “http://loginnet.passport.com/ login.srf?id=2&svc=mail&cbid=24325&msppjph=1&tw =0&fs=1&fsa=1&fsat=1296000&lc=1033&_lang=EN” would be included in the report. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 262
“Schedule at” and select the date and time from the pull-down menus. The maximum 6. Enter the Total Run Time in Minutes. 7. Click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 2:4-11 Real Time Probe Reports, View tab The Display Name shows the name assigned to the probe on the Create tab. The Status of the probe displays: Completed, In Progress, or Scheduled. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 264
This box displays the number of minutes left for the probe to run (Run Time Left), and user access details for each item in the grid: Date & Time (in the YYYY/MM/DD HH:MM:SS format); IP Address; User Name; Library Category; and URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 265
Display Name; Email Address to Mail the Completed Report; Search Option criteria; Start Date & Time; Run Time; and User ID of the creator of the probe (Created by). Click Close to close this box. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Page 266
Clicking Email opens the Email Address box: Fig. 2:4-15 Email Address box Enter the Email Address to Mail the Completed Report and click Send to send the completed report to the desig- nated email address. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
• creates override accounts for IP group users who are authorized to access Internet content blocked at the global level • creates and maintains customized library categories • uses the lookup tool to remove URLs or search engine keywords from customized libraries , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The only items that display are Global Group and IP. NOTE: If the synchronization feature is used, a server set up in the Target mode will not have branches of the tree accessible. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Page 269
If sub-groups were added, these display when the IP group is double-clicked. Click an entity in the tree list to view a menu of topics or actions that can be performed for that entity. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
ROUP SCREEN IP Group Refresh Refresh the IP Group, Sub Group Click Refresh whenever a change has been made to the group or sub-group level of the tree. Fig. 3:1-2 Group screen, IP menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Click the group’s link to view a menu of subtopics: Group Details, Members, Override Account, Add Sub Group, Delete Group, and Paste Sub Group. Fig. 3:1-3 Group screen, group menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
In the Group Administrator frame, the Group Name displays. To change the password for this group: 1. Enter the password in the Password and Confirm Pass- word fields. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
If using the invisible or router mode: 1. Enter the IP address and netmask in the Source IP fields. 2. Click Add to include the IP address/netmask in the Current Members list box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Calculate to display results in the Min Host and Max Host fields. Remove the IP Address of the Group To remove an entry from the Current Members list box: 1. Select the IP address from the list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
In order for a user with an override account to access cate- gories and ports set up to be blocked at the sub-group level, the global administrator must first activate the option to allow an over- ride account to bypass minimum filtering level settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
3. Click Add to include the Override Account in the Current Account list box. Remove an Override Account To remove an override account: 1. Select the account name from the Current Account list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The minimum filtering level is established by the global administrator. Delete Group Delete an IP Group Profile To delete a group profile, choose Delete Group from the group menu. This action removes the group from the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 3:1-8 Paste Sub Group dialog box 2. In the Input sub group name field, enter the name of the sub-group. 3. Click OK to add the sub-group to the group tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Click the sub-group’s link to view a menu of sub-topics: Sub Group Details, Members, Sub Group Profile, Exception URL, Time Profile, Delete Sub Group, and Copy Sub Group. Fig. 3:1-9 Group screen, Sub Group menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
The IP Range, and Member IP address and netmask display, if this information was previously added in this window and applied. The IP Range and Member IP address can be entered or edited in these fields, as neces- sary. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Members window The Members window displays when Members is selected from the menu. This window is used for modifying the subgroup’s Member IP address, for the invisible and router modes. Fig. 3:1-11 Members window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Profile is selected from the sub-group menu. This window is used for viewing/creating the sub-group’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options. Entries in these tabs comprise the profile string for the sub-group. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
By default, “Rule 0 Minimum Filtering Level” displays in the Available Filter Levels pull-down menu, and the Minimum Filtering Level box displays “Child Porn” and “General Pornography”. By default, Uncategorized Sites are allowed to Pass. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Shift key on your keyboard while clicking the last category. 2. Click the “Pass” or “Block” radio button to specify whether all Uncategorized Sites should pass or be blocked. 3. Click Apply to apply your settings at the IP sub-group level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
1. Click the checkbox(es) corresponding to the option(s) to be applied to the sub-group filtering profile: “X Strikes Blocking”, “Google Safe Search”, “Search Engine Keyword Filter Control”, “URL Keyword Filter Control”. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 287
Search Engine Keywords window of custom library categories. NOTES: Search engine keyword filtering relies on an exact keyword match. For example, if the word “sex” is set up to be , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 288
URLs that are not even within blocked catego- ries. For example, if all URL keywords containing “sex” are blocked, users will not be able to access a non-pornographic site such as “http://www.essex.com”. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
(See the Override Account window in this section for informa- tion on setting up an override account to allow a user to bypass sub-group settings and minimum filtering level settings, if allowed.) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
To block the sub-group’s access to the URL again: 1. Select the URL from the ByPass URLs list box. 2. Click Remove. Apply Settings Click Apply to apply your settings after adding or removing a URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
(1:00 a.m. to 12:59 a.m., or 1st hour to 24th hour) and minutes (zero to 59). 2. Click Add to include this time range in the Current Time Profiles list box. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
The time profile will be activated for the IP sub-group at the specified time. Category Profile The Rule tab is used for creating the categories portion of the time profile. Fig. 3:1-17 Time Profile window, Rule tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 293
Shift key on your keyboard while clicking the last category. 2. Click the “Pass” or “Block” radio button to specify whether all Uncategorized Sites should pass or be blocked. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page”, “Authentication Request Form”, or “Custom URL”. If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
(See the Override Account window in this section for informa- tion on setting up an override account to allow a user to bypass sub-group settings and minimum filtering level settings, if allowed.) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 296
2. Click Add to include the URL in the ByPass URLs list box. To block the sub-group’s access to the URL again: 1. Select the URL from the ByPass URLs list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
NOTE: See the X Strikes Blocking window in Chapter 1: System screen for information on setting up the X Strikes Blocking feature. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 298
URL keywords are entered in the URL Keywords window of custom library categories. NOTE: To set up URL keywords in a URL Keywords window for a Custom Category, see Chapter 2: Library screen, URL Keywords window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. Click Apply Add on the TimeSlot tab to save your edits. Delete a Time Profile To delete a time profile, on the TimeSlot tab: 1. Select the time range from the Current Time Profiles list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
2. Select the group from the tree and choose Paste Sub Group from the group menu to paste the sub-group to the group. (See Paste Sub Group dialog box in the Group section of this chapter.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Main topics in this section include the following: Library Lookup and Custom Category. NOTE: If the synchronization feature is used, a server set up in the Target mode will only have the Library Lookup window avail- able. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
To see if a URL has been included in the library: 1. In the URL Lookup frame, enter the URL. For example, in the URL field enter http://www.beer.com, or use a wild- card by entering *.beer.com or *beer.com. A wildcard , R3000 E ECHNOLOGIES NTERPRISE ILTER...
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
Maintaining the list of URLs and keywords is the responsibility of the global or group administrator. WARNING: The maximum number of categories that can be saved is 250. This figure includes both 8e6 supplied categories and custom categories. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
TIP: If this is the first custom category you are adding, you may need to double-click “Custom Category” to open the tree list. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
NOTE: The category must have URLs, URL keywords, and/ or search keywords added to its profile in order for it to be effective. Refresh Refresh the Library Click Refresh after uploading a file to a customized library category. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Fig. 3:2-5 Library screen, custom library category menu NOTE: Since custom categories are not created by 8e6, updates cannot be provided. Maintaining the list of URLs and keywords is the responsibility of the global or group administrator. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
View, Edit Library Details 1. The long Description name displays. This name can be edited. The Short Name for the library category displays and cannot be edited. 2. Click Apply to save your entry. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
(*) symbol can be used by entering text in a format such as *.playboy.com or *playboy.com. A URL is used in a filtering profile for blocking a user’s access to a specified site or service. Fig. 3:2-7 URLs window, Action tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
2. Make a selection from the pull-down menu for “Master List”, “Addition List”, or “Deletion List”. 3. Click View List to display the specified items in the Select List list box: Fig. 3:2-8 URLs window, View tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Enter the URL in the Edit URL List frame. 2. Click Remove to display the associated URLs in the list box below. 3. Select the URL(s) that you wish to remove from the cate- gory. 4. Click Apply Action. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
TIP: A URL text file must contain one URL per line. WARNING: The text file uploaded to the server will overwrite the current file. NOTE: Before the file is uploaded to the server, it will first be vali- dated , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 313
If the file contains valid URLs: a. Go to the IP Lookup Options section and click the radio button corresponding to the option to be used when uploading the file: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
URL keyword filtering.) WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied , R3000 E ECHNOLOGIES NTERPRISE ILTER...
Upload a List of URL Keywords to the Library Before uploading a text file with URL keyword additions or deletions, in the Upload URL Keyword File frame, specify whether the contents of this file will add to the current file, or , R3000 E ECHNOLOGIES NTERPRISE ILTER...
4. Click Upload File to upload this file to the server. NOTE: A URL keywords text file must contain one URL keyword per line. WARNING: The text file uploaded to the server will overwrite the current file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
(See the Filter Options tab in the Group screen section for information about enabling search engine keyword filtering.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
2. Click Add to display the keyword in the Select List list box below. Remove a Search Engine Keyword To remove a search engine keyword from a library category: 1. Enter the Search Keyword. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Click Upload To Deletion File to open the Upload Keyword pop-up window. 2. Click Browse to open the Choose file window. 3. Select the file to be uploaded. 4. Click Upload File to upload this file to the server. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
UPPORT ECHNICAL UPPORT RODUCT ARRANTIES Technical Support For technical support, visit 8e6 Technologies’s Technical Support Web page at http://www.8e6technologies.com/ support/index.htm, or contact us by phone, by e-mail, or in writing. Hours Regular office hours are from Monday through Friday, 8 a.m.
ARRANTIES Product Warranties Standard Warranty 8e6 Technologies warrants the medium on which the 8e6 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “Warranty Period”) from the date of delivery. 8e6 Technolo- gies’...
RODUCT ARRANTIES Technical Support and Service 8e6 Technologies will provide initial installation support and technical support for up to 90 days following installation. 8e6 Technologies provides after-hour emergency support to 8e6 server customers. An after hours technician can be reached by voice line.
If parts are discontinued from production during the Warranty Period, immediate replacement product(s) or hardware parts will be available for exchange with defective parts from 8e6 Technologies’ local reseller or distributor. Extended Technical Support and Service Extended technical support is available to customers under a Technical Support Agreement.
ECTION Appendix A Configurations for ER Reporting When configuring the R3000 to be used with an ER unit, the following procedures must be completed in order for the ER to receive logs from the R3000. Entries in the R3000 Administrator GUI 1.
Page 329
Remove. 4. After the ER has been configured, and logs have been transferred from the R3000 to the ER, click the Log tab to view transfer activity. 5. On the Log tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
IMPORTING: shadow.log.machine1. Once you see an entry, reporting information will be available one hour after the timestamp of the import listing. NOTE: Transfers occur each hour. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
• Port command codes: Filter all ports Filter the defined port number(s) Open all ports Open the defined port number(s) Block all ports Block the defined port number(s) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Block the defined category/categories • Category Codes: ALCO Alcohol AUTO Automobile BANNER Banner Books & Literature CHAT Chat COMICS Comics COMORG Community Organizations CULTS Cults DATE Personals DRUGS Drugs DUBIUS Unsavory/Dubious EDUCAT Education EDUCHT Education Cheating , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 333
Internet Service Provider KDPORN Child Porn LCOMM Local Community LEGAL Legal LIFE Lifestyle MALCOD Spyware/Phishing/Malicious Code MESBRD Message Boards MILAPP Military Appreciation MILOFL Military Official MOVTEL Movies & Television MUSAPP Music Appreciation OBSC Obscene/Tasteless , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 334
For the most up-to- date list of 8e6 supplied library categories, refer to the contents of the Help Topics file at http://www.8e6.com/r3000help/files/ 2group_textfile_cat.html#cat For an explanations and examples of category items, go to http://www.8e6.com/products/datab/ pd_86db_categories.htm , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
To disable all filter codes for an IP profile, enter 0x1 at the end of the profile string. See http://www.8e6.com/r3000help/files/ 2group_ipprofiles.html for examples of filtering profile entries. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Your R3000 receives 8e6 supplied library category updates via Traveler, 8e6’s executable program for updating the R3000 server. You can run Traveler on demand via the Manual Update to 8e6 Supplied Categories window, or schedule Traveler to launch at a specified time via the Configuration window.
• PrintstackTrace - Fail to back up file for <FileUrl> • PrintStackTrace - <java error message> • PrintstackTrace - Fail to back up file for <category>.sew • PrintstackTrace - Fail to copy file for merging , R3000 E ECHNOLOGIES NTERPRISE ILTER...
• Failed to download <patch> • Patch Update has successfully completed. IM and P2P Pattern File Update • Successfully downloaded <pattern> • Failed to download <pattern> • IM and P2P Update has successfully completed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Block page, not the Options page. Part I: Modify the R3000 1. Enable block page redirection Select either of the following options to modify the R3000. Option 1 lets you modify the back end, and Option 2 lets you modify the GUI.
2. Set the redirect URL to: http://<server for block_page>[:<port for block page>]/<blockpage> NOTE: As of R3000 Version 1.1.6 or earlier, the GUI does not accept the URL with a port setting (:<port for block page>), so to get around this the block page must be placed at the default HTTP port, which is 80.
Blocked URL: From the query string of the block page URL IP that accessed the blocked URL: (see URL) Category of the blocked URL: (see URL) USER User Name that accessed the blocked URL: (see URL) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. CGI written in C See the Reference portion of this appendix for coding details. NOTE: Don’t forget to replace <R3000 IP> with the real IP in the HTML/CGI before using these samples. Part III: Restart the R3000 You must restart the R3000 to make your changes effective.
PPENDICES ECTION PPENDIX Reference HTML <!-- Description: Sample HTML for R3000 customized block page --> <!-- Replace <R3000 IP> with real IP before using --> <!-- Revision: 1 --> <!-- Date: 03/08/2004 --> <html> <head> <script language=javascript> function parseData(str, start, end) result = "";...
Page 346
<input type=hidden name="URL" value=""> <input type=hidden name="IP" value=""> <input type=hidden name="CAT" value=""> <input type=hidden name="USER" value=""> <input type=hidden name="STEP" value="STEP2"> </form> <br>R3000 Customized Block Page (HTML using Java Script to parse and post form data)<br> <script language=javascript> getData(); showData(); </script>...
# File Type: # Description: Sample Perl script for R3000 customized block page # Replace the <R3000 IP> with the real IP before using. # This script provide data to the options CGI through query string # Revision: # Date: 03/08/2004 $method = $ENV{'REQUEST_METHOD'};...
# File Type: # Description: Sample Perl script for R3000 customized block page # Replace the <R3000 IP> with the real IP before using. # This script uses Java Script to post form data to # options CGI # Revision: # Date: 03/08/2004 $method = $ENV{'REQUEST_METHOD'};...
Page 349
"<input type=hidden name=\"URL\" value=\"$url\">\n"; print "<input type=hidden name=\"CAT\" value=\"$cat\">\n"; print "<input type=hidden name=\"USER\" value=\"$user\">\n"; print "<input type=hidden name=\"STEP\" value=\"STEP2\">\n"; print "<br>R3000 Customized Block Page (CGI written with Perl using Java Script to post form data)<br>\n"; print "URL: $url<br>\n"; print "IP: $ip<br>\n";...
PPENDIX CGI written in C * cusc_block.c * Description: sample C source code of CGI for customized block page * Replace <R3000 IP> with real IP and recompile before using * Revision: 1 * Date: 03/08/2004 #include <stdio.h> struct { char *name;...
Page 352
Customized Block Page (CGI written with C using Java Script to post form data)<br>\n"); printf("URL: %s<br>\n", szURL); printf("IP: %s<br>\n", szIP); printf("CAT: %s<br>\n", szCategory); printf("USER: %s<br>\n", szUserName);...
Page 354
* Change the string to upper case int to_upper(char *string) int len; int i; char *tmp=NULL; if (string && strlen(string)) if (!(tmp=(char*)strdup(string))) return 0; len=strlen(string); for (i=0; i<len; i++) string[i]=toupper(tmp[i]); free(tmp); return 1; , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
This appendix provides instructions on how to use an over- ride account if typical pop-up blocking software is installed, as in the following products: Yahoo! Toolbar, Google Toolbar, AdwareSafe, Mozilla Firefox, and Windows XP Service Pack 2 (SP2). , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. Go to the Yahoo! Toolbar and click the pop-up icon to open the pop-up menu: Fig. 4:5-2 Select menu option Always Allow Pop-Ups From 2. Choose Always Allow Pop-Ups From to open the Yahoo! Pop-Up Blocker dialog box: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 358
Pop-Ups list box to activate the Allow button. 4. Click Allow to move the selected source to the Always Allow Pop-Ups From These Sources list box. 5. Click Close to save your changes and to close the dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
# blocked icon: Fig. 4:5-4 # blocked icon enabled Clicking this icon toggles to the Site pop-ups allowed icon, adding the override account window to your white list: Fig. 4:5-5 Site pop-ups allowed icon enabled , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. Click the Override button to open the override account pop-up window. 4. Go back to the SearchSafe toolbar and click the icon for Popup protection off to toggle back to # popups blocked. This action turns on pop-up blocking again. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. With the “Block unrequested popup windows” checkbox checked, click Allowed Sites and enter the URL to allow the override account window to pass. 4. Click OK to save your changes and to close the dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Internet Options to open the Internet Options dialog box. 2. Click the Privacy tab: Fig. 4:5-7 Enable pop-up blocking 3. In the Pop-up Blocker frame, check “Block pop-ups”. 4. Click Apply and then click OK to close the dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
1. In the Options page (see Fig. 4:5-1), enter your User- name and Password. 2. Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button—this action opens the override account pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
3. In the Options page (see Fig. 4:5-1), enter your User- name and Password. 4. Click the Override button to open the override account pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
2. Click the Override button. This action displays the following message in the Information Bar: “Pop-up blocked. To see this pop-up or additional options click here...”: Fig. 4:5-10 Information Bar showing blocked pop-up status , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
Page 366
NOTE: To view your white list, go to the Pop-up Blocker Settings dialog box (see Fig. 4:5-9) and see the entries in the Allowed sites list box. 6. Go back to the Options page and click Override to open the override account window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
(block or open settings) to determine whether users should be denied or allowed access to that port. firewall mode - An R3000 set up in the firewall mode will filter all requests. If the request is appropriate, the original packet will pass unchanged.
Page 368
IM services specified in the library category. invisible mode - An R3000 set up in the invisible mode will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment.
Page 369
- A process that occurs when the R3000 attempts to resolve the IP address of the authentication server with the machine name of that server. This contin- uous and regulated automated procedure ensures the connection between the two servers is maintained.
Page 370
The user profile in the Radius accounting server holds the filter definition for the user. Real Time Probe - On the R3000, this tool is used for moni- toring the Internet activity of specified users in real time. The report generated by the probe lets the administrator know whether end users are using the Internet appropriately.
Page 371
PPENDICES ECTION PPENDIX router mode - An R3000 set up in the router mode will act as an Ethernet router, filtering IP packets as they pass from one card to another. While all original packets from client PCs are allowed to pass, if the R3000 determines that a request is inappropriate, a block page is returned to the client to replace the actual requested Web page or service.
Page 372
ECTION PPENDIX Traveler - 8e6’s executable program that downloads updates to your R3000 on demand or at a scheduled time. URL - An abbreviation for Uniform Resource Locator, the global address of Web pages and other resources on the Internet. A URL is comprised of two parts. The first part of the address specifies which protocol to use (such as "http").
Need help?
Do you have a question about the R3000 and is the answer not in the manual?
Questions and answers