Hide thumbs Also See for R3000:
Table of Contents

Advertisement

Quick Links

R3000
| Enterprise Filter
®
USER
GUIDE
Model: R3000
Release 2.1.00 • Manual Version 1.02

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the R3000 and is the answer not in the manual?

Questions and answers

Summary of Contents for 8e6 Technologies R3000

  • Page 1 R3000 | Enterprise Filter ® USER GUIDE Model: R3000 Release 2.1.00 • Manual Version 1.02...
  • Page 2 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 3 8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the exam- ples herein.
  • Page 4 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 5: Table Of Contents

    ONTENTS ..........1 NTRODUCTORY ECTION R3000 Enterprise Filter ............... 1 About this User Guide ..............1 How to Use this User Guide ............3 Conventions ..................3 Terminology ..................4 Overview ..................9 Environment Requirements ............. 10 Workstation Requirements .............. 10 Network Requirements ..............
  • Page 6 Block IM for a Specific Entity ........34 Block P2P for a Specific Entity ........35 Chapter 3: Synchronizing Multiple Units ........ 36 R3000 Synchronization ..............36 Synchronization Setup ..............38 Setting up a Source Server ............38 Setting up a Target Server ............38 Types of Synchronization Processes ..........
  • Page 7 Log Off ..................68 ........69 LOBAL DMINISTRATOR ECTION Introduction ................69 Chapter 1: System screen ............70 Control ..................... 72 Filter window ................73 Local Filtering..............74 Disable Local Filtering Options ........74 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 8 Administrator window ............. 100 View Administrator Accounts ..........101 Add an Administrator Account........... 101 Edit an Administrator Account .......... 102 Delete an Administrator Account........102 Secure Logon ................103 Logon Settings window ............104 viii , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 9 Admin Audit Trail window ............129 Admin Audit Trail............... 129 Specify FTP Criteria............ 130 FTP the Log on Demand ..........130 View ................. 131 View the Log of Administrator Changes ..... 131 Alert ....................132 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 10 Setup window ................. 152 Using Only One R3000 on the Network ......153 Using More than One R3000 on the Network ....153 Set up an R3000 to be a Source Server..... 153 Sync All Target Servers with the Same Settings ..157 Set up an R3000 to be a Target Server......
  • Page 11 Hardware Failure Detection window ........194 View the Status of the Hard Drives ........195 X Strikes Blocking ................. 196 X Strikes Blocking window ............196 Configuration..............197 Set up Blocking Criteria ..........197 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 12 Profile Control window ............228 Edit Entries................ 229 Quota Block Page Customization window ......230 Add, Edit Entries .............. 231 Preview Sample Quota Block Page ......... 232 Quota Notice Page Customization window ......233 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 13 Port ................... 274 Create, Edit a List of Service Ports......274 Default Redirect URL ............275 Create, Edit the Redirect URL ........275 Filter Options..............276 Create, Edit the Filter Options ........276 xiii , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 14 Download Log, View, Print Contents ........ 310 Download the Log............310 View the Contents of the Log........311 Save, Print the Log File Contents ....... 314 Emergency Update Log window ..........315 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION...
  • Page 15 Add or Remove URL Keywords ........339 Add a URL Keyword to the Library Category....339 Remove a URL Keyword from the Library ....339 Upload a List of URL Keywords to the Library ....340 , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 16 Set up Users Authorized to Create Probes....358 Deactivate an Authorized Logon Account....359 Delete a Logon Account ..........359 Go to Real Time Probe Reports GUI ....... 360 Re-login window ............360 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION...
  • Page 17 Delete an Override Account ..........387 Group Profile window ............. 388 Category Profile ..............388 Create, Edit a List of Selected Categories....389 Redirect URL..............391 Create, Edit the Redirect URL ........391 xvii , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 18 Delete an IP Sub-Group............ 421 Copy Sub Group ..............422 Copy an IP Sub-Group............422 Individual IP ................... 423 Member window ..............424 Enter the IP Address of the Member......... 424 xviii , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 19 Search Engine Keywords window .......... 449 View a List of Search Engine Keywords ......450 Add or Remove Search Engine Keywords......450 Add a Search Engine Keyword to the Library..... 450 Remove a Search Engine Keyword......451 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION...
  • Page 20 Command Executed More than Once....... 464 System Command Execution..........464 Temp Files ................ 464 Library Download Process ..........465 Customer Feedback Module Option ......466 Library Update Process............. 466 Printstack Trace ..............466 , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 21 Emergency Update ..............470 Appendix C ................471 Create a Custom Block Page ............471 Part I: Modify the R3000 ............471 1. Enable block page redirection........471 Option 1: Modify the back end ........471 Option 2: Modify the R3000 console......472 2.
  • Page 22 Enterprise Reporter ............ 501 Mobile Server Section ............502 Initial Setup ............... 502 Configure the R3000 to use the Mobile Mode ....503 Add MAC Addresses to the Master IP Group ....505 Select MAC Addresses for a Sub Group ......506 View Sub Group MAC Addresses ........
  • Page 23 Uninstallation from a Windows group ......528 Uninstallation from an individual computer ....528 Appendix F ................532 Configuring the R3000 for ER Reporting ........532 Entries in the R3000 Administrator console ......532 Entries in the ER Administrator console ......... 534 Appendix G ................
  • Page 24 ONTENTS Glossary ..................547 ................555 NDEX xxiv , R3000 E ECHNOLOGIES NTERPRISE ILTER UTHENTICATION UIDE...
  • Page 25: Introductory Section

    R2000 Enterprise Edition and R2000 Authentication Module prod- ucts. As with these applications, the R3000 tracks each user’s online activity, and can be configured to block specific Web sites or service ports, thereby protecting your organi-...
  • Page 26 • Group Administrator Section - This section includes information for administrators authorized by the global administrator to manage profiles of designated groups and their associated users on the R3000. Group admin- istrators also have rights to access certain library cate- gory functions.
  • Page 27: How To Use This User Guide

    Reporter (ER) application. Appendix G includes informa- tion about RAID maintenance and troubleshooting on an R3000 “H”, “SL”, or “HL” server. Appendix H features a glossary of technical terminology used in this user guide. • Index - This section includes an index of subjects and the first page numbers where they appear in this user guide.
  • Page 28: Terminology

    • field - an area in a dialog box, window, or screen that either accommodates your data , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 29 One or more tree lists also can display in this panel. When an item in the tree list is clicked, the tree list opens to reveal items that can be selected. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 30 • screen - a main object of an appli- cation that displays across your monitor. A screen can contain panels, windows, frames, fields, tables, text boxes, list boxes, icons, buttons, and radio buttons. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 31 By clicking the link for a topic, the window for that topic displays in the right panel of the screen, or a menu of sub-topics opens. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 32 Other types of windows include pop-up windows, login windows, or ones from the system such as the Save As or Choose file windows. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 33: Overview

    To help you become familiar with the R3000 and how it func- tions on the network, Chapter 1 of this section of the User Guide provides an overview on filtering. Chapter 2 gives insight into Web site access logging, and instant messaging and peer-to-peer setup procedures.
  • Page 34: Environment Requirements

    • Macintosh OS X Version 10.5 running Safari 2.0, Firefox • JavaScript enabled • Java Virtual Machine • Java Plug-in (use the version specified for the R3000 software version) NOTE: R3000 administrators must be set up with software instal- lation privileges in order to install Java used for accessing the interface.
  • Page 35: Chapter 1: Filtering Operations

    HAPTER ILTERING PERATIONS Chapter 1: Filtering Operations Operational Modes Based on the setup of your network, the R3000 can be configured to use one of these operational modes for filtering the network: • invisible mode • router mode • firewall mode...
  • Page 36: Invisible Mode

    ILTERING PERATIONS Invisible Mode If the R3000 is set up in the invisible mode, the unit will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment. The unit will only intercept a session if an inappropriate request was submitted by a client.
  • Page 37 (4) is sent to the Internet server. An R3000 set up in the invisible mode can also work in the router mode. Figure 1:1-2 illustrates an example of a monitor mode setup, with the R3000 connected to the managed switching hub.
  • Page 38: Router Mode

    ILTERING PERATIONS Router Mode If the R3000 is set up in the router mode, the unit will act as an Ethernet router, filtering IP packets as they pass from one card to another. While all original packets from client PCs are allowed to pass, if the R3000 determines that a request is inappropriate, a block page is returned to the client to replace the actual requested Web page or service.
  • Page 39: Firewall Mode

    Firewall Mode The firewall mode is a modification of the router mode. With the R3000 set up in this mode, the unit will filter all requests. If the request is appropriate, the original packet will pass unchanged. If the request is inappropriate, the original packet will be blocked from being routed through.
  • Page 40 Figure 1:1-5 illustrates an example of a firewall mode setup in which requests are always sent to the caching server. In this scenario the R3000 will be affected if the caching proxy server contains unfiltered, “bad” cached pages. 8e6 recom- mends that cached content is cleared or expired after installing the R3000.
  • Page 41: Group Types

    NOTES: If authentication is enabled, the global administrator can also access the NT and LDAP branches of the tree. If multiple R3000 units are set up on the network and the synchro- nization feature is used, an R3000 that is set up to receive profile changes will only display the Global Group type in the tree list.
  • Page 42: Ip Groups

    IP members, override account, time profiles and exception URLs, and maintains filtering profiles of all members in the master IP group. Fig. 1:1-6 IP diagram with a sample master IP group and its members , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 43: Filtering Profile Types

    • time profile - used by a sub-group/individual IP group member at a specified time. Other filtering profiles • authentication profile - used by NT and/or LDAP group members. NOTE: For information about authentication filtering profiles, see the R3000 Authentication User Guide. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 44 R3000 and the Radius authentication feature enabled. • TAR profile - used if a Threat Analysis Reporter (TAR) server is connected to the R3000 and an end user is locked out by TAR when attempting to access blocked content in a library category.
  • Page 45: Static Filtering Profiles

    IP sub-group and is customized for sub-group members. Individual IP Member Filtering Profile An individual IP member filtering profile is created by the group administrator.This filtering profile applies to a speci- fied end user in a master IP group. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 46: Active Filtering Profiles

    Active filtering profiles include the global group profile, over- ride account profile, time profile, and lock profile. NOTE: For information about authentication filtering profiles, see the R3000 Authentication User Guide. Global Filtering Profile The global filtering profile is created by the global adminis- trator.
  • Page 47: Filtering Profile Components

    (default) filtering profile • filter settings - used by service ports, filtering profiles, rules, and the minimum filtering level to indicate whether users should be granted or denied access to specified Internet content , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 48: Library Categories

    However, unlike 8e6 supplied categories, a custom cate- gory can be deleted. NOTE: 8e6 cannot provide updates to custom categories. Main- taining the list of URLs and keywords is the responsibility of the global or group administrator. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 49: Service Ports

    Service ports are used when setting up filter segments on the network (the range of IP addresses/netmasks to be detected by the R3000), the global (default) filtering profile, and the minimum filtering level. When setting up the range of IP addresses/netmasks to be detected, service ports can be set up to be open (ignored).
  • Page 50: Filter Settings

    • filter - if a service port is given a filter setting, that port will use filter settings created for library categories (block or open settings) to determine whether users should be denied or allowed access to that port , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 51: Filtering Rules

    IP sub-group’s time profile. b. An individual IP member time profile takes precedence over the individual IP member profile. 6. An authentication (NT/LDAP) profile takes precedence over an individual IP member’s time profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 52 This profile is set up under Filter Options, by enabling the X Strikes Blocking feature. NOTE: A Threat Analysis Reporter (TAR) profile is another type of lock profile that is weighted the same as a lock profile in the precedence hierarchy. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 53 1: F NTRODUCTORY ECTION HAPTER ILTERING PERATIONS Fig. 1:1-7 Sample filtering hierarchy diagram , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 54: Chapter 2: Logging And Blocking

    Chapter 2: Logging and Blocking Web Access Logging One of the primary functions of the R3000 is to log the activity of users on the Internet. Information captured in the log can be transferred to a reporting appliance, to be viewed on a PC monitor or output to a printer.
  • Page 55: Instant Messaging, Peer-To-Peer Blocking

    When the IM module is loaded on the server, the R3000 compares packets on the network with IM libraries stored on the R3000 server. If a match is found, the R3000 checks the user’s profile to see whether the user’s connection to the IM service should be blocked, and then performs the appro- priate action.
  • Page 56: P2P Blocking

    When the P2P module is loaded on the server, the R3000 compares packets on the network with the P2P library stored on the R3000 server. If a match is found, the R3000 checks the user’s profile to see whether the user’s connec- tion to the P2P service should be blocked, and then performs the appropriate action.
  • Page 57: Using Im And P2P

    (such as IMGEN, IMGCHAT, IMGTALK, ICQAIM, IMMSN, IMMYSP, and/or IMYAHOO) set up to be blocked • the minimum filtering level profile must have both CHAT and specified individual Instant Messaging library cate- gories set up to be blocked. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 58: Block P2P For All Users

    IM traffic with the Range to Detect feature is desired • the minimum filtering level profile should not have IM blocked, unless blocking all IM traffic with the Range to Detect feature is desired. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 59: Block P2P For A Specific Entity

    P2P traffic with the Range to Detect feature is desired • the minimum filtering level profile should not have P2P blocked, unless blocking all P2P traffic with the Range to Detect feature is desired. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 60: Chapter 3: Synchronizing Multiple Units

    Alone” mode, “Source” mode, or “Target” mode—based on the setup within your organization. In a multi-R3000 server environment, all R3000 units should be set up with the same user profile data, so that no matter which R3000 server a user’s PC accesses on the network, that user’s Internet usage is appropriately filtered and blocked.
  • Page 61: Source Mode

    R3000 appliances on the network. Whenever a filtering configuration change is made on the source R3000 unit, that change is sent to all target R3000 units that have been identified by the source unit via the Synchronization Setup window of the R3000 console.
  • Page 62: Synchronization Setup

    This entry identifies the location of each target unit on the network. WARNING: If an R3000 server is set up in the Source mode with a Network Address Translation (NAT) device between the source and target server(s), be sure that ports 26262, 26268, and 88 are open on the source server.
  • Page 63: Types Of Synchronization Processes

    YNCHRONIZING ULTIPLE NITS WARNING: If an R3000 server is set up in the Target mode with a NAT device between the target and source server, be sure that ports 26262 and 26268 are open on the target server. This setup is required so that the target server can communicate with the source server.
  • Page 64: Library Synchronization Process

    Once locally applied on the source server, this update will be placed in a queue for submission to target R3000 servers. The source server will then send the information in the queue to all target servers.
  • Page 65: Delays In Synchronization

    The delay in activating a library change can take a little longer than in activating a filtering profile change. This is due to the fact that the library on the R3000 is loaded into the physical memory. When a change is made to the library, a new library must be loaded into memory with the changes.
  • Page 66: Synchronized, Non-Synchronized Items

    R3000s will read from the source R3000 upon load. These items will then be updated on an as needed basis from the source R3000. For purpose of differentiation, these items will be referred to as functionally synchronized for purposes of this user guide.
  • Page 67: Synchronize All Items

    • Override Account: addition/deletion, activation/deactiva- tion • Lock Profiles • IP User/Group and sub-group: additions/deletions, changes, filter changes • NT/LDAP User/Group: additions/deletions, changes, filter changes, profile activation/deactivation • Category Weight System additions/deletions • Quota Setting , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 68: Non-Synchronized Items

    • Synchronization settings • Filter Mode • NIC Configuration • Backup/Restore • Radius Authentication Settings • SNMP configuration • X Strikes Blocking settings • Warn Option Setting • Reporter configuration • CMC Management , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 69: Synchronize Only Library Items

    Control settings, Quota Block Page Customization, Quota Notice Page Customization • Minimum Filtering Level • Rules • Global Group Profile • Override Account: addition/deletion, activation/deactiva- tion • Lock Profiles • IP User/Group and sub-group: additions/deletions, changes, filter changes , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 70 • Synchronization settings • Filter Mode • NIC Configuration • Backup/Restore • Radius Authentication Settings • SNMP configuration • X Strikes Blocking settings • Warn Option Setting • Reporter configuration • CMC Management , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 71: Server Maintenance Procedures

    NITS Server Maintenance Procedures Source Server Failure Scenarios In the event that the source R3000 unit should fail, the target servers will continue to run using the last known configura- tion loaded from the source server. However, all dynamic authentication-based profiles will eventually time-out, since the source R3000 server can no longer verify user creden- tials.
  • Page 72: Use A Backup File To Set Up A Source Server

    5. Go to the Reboot window (accessible via System > Control) and reboot the server. 6. Once the R3000 is rebooted, reconnect to the console and access the Backup/Restore window. 7. Upload the last good configuration from the failed source server to the new source server.
  • Page 73: Set Up A Replacement Target Server

    Configure this R3000 so that the IP addresses are that of the target server which became the source server.
  • Page 74: Chapter 4: Getting Started

    IP address on your network. NOTE: If you do not have the R3000 Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you. Using the Administrator Console Log On 1.
  • Page 75 HAPTER ETTING TARTED Fig. 1:4-1 R3000 Introductory Window NOTE: The R3000 Introductory Window must be left open throughout your session. This window displays minimized when the Login dialog box opens. 4. When the Login dialog box opens, enter your Username and Password: Fig.
  • Page 76 ETTING TARTED NOTE: See Chapter 1: System screen in the Global Administrator Section for information on logging into the R3000 interface if your password has expired. 5. Click OK to close the login dialog box and to access the welcome screen of the Administrator console: Fig.
  • Page 77: Last Library Update Message

    ETTING TARTED Last Library Update message If it has been more than seven days since the R3000 last received updates to library categories, upon logging into the Administrator console a pop-up dialog box opens and displays the following message: ”Libraries were last updated more than 7 days ago.
  • Page 78 Last Library Update message pop-up box. After the libraries are updated, the welcome screen will appear as in Fig. 1:4:3 with today’s date as the Last Library Update in black text. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 79: Navigation Tips

    • Reporting - clicking this button displays the main screen for the Reporting section. The Reporting section contains windows used for configuring reports on users’ Internet activities. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 80 HAPTER ETTING TARTED • Help - clicking this button displays the Help screen. This screen includes navigational tips and a link to the PDF copy of this User Guide: Fig. 1:4-5 Help screen , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 81: Help Features

    1. Click a link to go to a specified topic. 2. To view Help Topics for another section, click the tab for that section: System, Group, Library, Reporting, or Help. 3. Click Close Window to close the Help Topics window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 82: Tooltips

    • Hover Display The yellow tooltip box displays when you hover over the icon with your mouse: Fig. 1:4-7 Tooltip mouseover effect To close the tooltip box, move the mouse away from the icon. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 83: Screen And Window Navigation

    Screens can contain topic links and sub-topic menus, and/or tree lists with topics and sub-topic menus. Windows can contain tabs that function as sub- windows. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 84: Topic Links

    In System, Library, and Reporting screens, the navigation panel contains topic links. By clicking a topic link, the window for that topic displays in the right panel: Fig. 1:4-9 Selected topic and its corresponding window , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 85: Select Sub-Topics

    For these topics, clicking a topic link opens a menu of sub-topics: Fig. 1:4-10 Sub-topics menu When a sub-topic from this menu is selected, the window for that sub-topic displays in the right panel of the screen. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 86: Navigate A Tree List

    (+) sign, when that branch of the tree is collapsed. By double-clicking the entity, a minus (-) sign replaces the plus sign, and all branches within that branch of the tree display. An item in the tree is selected by clicking it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 87: Tree List Topics And Sub-Topics

    When a tree list topic is selected and clicked, a menu of sub- topics opens: Fig. 1:4-12 Tree list topics and sub-topics Clicking a sub-topic displays the corresponding window in the right panel, or opens a pop-up window or alert box, as appropriate. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 88: Navigate A Window With Tabs

    Apply button. NOTE: In the Time Profile and Override Account pop-up windows, entries are saved at the bottom of the window. Fig. 1:4-13 Window with tabs , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 89: Console Tips And Shortcuts

    The navigation path displays at the top of each window: Fig. 1:4-14 Navigation path This path reminds you of your location in the console. The entire path shows the screen name, followed by the topic name, and sub-topic name if applicable. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 90: Refresh The Console

    Ctrl and C keys on the keyboard. • Paste command Text that was just copied from a field can be pasted into another field that is either blank or populated with text. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 91: Calculate Ip Ranges Without Overlaps

    IP Calculator pop-up window displays the IP address, default Netmask in both the Dotted Decimals Notation (e.g. “255.255.255.248”) and CIDR Notation (e.g. “29”) format, Min Host, and Max Host IP addresses. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 92: Log Off

    Fig. 1:4-16 Quit dialog box 2. Click Yes to close the Administrator console. 3. Click the “X” in the upper right corner of the R3000 Intro- ductory Window to close it. WARNING: If you need to turn off the server, see the ShutDown window of the System screen in the Global Administrator Section.
  • Page 93: Global Administrator Section

    Administrator console. This section is used by the autho- rized global administrator of the R3000 for configuring and maintaining the R3000 server. The global administrator is responsible for integrating the...
  • Page 94: Chapter 1: System Screen

    Control settings, Network settings, Administrator account information, Secure Logon, Diagnostics, Alert contacts, Patch, Synchronization, operation Mode, Authen- tication settings (see the R3000 Authentication User Guide for information about this topic), NIC Mode, Backup/Restore operations, Reset settings, Radius Authentication Settings, SNMP, Hardware Failure Detection, X Strikes Blocking, Warn Option Setting, Customization, and Quota Setting.
  • Page 95 Source mode, the CMC Management topic and associated sub-topics are also available. If the synchronization feature is used and an R3000 is set up in the Target mode to synchronize both profile and library setting changes, settings in the Filter window and Customization...
  • Page 96: Control

    DMINISTRATOR ECTION HAPTER YSTEM SCREEN Control Control includes options for controlling basic R3000 server functions. Click the Control link to view a menu of sub- topics: Filter, Block Page Authentication, ShutDown, and Reboot. Fig. 2:1-2 System screen, Control menu , R3000 E...
  • Page 97: Filter Window

    Pattern Blocking will log IM and P2P end user activity, and block end users from using clients such as Google Web Accelerator and proxy patterns that bypass filtering (see http://www.8e6.com/r3000help/files/ 1system_proxy_block .html for a list of proxy pattern , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 98: Local Filtering

    The default setting has Local Filtering “On” and VLAN Detection “Off”. Disable Local Filtering Options If you have multiple R3000 servers on the network, you may wish to disable local filtering on the source server and use the server primarily for authenticating users who log on the network.
  • Page 99: Enable Local Filtering Options

    Disable HTTP Packet Splitting Detection To disable automatic detection of a split HTTP packet, click “Off.” This action removes the field below the radio buttons. NOTE: After making all entries in this window, click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 100: Https Filtering

    Specify your preference for filtering HTTPS sites in the HTTPS Filtering frame. Select from the following settings for the HTTPS Filtering Level: • “None” - if you do not want the R3000 to filter HTTPS sites • “Low” - if you want the R3000 to filter HTTPS sites...
  • Page 101: Service Control

    Or, to block all users from accessing P2P services, the global filtering profile and minimum filtering level must have the “PR2PR” library category set up to be blocked. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 102: Disable Pattern Blocking

    Click “Off” to disable Pattern Blocking. NOTE: After making all entries in this window, click Apply. Target(s) Filtering The Target(s) Filtering frame only displays if the R3000 currently being configured is set up in the Source mode for synchronization. The default setting has All Target(s) Filtering “On”.
  • Page 103: Block Page Authentication Window

    The Block Page Authentication window displays when Block Page Authentication is selected from the Control menu. This feature is used for entering criteria the R3000 server will use when validating a user’s account. Information entered/ selected in this window is used by the block page that displays when an end user attempts to access a site or service that is set up to be blocked.
  • Page 104: Enter, Edit Block Page Options

    IP group level. NOTE: Details about the Web-based Authentication option can be found in the R3000 Authentication User Guide. TIP: Multiple options can be selected by clicking each option while pressing the Ctrl key on your keyboard.
  • Page 105 Logon Script Path field, \\PDCSHARE\scripts displays by default. In this field, enter the path of the logon script that the R3000 will use when re-authenticating users on the network, in the event that a user's machine loses its connection with the server, or if the server is rebooted.
  • Page 106: Block Page

    • Category field - The name of the library category that blocked the user’s access to the URL displays. If the content the user attempted to access is blocked by an Exception URL, “Exception” displays instead of the library category name. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 107 Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. By default, these links are included in the block page under the following conditions: •...
  • Page 108: Options Page

    • HELP link • User/Machine frame contents The frame beneath the User/Machine frame includes infor- mation for options (1, 2, and/or 3) based on settings made in this window and the Common Customization window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 109: Option 2

    LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NOTE: Information about Option 1 is included in the R3000 Authentication User Guide. Option 2 The following phrase/link displays, based on options selected at the Re-authentication Options field: • Re-start your system and re-login - This phrase...
  • Page 110: Option 3

    Profile Control pop-up window. See Appendix D: Override Pop-up Blockers for information on how a user with an override account can authenticate if a pop-up blocker is installed on his/her workstation. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 111: Shutdown Window

    Control menu. This window is used for powering off the server. Fig. 2:1-9 ShutDown window Shut Down the Server In the ShutDown frame, click ShutDown to power off the server. To restart the server, the R3000 console needs to be re-accessed. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 112: Reboot Window

    ECTION HAPTER YSTEM SCREEN Reboot window The Reboot window displays when Reboot is selected from the Control menu. This window is used for reconnecting the server on the network. Fig. 2:1-10 Reboot window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 113: Reboot The Server

    Server Status message box, informing you that the server is now disconnected: Fig. 2:1-12 Server Status: disconnect message When the Server Status box closes, the R3000 Enter- prise Filter status message box opens and informs you that the server is rebooting itself, and how much time has elapsed since this process began: Fig.
  • Page 114 Fig. 2:1-15 Server connected alert box 3. Click OK to close the R3000 ready alert box. 4. Click OK to close the Server connected alert box. 5. You must now re-access the R3000 console.
  • Page 115: Network

    ECTION HAPTER YSTEM SCREEN Network Network includes options for configuring the R3000 server on the network. Click the Network link to view a menu of sub-topics: LAN Settings, NTP Servers, Regional Setting, and Block Page Route Table. Fig. 2:1-16 System screen, Network menu...
  • Page 116: Lan Settings Window

    YSTEM SCREEN LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu. This window is used for configuring network connection settings for the R3000. Fig. 2:1-17 LAN Settings window , R3000 E ECHNOLOGIES...
  • Page 117: Specify Lan Settings

    HAPTER YSTEM SCREEN Specify LAN Settings 1. In the Host Name field, the default host name is R3000. Enter up to 50 alphanumeric characters for the name of the host for this server, such as R3000.LOGO.com. 2. Specify the following information, as necessary: •...
  • Page 118: Ntp Servers Window

    IP addresses of servers running Network Time Protocol (NTP) software. NTP is a time synchronization system for computer clocks throughout the Internet. The R3000 will use the actual time from a clock at a specified IP address. NOTE: The System Time displays beneath the Details frame, using the YYYY/MM/DD HH:MM:SS Coordinated Universal Time (UTC) format for the current time zone.
  • Page 119: Specify Network Time Protocol Servers

    128.59.35.142, 142.3.100.15, and 129.132.98.11. NOTE: Any IP address following the first entry in the Servers list box is only used in the event that the R3000 cannot access the primary time NTP server specified. IP addresses are used in the order in which they display in the list box.
  • Page 120: Regional Setting Window

    The Regional Setting window displays when Regional Setting is selected from the Network menu. This window is used for specifying the time zone to be used by the R3000 and the language set type, if necessary. Fig. 2:1-19 Regional Setting window...
  • Page 121: Specify The Time Zone, Language Set

    R3000. WARNING: If using the R3000 with an 8e6 Technologies Enter- prise Reporter unit, be sure each R3000 used by the ER is set up in the same time zone as the ER. These “like” settings ensure consistency when tracking the logging times of all users on the network.
  • Page 122: Block Page Route Table Window

    Fig. 2:1-20 Block Page Route Table window NOTE: See the Block Page Authentication window for information on setting up block pages. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 123: Add A Router

    NOTE: Follow steps 1-4 for each router you wish to include in the routing table. Remove a Router To remove one or more routers from the IP/Mask list box: 1. Select the router(s) from the list box. 2. Click Delete. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 124: Administrator

    Group Administrator Section for information on setting up and maintaining accounts for IP group administrators. See the R3000 Authentication User Guide for more information on setting up and maintaining NT and LDAP Sub Admin group administrator accounts.
  • Page 125: View Administrator Accounts

    TIP: The default Username is admin and the Password is user3. 8e6 recommends that you retain this default account and pass- word in the event that the R3000 unit cannot be accessed. An authorized 8e6 Technologies technical representative may need to use this username and password when troubleshooting the unit.
  • Page 126: Edit An Administrator Account

    NOTE: A username cannot be modified, but can be deleted and added again. Delete an Administrator Account To delete an administrator account: 1. Select the username from the Current User list box. 2. Click Delete to remove the account. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 127: Secure Logon

    Secure Logon includes options for setting user passwords to expire after a designated number of days, and/or locking out users from the R3000 after unsuccessfully attempting to log in for the specified number of attempts within the defined timespan. Click the Secure Logon link to view a menu of sub-topics: Logon Settings, and Logon Management.
  • Page 128: Logon Settings Window

    NOTE: This window displays only on servers set up in the Stan- dalone or Source mode. Fig. 2:1-23 Logon Settings window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 129: Enable, Disable Password Expiration

    OK, a different login dialog box opens: Fig. 2:1-24 New password entry This dialog box displays his/her Username and prompts him/her to enter a new password in the Password and Confirm Password fields. Upon clicking OK, the R3000 interface opens. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 130: Enable, Disable Account Lockout

    Lockout by IP address option(s) enabled— enter the number of times a user can enter an incorrect password during the interval defined in the Failed Password Attempts Timespan (in minutes) [1-1440] field before being locked out of the R3000. , R3000 E ECHNOLOGIES NTERPRISE...
  • Page 131 Allowable Number of Failed Password Attempts [1-10] field—before being locked out of the R3000. NOTE: If the number of failed attempts is 3 and the number of minutes in the timespan is 10, if any user (one or more) enters an...
  • Page 132: Logon Management

    R3000 interface—and for unlocking usernames and IPs currently locked out of the R3000. If the user account is a global (Admin) or NT/LDAP group administrator (Sub Admin) account, the areas of interface accessible to that adminis- trator can be viewed.
  • Page 133: View User Account Status, Unlock Username

    YSTEM SCREEN View User Account Status, Unlock Username View Account Status The All Accounts Status frame displays password statuses of current login accounts set up in this R3000 being config- ured, including: • Account Name - username • Type of account: •...
  • Page 134: Unlock A Username

    TIP: Click No to close the dialog box. 3. Click Yes to display the alert box indicating the IP address was unlocked. 4. Click OK to close the alert box, and to remove the IP address from the list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 135: View Admin, Sub Admin Interface Access

    Click any of the available tabs (System, Group, Library, Report, Help) to view menu topics, sub-topics, and branches of trees available to that administrator. 4. Click the “X” in the upper right corner of the window to close it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 136: Diagnostics

    Click the Diagnostics link to view a menu of sub-topics: System Command, View Log File, Troubleshooting Mode, Active Profile Lookup, and Admin Audit Trail. Fig. 2:1-27 System screen, Diagnostics menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 137: System Command Window

    Command is selected from the Diagnostics menu. This window is used for viewing server statistics and for performing diagnostic tests on the server. Fig. 2:1-28 System Command window WARNING: Diagnostics tools utilize system resources, impacting the R3000’s performance. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 138: Perform A Diagnostic Test, View Data

    If “Ping” or “Trace Route” was selected from the pull- down menu, a blank field displays to the right and must be populated. 2. Click Execute to open a pop-up window containing the query results: Fig. 2:1-29 System Command, Results window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 139: Command Selections

    Ping The Ping diagnostic tool is used for verifying whether the R3000 can communicate with a machine at a given IP address within the network, and the speed of the network connection. Enter the IP address or host name of the specific Internet address to be contacted (pinged), and then click Execute to display results in the pop-up window.
  • Page 140: Top Cpu Processes

    When Routing Table is selected and Execute is clicked, information about available routes and their statuses displays in the pop-up window. Each route consists of a destination host or network and a gateway to use in forwarding packets. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 141: Current Memory Usage

    The Recent Logins diagnostic tool is used for showing infor- mation on administrator login activity. When Execute is clicked, the pop-up window displays a row of data for each time an administrator logged on the R3000 server. , R3000 E ECHNOLOGIES...
  • Page 142: System Uptime

    Execute is clicked, the pop-up window displays a row of data showing the current time, the amount of time the R3000 has been up, the number of users, and the load aver- ages for the past 1, 5 and 15 minute intervals.
  • Page 143: View Log File Window

    The View Log File window displays when View Log File is selected from the Diagnostics menu. This window is used for viewing the most recent log file results of various activi- ties and for troubleshooting. Fig. 2:1-30 View Log File window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 144: View Log Results

    NIC card. • “Admin GUI Server Log (AdminGUIServer.log)” - used for viewing information on entries made by the admin- istrator in the R3000 console. NOTE: For information about the “Wbwatch Log (wbwatch.log)”, “Authentication Log (AuthenticationServer.log)”, “eDirectory Agent Debug Log (edirAgent.log)”, “eDirectory Agent Event Log (edirEvent.log)”...
  • Page 145 1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Fig. 2:1-31 View Log File, Results window 4. Click the “X” in the upper right corner of the pop-up window to close it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 146: Troubleshooting Mode Window

    Fig. 2:1-32 Troubleshooting Mode window WARNING: This tool utilizes system resources, impacting the R3000’s performance. When you click Enable, the R3000 will stop filtering the network. After you finish making the necessary changes to the server, be sure to click Disable to terminate your Troubleshooting Mode session.
  • Page 147: Use The Troubleshooting Mode

    (TCP); Address Resolution Protocol (ARP); packets destined to a specified port (80, 443, 81); packets destined to the R3000; packets sent to or from port 20 or 21; or packets sent to the Virtual IP address’s port 137 or 139.
  • Page 148: Active Profile Lookup Window

    Fig. 2:1-33 Active Profile Lookup window NOTE: In order to use this diagnostic tool, IP groups and/or members must be set up in the Group section of the R3000, and each IP group and/or member must have a filtering profile. MAC addresses are used in the mobile mode only.
  • Page 149: Verify Whether A Profile Is Active

    • Profile name - name of the profile • Time profile name - name of the time profile, if this is a time profile • Rule name - rule number, if this profile uses a non- custom rule , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 150 These filter settings indicate the following: • Pass - URLs in this category will pass to the end user. • Allow - URLs in this category will be added to the end user’s white list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 151 URL. If the Overall Quota field is enabled, the user is restricted to the number of minutes shown here for visiting URLs in all groups/categories collectively in which a quota is specified. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 152 “Search Engine Keyword Filter Control”, and/or “URL Keyword Filter Control” with/without the “Extend URL Keyword Filter Control” option selected. 4. Click the “X” in the upper right corner of the pop-up box to close it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 153: Admin Audit Trail Window

    FTP server. The log of changes made on the server can be viewed in this window. Admin Audit Trail The Admin Audit Trail tab displays by default: Fig. 2:1-35 Admin Audit Trail window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 154: Specify Ftp Criteria

    6. Specify whether or not to Send Daily Log to FTP Server by clicking either the “on” or “off” radio button. 7. Click Apply to apply your settings. FTP the Log on Demand Click FTP Now to transfer the log on demand. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 155: View

    (Time), IP address of the machine used by the administrator, administrator's User- name, and a brief description of the Action performed on the server. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 156: Alert

    Alert includes options for setting up alert emails that notify designated individuals of problems on the network. Click the Alert link to view a menu of sub-topics: Alert Settings, and SMTP Server Settings. Fig. 2:1-37 System screen, Alert menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 157: Alert Settings Window

    R3000’s self-monitoring process. Fig. 2:1-38 Alert window The following processes are monitored by the R3000: • CPU Processes - If any CPU process fails to run, the R3000 alerts the administrator about the failed process, and that an attempt will be made to reload the necessary process.
  • Page 158 FTP server. Action should be taken to prevent the hard drive from reaching 100 percent utilization. • Log File Transmission - If the R3000 is unable to send log files as scheduled to an ER server or a third party...
  • Page 159: Enable The Alert Feature

    4. If using an SMTP server for sending alert email messages to designated administrators, enter the email address of the R3000 in the From Email Address field. 5. Click Apply to apply your settings. Modify Alert Settings 1.
  • Page 160: Smtp Server Settings Window

    25. This should be changed if the sending mail connection fails. 3. By default, the Email queue size is 50. This can be changed to specify the maximum number of requests , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 161: Verify Smtp Settings

    2. Enter the email address in the pop-up box. 3. Click OK to close the pop-up box and to process your request. If all SMTP Server Settings are accepted, the test email should be received at the specified address. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 162: Patch

    HAPTER YSTEM SCREEN Patch Patch includes options for uploading software updates. Click the Patch link to view a menu of sub-topics: Local Patch, and Patch Update Log. Fig. 2:1-41 System screen, Patch menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 163: Local Patch Window

    Fig. 2:1-42 Local Patch window NOTE: Available software updates for the R3000 come from downloads made to the server via Traveler, 8e6’s executable program that can run on demand, or be set to run at a scheduled time.
  • Page 164: Read Information About A Software Update

    1. Select a software update from the list. 2. Click the README button to open the README pop-up box that contains information about the software update: Fig. 2:1-43 Software update Readme 3. Click Close to close the pop-up box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 165: Select And Apply A Software Update

    Be sure port 8082 is open on your network. 2. Click Apply to open the software update installation dialog box: Fig. 2:1-44 Software update installation dialog box 3. Click Yes to open the EULA dialog box: Fig. 2:1-45 EULA dialog box , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 166 6. Click OK to close the alert box. 7. In the navigational bar, click Quit to exit the R3000 console, and also close the R3000 Introductory Window. 8. Wait a few minutes, and then log back into the R3000 console again. , R3000 E...
  • Page 167: Undo An Applied Software Update

    To unapply a software update: 1. Go to the History of Patches frame and select the soft- ware update to be unapplied. 2. Click Undo. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 168: Patch Update Log Window

    The Patch Update Log window displays when Patch Update Log is selected from the Patch menu. This window is used for viewing the software update log that provides the status on the R3000’s software update activity, including checks for new software updates, and downloaded and applied software updates.
  • Page 169: Download Log, View, Print Contents

    • In the File Download dialog box, click Save: Fig. 2:1-49 Download Log dialog box This action opens the Save As window: Fig. 2:1-50 Save As pop-up window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 170 5. Click OK to close the alert box asking you to verify that the software update log file was successfully saved to your machine. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 171: View The Contents Of The Log

    Fig. 2:1-52 Folder containing downloaded file 2. Choose “Open With” and then select a zip file executable program such as “WinZip Executable” to launch that application: Fig. 2:1-53 WinZip Executable program , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 172 3. If using WinZip, click I Agree to open the window containing the zip file: Fig. 2:1-54 WinZip window 4. Right-click the zip file to open the pop-up menu, and choose “View” to open the View dialog box: Fig. 2:1-55 View dialog box , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 173: Save, Print The Log File Contents

    • in Windows 2000: Start > Programs > Accessories > Notepad 3. Paste the contents from the clipboard into the Notepad file. The correctly formatted Notepad file can now be saved and/or printed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 174: Synchronization

    Status also becomes available in the pop-up menu. If the R3000 is set up to send profile/library setting changes, that R3000 will function as a Centralized Manage- ment Console, and thus the CMC Management topic becomes available in the navigational panel.
  • Page 175 YSTEM SCREEN NOTE: For an overview on synchronization, see Chapter 3: Synchronizing Multiple Units, from the Introductory Section. WARNING: This version of synchronization only supports the use of unique IP addresses throughout a network. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 176: Setup Window

    The Setup window displays when Setup is selected from the Synchronization menu. This window is used for establishing the function of the R3000, especially if there is more than one R3000 on the network. When there are multiple R3000 servers, it is important to set up one as a "source" server and others as "targets,"...
  • Page 177: Using Only One R3000 On The Network

    R3000 (“target”) servers. WARNING: If an R3000 server is set up in the Source mode with a Network Address Translation (NAT) device between the source and target server(s), be sure that ports 26262, 26268, and 88 are open on the source server.
  • Page 178 3. By default, the “Upstream Failover Detect” checkbox is unpopulated. Click this checkbox if this source server will be set up to detect any failed R3000 “node” and filter that target server. Using this option, the source server will function as the "upstream" R3000 and all target servers will function as "downstream"...
  • Page 179 • The mobile mode cannot be used • If “Library” Selective Synchronization is enabled, end users for the failed R3000 “node” might be given the global group profile instead of their active filtering profiles • If a target server fails, the Range to Detect Settings window displays a Node tab with IP range information for the failed “downstream”...
  • Page 180 8. Click Apply after all settings have been made. Note that the CMC Management topic becomes available in the navigational panel for this source server when settings in this window are saved. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 181: Sync All Target Servers With The Same Settings

    Two scenarios in which this feature might be used involve restoring backup data to the R3000 server: • In the first scenario, library configurations from a previous date in time are restored to the source server, and each target server needs to have these same library configurations as well.
  • Page 182: Set Up An R3000 To Be A Target Server

    An R3000 configured to be a target server will receive profile/library setting changes from the source server only. WARNING: If an R3000 server is set up in the Target mode with a NAT device between the target and source server, be sure that ports 26262 and 26268 are open on the target server.
  • Page 183 NOTE: This test only verifies whether this server can contact the source server. In order for synchronization to be operable on the network, the source server must also be able to contact this target server being configured. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 184: Status Window

    Fig. 2:1-61 Status window, Source mode If set up in the Target mode, this window is used for verifying that profile/library setting updates are being received from the source server. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 185: View The Sync Status Of Targets From The Source

    YSTEM SCREEN View the Sync Status of Targets from the Source If the server is set up in the Source mode, the R3000 System Time displays at the top of the Target(s) Status frame. This is the current date and time from the R3000 server—using the YYYY/MM/DD and HH:MM:SS format—...
  • Page 186: View Items In The Queue

    1. In the Current Queue column for that server, click Details to open the Queue of Target pop-up window: Fig. 2:1-62 Queue of Target pop-up window 2. Click Close to close the pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 187: View Items Previously Synced To The Server

    Fig. 2:1-63 History of Target pop-up window 4. Click Close to close the pop-up window. Place Items in Queue for Syncing To place new sync items in queue for the target server(s), click Test Sync. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 188: View The Sync Status Of The Target Server

    YSTEM SCREEN View the Sync Status of the Target Server If the server is set up in the Target mode, the R3000 System Time displays above the Target Sync Status frame. This is the current date and time from the R3000 server—using the YYYY/MM/DD and HH:MM:SS format—and includes the...
  • Page 189 • History Log - Click the Details button to open the History of Target pop-up window. See View Items Previ- ously Synced to the Server in this section for information on accessing and viewing the contents of this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 190: Mode

    ECTION HAPTER YSTEM SCREEN Mode Mode includes options for configuring the R3000 to filter the network. Click the Mode link to view a menu of sub-topics: Operation Mode and Proxy Environment Settings. Fig. 2:1-65 System screen, Mode menu , R3000 E...
  • Page 191: Operation Mode Window

    Mode is selected from the Mode menu. This window is used for specifying the operational mode the R3000 will use to filter the network, and the settings the R3000 will use for “listening to” traffic and sending traffic. This window is also used for configuring an R3000 to perform other operational capacities.
  • Page 192: Set The Operation Mode

    “Router”, “Firewall”, “Mobile”, or “ICAP”—either of the latter two settings indicates this R3000 will function in a capacity other than filtering users on the network. WARNING: If using the router or firewall mode, 8e6 recommends contacting one of our solutions engineers if you need any assis- tance with setup procedures.
  • Page 193: Invisible Option: Specify The Block Page Delivery

    • “Send Block to Specified Host MAC Address” - using this preferred method, the block page will always be sent to the MAC address of a specified host, usually the R3000 gateway. Using this option, choose from either of the two Block Page Route To selections: •...
  • Page 194: Mobile Option: Specify The Mobile Client Control

    Adaptation Protocol (ICAP) server to off-load specific content normally processed by the R3000, such as Internet filtering. With an ICAP server, the R3000 will not capture any network packets but will solely work with ICAP requests from an ICAP client (proxy server). When an end user...
  • Page 195: Apply Operation Mode Settings

    WARNING: Go to http://www.8e6.com/r3000help/files/ 1system_opmode_icap.html to review a list of items to be considered when using the ICAP mode. Apply Operation Mode Settings Click Apply to apply your settings in the Mode frame. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 196: Proxy Environment Settings Window

    Proxy Environment Settings is selected from the Mode menu. This window is used for specifying whether the R3000 is in a proxy environment, and if the default Web server port number 80 will be enabled. Fig. 2:1-67 Proxy Environment Settings window NOTE: Basic Proxy Authentication must be used if using HTTPS in a proxy environment.
  • Page 197: Use A Local Proxy Server

    1. Click the “On” radio button. This selection indicates that the R3000 will perform a reverse lookup on packets to detect the source address and origin of packets. 2. Click Apply to apply your setting.
  • Page 198: Authentication

    DMINISTRATOR ECTION HAPTER YSTEM SCREEN Authentication Authentication includes options for configuring the R3000 to authenticate and re-authenticate users on the network. Click the Authentication link to view a menu of sub-topics: Enable/Disable Authentication, Authentication Settings, and Authentication SSL Certificate. Fig. 2:1-68 System screen, Authentication menu NOTES: Information about these sub-topics can be found in the R3000 Authentication User Guide.
  • Page 199: Nic Mode

    The NIC Mode window displays when NIC Mode is selected from the navigation panel. This window lets you specify the speed for the R3000’s Network Interface Card settings so that the R3000 can communicate with the network switch or hub. Fig. 2:1-69 NIC Mode window By default the NIC mode for LAN1 and LAN2 is set to “Auto”.
  • Page 200: View The Nic Negotiation

    Fig. 2:1-70 NIC Negotiation window Mii-tool checks or sets the status of a network interface's Media Independent Interface (MII) unit. Ethtool is a diag- nostic and tuning tool that examines and tunes the NIC. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 201: Modify The Nic Mode Setting

    YSTEM SCREEN Modify the NIC Mode Setting WARNING: If changing the NIC mode, be sure the hub/switch to which the R3000 is connected will support the selected NIC mode. An incorrect setting may prevent you from accessing the R3000 console.
  • Page 202: Nic Mode Speeds Chart

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN NIC Mode Speeds Chart Below are charts of NIC speeds for various R3000 models: Year 2008 Models LAN1 LAN2 R3000 HL platform 10, 100, 1000 10, 100, 1000 R3000 SL platform 10, 100, 1000...
  • Page 203: Backup/Restore

    Fig. 2:1-71 Backup/Restore window WARNING: A backup should be created and downloaded off the R3000 server whenever a change is made to filtering settings on the R3000 server. , R3000 E ECHNOLOGIES...
  • Page 204: Backup Procedures

    These backup files can be uploaded to a new server, eliminating the need to re- enter the same settings from the old R3000 in the console of the new R3000. NOTE: See Server Maintenance Procedures from the Introduc- tory Section’s Chapter 3: Synchronizing Multiple Units, for an...
  • Page 205: Perform A Backup

    To back up configuration and/or library modifications: 1. In the Backup frame, click the Configuration and/or Library checkbox(es) as appropriate. 2. Click Backup to open the R3000 Backup dialog box: Fig. 2:1-72 R3000 Backup dialog box 3. Type in the Filename for the backup file.
  • Page 206: Download A File

    This action opens the Save As window: Fig. 2:1-74 Save As pop-up window 4. Find the folder in which to save the file, and then click Save to begin downloading the “.gz” file to your worksta- tion. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 207 After the file has completely downloaded, the Download complete dialog box opens: Fig. 2:1-75 Download complete box You can now open this file, open the folder where the file was saved, or close this dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 208: Perform A Restoration

    WARNING: Be sure the file you are restoring uses the same version of the software currently used by the R3000 Administrator console. Refer to the Local Patch window for available updates to the R3000’s software. (See the Local Patch window for more information about software updates.)
  • Page 209: Restore Configurations To The Server

    Backup Configurations grid. Restore Configurations to the Server To restore configurations or library modifications from a previous backup: 1. Select the file from the Backup Configurations grid. 2. Click Restore to overwrite the current settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 210: Remove A Backup File

    The following information displays for each row: the date and time a process was attempted to be executed, and a Message indicating whether that process succeeded or failed. 2. Click OK to close the pop-up box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 211: Reset

    Fig. 2:1-79 Reset window WARNING: When Reset is clicked, all settings made on the R3000 server will be removed and the box will be restored to its original state. Any software updates applied to the server subse- quent to receiving this box will need to be reapplied.
  • Page 212: Radius Authentication Settings

    NOTE: The Radius Authentication Settings topic does not display if the synchronization feature is used, and this server being configured is set up in the Target mode to synchronize both profile and library setting changes. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 213: Enable Radius

    • Click the radio button corresponding to Host Byte Order to use the byte order stored in the server (big endian or little endian order). NOTE: The byte order should match the setting on the Radius accounting server. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 214: Apply Settings

    Radius accounting server. • Check the box for Use R3000 IP as Source IP, if the IP address of the R3000 server (LAN1 or LAN2) should be used when forwarding packets instead of the IP address of the NAS.
  • Page 215: Disable Radius

    1: S LOBAL DMINISTRATOR ECTION HAPTER YSTEM SCREEN Disable Radius To disable the Radius feature: 1. At the Radius Mode field, click the “Off” radio button. 2. Click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 216: Snmp

    This feature lets the global adminis- trator use a third party Simple Network Management Protocol (SNMP) product for monitoring and managing the working status of the R3000's filtering on a network. Fig. 2:1-81 SNMP window The following aspects of the R3000 are monitored by...
  • Page 217: Enable Snmp

    Enter the password to be used as the Community token for public access. This is the password that the manage- ment R3000 console would use when requesting access. Create, Build the Access Control List 1. In the Enter new IP to add field, enter the IP address of an interface from/to which the SNMP should receive/ send data.
  • Page 218: Hardware Failure Detection

    YSTEM SCREEN Hardware Failure Detection Hardware Failure Detection window If using an R3000 H, SL, or HL unit, the Hardware Failure Detection window displays when Hardware Failure Detec- tion is selected from the navigation panel. This feature shows the status of each drive on the RAID server.
  • Page 219: View The Status Of The Hard Drives

    3. Click on the “Rebuild” button on the GUI 4. To return a failed drive to 8e6 or to order additional replacement drives, please call 8e6 Technical Support NOTE: For information on troubleshooting RAID, refer to Appendix G: RAID Maintenance. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 220: Strikes Blocking

    (“X”) number of attempts to such sites. “‘Unacceptable’ Internet sites” pertain to sites included in categories that are blocked in a user’s profile. Fig. 2:1-83 X Strikes Blocking window, Configuration tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 221: Configuration

    4 seconds. 5. Specify the “Locked” Life Time (Measured in Minutes), which is the number of minutes a user's work- station will be locked. Choose either “Unlimited”, or “Defined”. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 222: Reset All Workstations

    The following buttons can be clicked to reset workstations: • Click Reset All Strikes to remove all strikes from all workstations, and to unlock all locked workstations. • Click Unlock All Locks to remove locks on all locked workstations. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 223: Lock Page

    Common Customization window. (See Customization in this chapter for more information.) The user will not be able to access the Internet from that workstation until the Defined amount of time specified in the , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 224: Overblocking Or Underblocking

    16 seconds. If the configuration settings for this example overblock too many users too frequently: • the time span for the maximum number of strikes may need to be increased , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 225: Email Alert

    • the maximum number of strikes may need to be reduced Email Alert Click the Email Alert tab to display Email Alert: Fig. 2:1-85 X Strikes Blocking window, Email Alert tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 226: Set Up Email Alert Criteria

    Daily Schedule pop-up window that shows the alert time schedule in the (HH:MM:SS) format: Fig. 2:1-86 The Daily Schedule pop-up window Click Close to close the pop-up window. 3. Click Save to save the field entries. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 227: Set Up Email Alert Recipients

    Remove Email Alert Recipients 1. Select the email address(es) from the Current Email Alerts list box. 2. Click Delete to remove the email address(es) from list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 228: Logon Accounts

    Password fields, using eight to 20 characters and at least one alpha character, one numeric character, and one special character. The password is case sensitive. 3. Click Add to include the username in the Current Acces- sible Users list box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 229: Deactivate An Authorized Logon Account

    (See Chapter 4: Reporting screen, Real Time Probe for information on setting up and using real time probes.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 230: Categories

    “No Strike” Categories list box. 3. Click Apply to apply your settings. NOTE: Library categories in the “Strike” Categories list box will only be effective for filtering profiles with the X Strikes Blocking Filter Option enabled. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 231: Go To X Strikes Unlock Workstation Gui

    The Re-login window opens if the user’s session needs to be validated: Fig. 2:1-89 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the R3000 console. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 232: Strikes Unlock Workstation

    NOTE: An authorized staff member can click a link in an email alert, or type in http://x.x.x.x:88/XStrike.html in the address field of a browser window—in which “x.x.x.x” is the IP address of the R3000—to view locked workstation criteria. Unlock a Workstation To unlock a specified workstation: 1.
  • Page 233: Set Up An Email Address To Receive Alerts

    1. Enter the email address in the Email Address to be Subscribed/Unsubscribed text box. 2. Click Unsubscribe. Close the Pop-up Window Click the “X” in the upper right corner of the pop-up window to close the window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 234: Warn Option Setting

    URL with a Warn setting. Fig. 2:1-91 Warn Option Setting window , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 235: Specify The Interval For Re-Displaying The Warn Page

    1. In the Warn Life Time (minutes) field, by default 10 displays. Enter the number of minutes (1-480) to be used in the interval for re-displaying the warning page for the end user. 2. Click Apply to enable your setting. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 236: Customization

    Target mode to synchronize both profile and library setting changes. Fig. 2:1-92 System screen, Customization menu NOTE: Refer to the R3000 Authentication User Guide for infor- mation on using the Authentication Form Customization window. , R3000 E...
  • Page 237: Common Customization Window

    HTML pages, the Help link points to the FAQs page on 8e6's public site that explains why access was denied, and a sample email address is included for adminis- trator contact information. These details can be modified, as necessary. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 238: Enable, Disable Features

    • Blocked URL Display - if enabled, displays “Blocked URL” followed by the blocked URL in block pages • Copyright Display - if enabled, displays 8e6 R3000 copyright information at the footer of block and lock pages, and the authentication request form •...
  • Page 239 Enter the global administrator's email address. 2. Click Apply to save your entries. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 240: Lock Page Customization Window

    NOTE: See X Strikes Blocking window in this chapter for informa- tion on using the X Strikes Blocking feature. Fig. 2:1-94 Lock Page Customization window TIP: An entry in any of the fields in this window is optional. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 241: Edit Entries, Setting

    Description field. Click “Off” to not have the explanatory text display in the lock page. 3. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 242: Preview Sample Lock Page

    By default, the following standard links are included in the lock page: • HELP - Clicking this link takes the user to 8e6’s Tech- nical Support page that explains why access to the site or service may have been denied. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 243: Block Page Customization Window

    DMINISTRATOR ECTION HAPTER YSTEM SCREEN • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized lock page. TIP: If necessary, make edits in the Lock Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample lock page.
  • Page 244: Add, Edit Entries

    Any entries made in these fields will display centered in the customized block page, using the Arial font type. 2. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 245: Preview Sample Block Page

    Exception URL, “Exception” displays instead of the library category name. • Blocked URL field - The URL the user attempted to access displays. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 246 Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. By default, these links are included in the block page under the following conditions: •...
  • Page 247: Warn Page Customization Window

    NOTE: See Warn Option Setting window in this chapter for more information about this feature. Fig. 2:1-98 Warn Page Customization window TIP: An entry in any of the fields in this window is optional. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 248: Add, Edit Entries

    Any entries made in these fields will display centered in the customized warning page, using the Arial font type. 2. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 249: Preview Sample Warning Page

    • IP field - The user’s IP address displays. • Category field - The name of the library category that warned the user about accessing the URL displays. • Blocked URL field - The URL the user attempted to access displays. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 250 • HELP - Clicking this link takes the user to 8e6’s Tech- nical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following buttons are included in the warning page: •...
  • Page 251 TIP: If necessary, make edits in the Warn Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample warning page. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 252: Profile Control Window

    NOTE: See Override Account window in the Group section for more information about this feature. Fig. 2:1-100 Profile Control window TIP: An entry in any of the fields in this window is optional. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 253: Edit Entries

    TIP: Click Restore Default and then click Apply to revert to the default settings in this window. NOTE: For a sample profile control pop-up window, see Option 3 from the Options page section of the Block Page Authentication window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 254: Quota Block Page Customization Window

    Fig. 2:1-101 Quota Block Page Customization window TIP: An entry in any of the fields in this window is optional. NOTE: For more information about quotas, see the Quota Setting window in this chapter. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 255: Add, Edit Entries

    Any entries made in these fields will display centered in the customized quota block page, using the Arial font type. 2. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 256: Preview Sample Quota Block Page

    By default, the following standard links are included in the quota block page: • HELP - Clicking this link takes the user to 8e6’s Tech- nical Support page that explains why access to the site or service may have been denied. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 257: Quota Notice Page Customization Window

    DMINISTRATOR ECTION HAPTER YSTEM SCREEN • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized quota block page. TIP: If necessary, make edits in the Quota Block Page Customi-...
  • Page 258 Click “Off” to not display this information in the quota notice page. 3. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 259: Preview Sample Quota Notice

    • User/Machine field - The username displays for the NT/LDAP user. This field is blank for the IP group user. By default, the following standard links are included in the quota notice page: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 260 Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following button is included in the quota notice page: •...
  • Page 261: Cmc Management

    ECTION HAPTER YSTEM SCREEN CMC Management CMC Management displays on an R3000 set up in the Source mode, and includes Centralized Management Console options for viewing the filtering statuses of this source server and its target server(s), and managing soft- ware updates on these servers.
  • Page 262: Patch Management Window

    This window is used for viewing software updates currently applied to the source and target servers and any available software updates, and applying software updates to these servers. Fig. 2:1-106 Patch Management window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 263: View Software Update Information

    YSTEM SCREEN View Software Update Information The Patches frame displays the software update statuses of the source and each target R3000: Hostname/Location (information entered in the LAN Settings window for the source server's hostname, or the information entered for the target server in the Target Location field in the Setup window);...
  • Page 264: Apply Or Undo A Software Update

    To undo a software update: 1. Select the row(s) corresponding to the server(s) that need(s) to have the last software update removed. 2. Clicking Undo to remove that software update from the server(s). , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 265: Status Window

    The Status window displays when Status is selected from the CMC Management menu. This window is used for viewing the filtering status of the source and target server(s) for troubleshooting purposes. Fig. 2:1-107 Status window, CMC Management menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 266: View Filtering Status Information

    Columns can be resized by mousing over the line in the header between two columns so that a double-ended arrow (<—>) displays, and then clicking and dragging the cursor to the left or right. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 267: Quota Setting

    Fig. 2:1-108 Quota Setting window TIP: After making all configuration settings in this window during this session, click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 268: Configure Quota Hit Settings

    60 hits are made to that category—i.e. 600 seconds (10 minutes) divided by 10 seconds. NOTE: This field is greyed-out if the R3000 is set up as a target server in the synchronization mode. 2. If this R3000 is set up with synchronization and is a source server, enable Centralize Hits on Source only if all hits should be made on this R3000.
  • Page 269: Reset Quotas

    2. Click Add to include this reset time in the Current Reset Time(s) list box. TIP: Repeat steps 1 and 2 for each quota reset time to be sched- uled. After making all configuration settings in this window during this session, click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 270: Delete A Quota Reset Time From The Schedule

    1. Select the quota reset time from the Current Reset Time(s) list box. 2. Click Remove to remove the quota reset time from the list box. TIP: After making all configuration settings in this window during this session, click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 271: Quota Notice

    • User/Machine field - The username displays for the NT/ LDAP user. This field is blank for the IP group user. By default, the following standard links are included in the quota notice page: , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 272: Quota Block

    • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The end user can decide whether or not to access the requested URL.
  • Page 273 • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. , R3000 E...
  • Page 274: Chapter 2: Group Screen

    For the NT and LDAP domain branches, the global adminis- trator must first set up authentication in order to enable the NT/LDAP branch(es). For each domain, the administrator then sets up and maintains groups, and creates filtering profiles for groups and users. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 275 Information on creating filtering profiles for IP groups can be found in the Group Administrator Section of this user guide. If using the synchronization feature, if the R3000 server being configured is set up in the Target mode to synchronize both profile and library setting changes, the only branch that displays in the tree is Global Group.
  • Page 276: Global Group

    Account, Minimum Filtering Level, and Refresh All. Fig. 2:2-2 Group screen, Global Group menu NOTE: If the synchronization feature is used and this R3000 being configured is set up in the Target mode to synchronize both profile and library setting changes, the only sub-topic that displays is Range to Detect.
  • Page 277: Range To Detect Window

    Detect is selected from the Global Group menu. This window is used for defining segments of network traffic to be detected by the R3000 in the invisible or router mode. Service ports that should be open—ignored by the R3000— are also defined in this window.
  • Page 278: Add A Segment To The Network

    ECTION HAPTER ROUP SCREEN NOTE: If this R3000 is using the Source mode and the Upstream Failover Detect feature is enabled, if a downstream target server fails—as detected by the 8e6 Appliance Watchdog—the Current Ranges information from the failed downstream target “node”...
  • Page 279 • Advanced Settings - clicking this button takes you to the Range to Detect Advanced Settings window. Follow the instructions in the Range to Detect Advanced Settings sub-section to complete the addi- tion of the segment on the network. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 280: Range To Detect Setup Wizard

    Since the first four pages of the Wizard contain the same fields and buttons, instructions provided for this step are not repeated for Steps 2 - 4. 1. Choose the appropriate option for entering the IP address(es): , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 281 Remove. 3. Click Next to go to the next page of the Wizard. NOTE: Click Cancel to be given the option to return to the main Range to Detect Settings window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 282 NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the R3000, thus enabling it to handle more traffic. Fig. 2:2-6 Range to Detect Setup Wizard window, Step 2 NOTE: For Steps 2-6, click Back to return to the previous page of the Wizard.
  • Page 283 LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN Step 3: Optional In this step you define the source IP address(es) to be excluded from filtering. Fig. 2:2-7 Range to Detect Setup Wizard window, Step 3 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 284 NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the R3000, thus enabling it to handle more traffic. Fig. 2:2-8 Range to Detect Setup Wizard window, Step 4...
  • Page 285 2. Click Add to include the entry in the list box above. NOTE: To remove the port number, select it from the list box and click Remove. 3. Click Next to go to the last page of the Wizard. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 286 • click Finish to accept all your entries. This action takes you to the main Range to Detect Settings window where the segment you entered now displays in the Current Ranges list box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 287: Range To Detect Advanced Settings

    NOTE: Click Cancel to be given the option to return to the main Range to Detect Settings window without saving your settings. 2. Click Apply to accept your entries and to return to the main Range to Detect Settings window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 288: Modify A Segment Of The Network

    Remove a Segment from the Network To remove a segment: 1. In the main Range to Detect Settings window (see Fig. 2:2-3), select the segment from the Current Ranges list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 289: Rules Window

    “Rule4 8e6 CIPA Compliance” (which pertains to the Chil- dren’s Internet Protection Act), and the “Block All” rule. By default, “Rule1” displays in the Rule # field, “BYPASS” displays in the Rule Description field, and Uncategorized Sites are allowed to Pass. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 290: View Criteria For A Rule

    The end user can view the URL after seeing a warning message and agreeing to its terms. • Block - URLs in this category will be blocked. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 291 NOTE: See the Quota Settings window in Chapter 1: System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 292: Modify A Rule

    3. Enter up to 20 characters for a unique Rule Description that describes the theme for that rule. 4. Modify settings for library groups and categories in the Rule Details frame. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 293: Remove A Rule

    2: G LOBAL DMINISTRATOR ECTION HAPTER ROUP SCREEN 5. Click Save Rule. Remove a Rule To delete a rule: 1. Select the rule from the Current Rules pull-down menu. 2. Click Delete Rule. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 294: Global Group Profile Window

    Category, Port, Default Redirect URL, and Filter Options. Entries in these tabs comprise the profile string for the global group. Fig. 2:2-13 Global Group Profile window, Category tab , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 295: Category Profile

    • Warn - URLs in this category will warn the end user that the URL he/she requested can be accessed, but may be against the organization’s policies. The end user can view the URL after seeing a warning message and agreeing to its terms. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 296 URLs in that library group/category. TIP: If a quota entry is made for a category group, all library cate- gories in that group will show the same number of quota minutes. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 297 URLs in any quota- marked library group/category, the Overall Quota over- rides the number of minutes defined for each individual quota. 4. Click Apply to apply your settings at the global level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 298: Port

    2. Click Add. Each port number you add displays in the Block Port(s) list box. 3. Click Apply to apply your settings at the global level. To remove a port number from the list box: 1. Select the port number. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 299: Default Redirect Url

    Block Page”, “Authentication Request Form”, or “Custom URL”. If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 300: Filter Options

    Enforcement”, “Search Engine Keyword Filter Control”, “URL Keyword Filter Control”. If URL Keyword Filter Control is selected, the “Extend URL Keyword Filter Control” option can be selected. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 301 Google, Yahoo!, Ask.com, or AOL images returned by the query to load on the page. The user will receive only one strike if all inappropriate images load within the toler- ance time range of a given strike. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 302 • 8e6 Supplied Categories - see Chapter 3: Library screen, Search Engine Keywords window in this section. • Custom Categories - see the Group Administrator Section, Chapter 2: Library screen, Search Engine Keywords window. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 303 URLs that are not even within blocked catego- ries. For example, if all URL keywords containing “sex” are blocked, users will not be able to access a non-pornographic site such as http://www.essex.com. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 304: Override Account Window

    IP group user to bypass settings at the minimum filtering level. A user with an override account will be able to access categories and service ports blocked at the minimum filtering level. Fig. 2:2-17 Override Account window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 305: Add An Override Account

    (See Category Profile, Redirect URL, and Filter Options in this sub-section for information on the Rule, Redirect, and Filter Options tabs.) 6. Click Apply to activate the override account. 7. Click Close to close the pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 306: Category Profile

    Category Groups tree. TIP: In the Category Groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 307 URL that has not yet been categorized: “Pass”, “Warn”, or “Block”. 4. To use the quota feature to restrict the end user’s access to a passed library group/category, do the following: , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 308 5. Click Apply to apply your settings to the override account profile. 6. Click another tab (Redirect or Filter Options) to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 309: Redirect Url

    If “Custom URL” is selected, enter the redirect URL in the corresponding text box. The user will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings to the override account profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 310: Filter Options

    Internet, he/she will be locked out from his/her workstation after a specified number of tries within a fixed time period. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 311 Search engine keywords are entered in the Search Engine Keywords window of 8e6 supplied library categories and custom library categories. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 312 Chapter 2: Library screen, URL Keywords window. 2. Click Apply to apply your settings to the override account profile. 3. Click Close to close the pop-up window and to return to the Override Account window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 313: Change The Password

    3. Click the tab in which to make modifications (Rule, Redi- rect, Filter Options). 4. Make your edits in this tab and in any other tab, if neces- sary. 5. Click Apply. 6. Click Close to close the pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 314: Delete An Override Account

    Category tab is clicked. This tab is used for making selections from the list of library categories, and specifying whether each of these selected categories will be opened or blocked at the minimum filtering level. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 315 Pass or Block column. TIP: In the Category Groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 316: Create, Edit Minimum Filtering Categories

    Shift key on your keyboard while clicking the last category, and then double- clicking in the appropriate column. 2. Click Apply to apply your settings for the minimum filtering level. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 317: Port

    2. Click Add. Each port number you add displays in the Block Port(s) list box. 3. Click Apply to apply your settings at the minimum filtering level. To remove a port number from the list box: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 318: Minimum Filtering Bypass Options

    NOTE: See the Override Account window and Exception URL window of the Group screen in the Group Administrator Section of this user guide for information on setting up an override account and exception URLs. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 319: Specify Minimum Filtering Bypass Options

    URLs blocked at the minimum filtering level are set up to be accessed by users. 2. Click Save to apply your settings. (See the Exception URL window in the Group Administrator Section for more information.) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 320: Refresh All

    If authentication is enabled, when Refresh All is clicked, the NT and LDAP branches of the tree display. When authenti- cation is disabled, when Refresh All is clicked only the IP branch of the tree displays. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 321 IP includes options for adding a master IP group and to refresh the tree list. Click the IP link to view a menu of sub- topics: Add Group, and Refresh. Fig. 2:2-24 Group screen, IP menu , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 322: Add Group

    3. Enter the Password, and re-enter it in the Confirm Password field, using eight to 20 characters and at least one alpha character, one numeric character, and one special character. The password is case sensitive. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 323: Refresh

    Group Administrator Section of this user guide. Refresh Refresh IP Groups From the IP group menu, click Refresh whenever changes have been made in this branch of the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 324: Chapter 3: Library Screen

    Module, Category Weight System, NNTP Newsgroup, and Category Groups. NOTE: If the synchronization feature is used, an R3000 set up in the Target mode to synchronize both profile and library setting changes will only display the Updates, Library Lookup, Customer Feedback Module, and NNTP Newsgroup topics.
  • Page 325 8e6 supplied library categories. See Appendix B for information on messages that display in the Library Update Log window. Instant Messaging library categories only include Library Details and URLs sub-topics. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 326: Updates

    Click the Updates link to view a menu of sub-topics: Configuration, Manual Update, Addi- tional Language Support, Library Update Log, and Emer- gency Update Log. Fig. 2:3-2 Library screen, Updates menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 327: Configuration Window

    Configuration window The Configuration window displays when Configuration is selected from the Updates menu. This window is used for making settings to allow the R3000 to receive 8e6 supplied library category updates on a daily basis. Fig. 2:3-3 Configuration window Set a Time for Updates to be Retrieved 1.
  • Page 328: Optional: Specify A Proxy Server

    Log Level 1 includes a summary of library and software update activity. Log Level 2 includes detailed information on library and soft- ware update activity. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 329: Manual Update Window

    This window is used for updating specified 8e6 supplied library categories on demand from the update server, if the R3000 has not received daily updates due to an occurrence such as a power outage. Fig. 2:3-4 Manual Update window NOTE: The Configuration window should be used for scheduling the R3000 to automatically download libraries on a daily basis.
  • Page 330: Specify The Type Of On Demand Update

    • Patch Update - Select this option to download new software updates for the R3000, if available. Any soft- ware updates that are downloaded can be found in the System section of the console, in the Local Patch window.
  • Page 331: Additional Language Support Window

    Selected Languages list box. 2. Once the Selected Languages list box is populated, the (Optional) Select Primary Language pull-down menu includes the language selection(s) in addition to the default “None” selection. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 332 TIP: To move a language selection back to the Unselected Languages list box, select the item and then click the left arrow. 3. Click Apply to have URLs from the selected language(s) included in the library categories. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 333: Library Update Log Window

    The Library Update Log window displays when Library Update Log is selected from the Updates menu. This window is used for viewing transfer activity of library updates from the update server to your R3000, and for downloading the activity log. Fig. 2:3-6 Library Update Log window...
  • Page 334: Download Log, View, Print Contents

    • In the File Download dialog box, click Save: Fig. 2:3-7 Download Log dialog box This action opens the Save As window: Fig. 2:3-8 Save As pop-up window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 335: View The Contents Of The Log

    View the Contents of the Log Once the log file has been downloaded to your workstation, you can view its contents. 1. Find the log file in the folder, and right-click on it to open the pop-up menu: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 336 2. Choose “Open With” and then select a zip file executable program such as “WinZip Executable” to launch that application: Fig. 2:3-11 WinZip Executable program 3. If using WinZip, click I Agree to open the window containing the zip file: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 337 “View” to open the View dialog box: Fig. 2:2-13 View dialog box 5. Select “Internal ASCII text viewer”, and then click View to open the View window containing the log file contents: Fig. 2:3-14 View window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 338: Save, Print The Log File Contents

    • in Windows 2000: Start > Programs > Accessories > Notepad 3. Paste the contents from the clipboard into the Notepad file: Fig. 2:3-15 Notepad The correctly formatted Notepad file can now be saved and/or printed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 339: Emergency Update Log Window

    Update Log is selected from the Updates menu. This window is used for viewing transfer activity of emergency software updates from the update server to your R3000, and for downloading the activity log. Fig. 2:3-16 Emergency Update Log window...
  • Page 340: Download The Software Update Log File

    NOTE: See Library Update Log window for information on viewing the contents of the log file, and printing and/or saving the log file contents. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 341: Library Lookup

    This window is used for verifying whether a URL or search engine keyword or keyword phrase exists in a library category, and to remove it, if necessary. Fig. 2:3-17 Library Lookup window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 342: Url Lookup, Removal

    3. Click OK to close the alert box and to display any results in the Result Category list box, showing the long name of the library category, followed by the URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 343: Remove A Url

    URL or search engine keyword that appears to be incorrectly categorized. 1. Select the item(s) from the Result Category list box. 2. Click Email Result. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 344: Search Engine Keyword Lookup, Removal

    Once all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
  • Page 345: Customer Feedback Module

    This window is used for enabling the Customer Feed- back Module feature, in which the most frequently visited non-categorized URLs in your R3000's filter log will be FTPed to 8e6 on a daily basis. The URLs collected by 8e6 will be reviewed and added to 8e6's standard library catego- ries, as appropriate, so they can be blocked.
  • Page 346: Disable Customer Feedback Module

    Fig. 2:3-19 Disclaimer box 3. Scroll down to read the text in this box: “Customer Feedback Module Disclosure Statement “Customer Feedback Module shall mean the function installed on 8e6 Technologies’ products used to transmit , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 347 URLs collected by the Customer Feed- back Module and sent to 8e6 Technologies. At no time will any personal information collected be released publicly, nor will the Web request data be used for any...
  • Page 348 5. Click Accept to close the Disclaimer box and to open the Note dialog box: Fig. 2:3-20 Note dialog box 6. If you do not have a firewall, or if you agree to open your firewall to cfm.8e6.com, click Accept to proceed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 349: Category Weight System

    This feature lets you choose which category will be logged and reported for a URL request that exists in multiple cate- gories (possibly both 8e6 supplied and custom library cate- gories) with the same operational precedence. Fig. 2:3-21 Category Weight System window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 350: View The Current Selections

    NOTE: If a URL exists in multiple un-weighted categories of the same operational precedence, the category logged would be the first one returned by the R3000 database. Since there is no precedence given, the order in which the category is returned would be random.
  • Page 351: Weighting Library Categories

    "weight" when ranked against other categories, based upon an end user’s URL request that appears in multiple library categories set up with the same operational precedence in the end user’s filtering profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 352: Nntp Newsgroup

    To add a newsgroup to the library: 1. In the Newsgroup frame, enter the Newsgroup address. 2. Click Add. If the newsgroup already exists, an alert box will open to inform you that it exists. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 353: Remove A Newsgroup From The Library

    After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
  • Page 354: Category Groups

    8e6 supplied library categories. 8e6 supplied library categories are updated regularly with new URLs via Traveler, 8e6’s executable program that supplies updates to the R3000. Category Groups also contains the Custom Categories category group. Customized category groups and library categories must be set up and maintained by global or group administrators.
  • Page 355 Click the 8e6 supplied category link to view a menu of sub- topics: Library Details, URLs, URL Keywords, and Search Engine Keywords. (Menus for Instant Messaging library categories only include the sub-topics Library Details, and URLs). , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 356: Library Details Window

    This window is a view only window. Fig. 2:3-24 Library Details window View Library Details This window displays the Group Name, Description, and Short Name of the 8e6 supplied library category. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 357: Urls Window

    URLs ending in “.playboy.com”. A URL is used in a filtering profile for blocking a user’s access to a specified site or service. Fig. 2:3-25 URLs window, Action tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 358: View A List Of Urls In The Library Category

    2. Make a selection from the pull-down menu for “Addition List”, “Deletion List”, “Wildcard Addition List”, or “Wild- card Deletion List”. 3. Click View List to display the specified items in the Select List list box: Fig. 2:3-26 URLs window, View tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 359: Add Or Remove Urls, Reload The Library

    Ctrl key on your keyboard. Blocks of URLs can be selected by clicking the first URL, and then pressing the Shift key on your keyboard while clicking the last URL. 4. Click Apply Action. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 360: Add A Wildcard Url To The Library Category

    *.cnn.com is added to a category set up to be blocked, the end user will be able to access http://www.cnn.com since it is a direct match, but will not be able to access http://www.sports.cnn.com, since direct URL entries take precedence over wildcard entries. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 361: Remove A Url From The Library Category

    After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
  • Page 362: Url Keywords Window

    URL keywords can be added in this window but URL keyword filtering will not be in effect for the user(s). (See the Filter Options tab in the Group screen section for information about enabling URL keyword filtering.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 363: View A List Of Url Keywords

    1. Enter the Keyword in the Edit Keyword List frame. 2. Click Add. Remove a URL Keyword from the Library To remove a URL keyword from the library category: 1. Enter the Keyword in the Edit Keyword List frame. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 364: Upload A List Of Url Keywords To The Library

    4. Click Upload File to upload this file to the server. NOTE: A URL keyword text file must contain one URL keyword per line. WARNING: The text file uploaded to the server will overwrite the current file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 365: Upload A List Of Url Keyword Deletions

    After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
  • Page 366: Search Engine Keywords Window

    NOTE: Master lists cannot be uploaded to any 8e6 supplied library category. See the Custom Categories sub-section of the Group Administrator Section of this user guide for information on uploading a master list to the server. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 367: View A List Of Search Engine Keywords

    Add a Search Engine Keyword to the Library To add a search engine keyword/phrase to the library cate- gory: 1. In the Edit Search Keyword List frame, enter up to 75 alphanumeric characters in the Keyword field. 2. Click Add. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 368: Remove A Search Engine Keyword From The Library

    3. Click Upload File to upload this file to the server. NOTE: A search engine keywords text file must contain one keyword/phrase per line. WARNING: The text file uploaded to the server will overwrite the current file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 369: Upload A List Of Search Engine Keyword Deletions

    After all changes have been made to library windows, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
  • Page 370: Chapter 4: Reporting Screen

    From the navigation panel at the left of the screen, click Report Configuration to display the Report Configuration window, used if the R3000's log files will be transferred to a reporting application. Click Real Time Probe to display windows for configuring and maintaining real time probes.
  • Page 371 HAPTER EPORTING SCREEN NOTE: Information on configuring the Enterprise Reporter (ER) to work with the R3000 can be found in Appendix F of the Appen- dices Section. WARNING: A version of the Enterprise Reporter prior to 3.0 should not be configured to work with the R3000.
  • Page 372: Report Configuration

    Specify the Reporting Device By default, no option is selected at the Export field. If R3000 logs will be exported to a reporting application: 1. Click the checkbox corresponding to the reporter to be used for transferring logs: “8e6 Enterprise Reporter”, or “Other Device”.
  • Page 373: E6 Enterprise Reporter

    If “8e6 Enterprise Reporter” was selected, the 8e6 Enter- prise Reporter tab displays by default. On this tab, you need to specify criteria for the ER server that will receive logs from the R3000. Fig. 2:4-3 Report Configuration window, 8e6 ER option, ER tab Edit ER Server Information In the Log File Transfer Configuration frame, by default the IP address 1.2.3.6 displays in the Remote Server list box.
  • Page 374: Execute Log Transfer Now

    View Transfer Activity to the ER After the ER has been configured and logs have been trans- ferred from the R3000 to the ER, you can view transfer activity. Fig. 2:4-4 Report Configuration window, 8e6 ER option, Log tab 1.
  • Page 375: Other Device

    If “Other Device” was selected, the Other Device tab displays by default. On this tab, you need to specify criteria for the reporter that will receive logs from the R3000. Fig. 2:4-5 Report Configuration window, Other Device option and tab...
  • Page 376 8 = updates occur every eight hours, at these intervals of time: 8, 16, 24. 12 = updates occur every 12 hours, at these intervals of time: 12, and 24. 24 = updates occur every 24 hours. 2. Click Save. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 377: View Transfer Activity To The Reporting Device

    HAPTER EPORTING SCREEN View Transfer Activity to the Reporting Device After logs have been transferred from the R3000 to the reporting device, the Log tab can be clicked to view transfer activity. On this tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
  • Page 378: Real Time Probe

    Probe is selected from the navigation panel. This feature lets the probe administrator monitor a user's Internet usage in real time to see if that user is using the Internet appropri- ately. Fig. 2:4-6 Real Time Probe window, Configuration tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 379: Configuration

    Exclude an IP Address from Real Time Probing 1. Enter the Excluded IP Address of a machine to be bypassed from real time probing. 2. Click Add to add the IP address in the Current White list of IPs. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 380: Remove Ips From The White List

    Fig. 2:4-7 Real Time Probe window, Report Recipients tab Specify Email File Criteria 1. Click the radio button corresponding the to the Email Format to be used for the file: “Plain Text” or “HTML”. By default, “HTML” is selected. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 381: Set Up Email Addresses To Receive Reports

    Remove Email Addresses 1. Select the email address(es) from the Current List of Completed Reports to be Emailed list box. 2. Click Delete to remove the email address(es) from list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 382: Logon Accounts

    Password fields, using eight to 20 characters and at least one alpha character, one numeric character, and one special character. The password is case sensitive. 3. Click Add to include the username in the Current Acces- sible Users list box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 383: Deactivate An Authorized Logon Account

    (See Chapter 1: System screen, X Strikes Blocking for information on reseting strikes and unlocking workstations.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 384: Go To Real Time Probe Reports Gui

    The Re-login window opens if the user’s session needs to be validated: Fig. 2:4-9 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the R3000 console. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 385: Real Time Probe Reports

    “x.x.x.x” is the IP address of the R3000—to only see probes he/she created. Create a Real Time Probe Click the Create tab to enter and specify criteria for the report you wish to generate: Fig.
  • Page 386 This selection generates a report with data for all URLs containing the consecutive characters you specified. In this example, if mail is entered, “http:// www.hotmail.com” and “http://loginnet.passport.com/ login.srf?id=2&svc=mail&cbid=24325&msppjph=1&tw =0&fs=1&fsa=1&fsat=1296000&lc=1033&_lang=EN” would be included in the report. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 387 A probe that is scheduled to run at a specified date and time can be scheduled to run on a daily basis by checking the “Daily” checkbox at the Recurrence field. 6. Enter the Total Run Time in Minutes. 7. Click Apply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 388: View Real Time Probe Details

    Create tab. The Start Date & Time displays in the YYYY/MM/DD HH:MM:SS format. “Daily” displays in the Recurrence column if the probe is scheduled to run on a daily basis. The Status of the probe displays: “Completed”, “In Progress”, or “Scheduled”. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 389 (Pass, Block, reserved for ER, Warn, Warned, X Strike, Quota); By Method—the method used in creating the entry (SE Keyword, URL Keyword, URL, Wild- card, Strict HTTPS, Filter Action, Pattern, File Type, Moderate HTTPS); Keyword (displays the matching , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 390 Display Name; Email Address to Mail the Completed Report; Search Option criteria; Start Date & Time; Run Time; and User ID of the creator of the probe (Created by). Click Close to close this box. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 391 Clicking Email opens the Email Address box: Fig. 2:4-15 Email Address box Enter the Email Address to Mail the Completed Report and click Send to send the completed report to the desig- nated email address. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 392: Shadow Log Format

    Log Format is selected from the navigation panel. If the R3000's reporting device is the 8e6 Enterprise Reporter (ER), this window is used for specifying the log format the R3000 will use for sending logs to the ER. Fig. 2:4-16 Shadow Log Format window , R3000 E...
  • Page 393: Specify The Shadow Log Format

    WARNING: When making a selection in this window, be sure to first identify the software versions currently being used by the R3000 and the ER. A correct selection in this window is critical, since the table structure of the ER has changed since software versions 4.0 and 3.50.
  • Page 394: Post 2.0.10 Log Format Option

    Medium and High HTTPS filtering. Post 2.0 log format option If this R3000 currently has the 2.0 or higher software update applied, the Post 2.0 log option should be selected, since the ER 4.1 or higher software update uses the new log structure.
  • Page 395: Introduction

    URL setup • creates and maintains customized library categories • uses the lookup tool to remove URLs or search engine keywords from customized libraries , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 396: Chapter 1: Group Screen

    Double-click the IP branch of the tree to open it and to display the master IP group. Double-click the master IP group to open it and to display any IP sub-groups and/or individual IP members previously set up in the tree list. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 397: Refresh

    Refresh Refresh the Master IP Group, Member Click Refresh whenever a change has been made to the master IP group or member level of the tree. Fig. 3:1-2 Group screen, IP menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 398: Master Ip Group

    Group Details, Members, Override Account, Group Profile, Exception URL, Time Profile, Upload/Download IP Profile, Add Sub Group, Add Individual IP, Delete Group, and Paste Sub Group. Fig. 3:1-3 Group screen, master IP group menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 399: Group Details Window

    1. Enter the password in the Password and Confirm Pass- word fields, using eight to 20 characters and at least one alpha character, one numeric character, and one special character. The password is case sensitive. 2. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 400: Members Window

    For the mobile mode, a member’s MAC address is used for obtaining the end user’s filtering profile. NOTE: See Appendix E: 8e6 Mobile Client for information on adding members when using the mobile mode. Fig. 3:1-5 Members window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 401: Add The Ip Address Of The Member

    Host and Max Host fields. Click Close to exit. Remove a Member from the Group To remove an entry from the Current Members list box: 1. Select the member from the list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 402: Override Account Window

    A user with an override account will be able to access categories and service ports blocked at the minimum filtering level, if the option to bypass the minimum filtering level is activated. Fig. 3:1-6 Override Account window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 403: Add An Override Account

    (See Category Profile, Redirect URL, and Filter Options in this sub-section for information on the Rule, Redirect, and Filter Options tabs.) 6. Click Apply to activate the override account. 7. Click Close to close the pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 404: Category Profile

    Category Groups tree. TIP: In the Category Groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 405 URL that has not yet been categorized: “Pass”, “Warn”, or “Block”. 4. To use the quota feature to restrict the end user’s access to a passed library group/category, do the following: , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 406 5. Click Apply to apply your settings to the override account profile. 6. Click another tab (Redirect or Filter Options) to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 407: Redirect Url

    Page”, “Authentication Request Form”, or “Custom URL”. If “Custom URL” is selected, enter the redirect URL in the corresponding text box. The user will be redirected to the designated page at this URL instead of the block page. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 408: Filter Options

    NOTE: See the X Strikes Blocking window in Chapter 1: System screen of the Global Group Section for information on setting up the X Strikes Blocking feature. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 409 URL keywords are entered in the URL Keywords window of custom library categories. With the “Extend URL Keyword Filter Control” option enabled, a URL keyword search will be extended after the "?" character in a URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 410: Edit An Override Account

    3. Click the tab in which to make modifications (Rule, Redi- rect, Filter Options). 4. Make your edits in this tab and in any other tab, if neces- sary. 5. Click Apply. 6. Click Close to close the pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 411: Delete An Override Account

    1: G ROUP DMINISTRATOR ECTION HAPTER ROUP SCREEN Delete an Override Account To delete an override account: 1. In the Current Accounts frame, select the username from the list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 412: Group Profile Window

    Fig. 3:1-10 Group Profile window, Profile tab NOTE: In order to use this tab, filtering rules profiles must already have been set up by the global administrator. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 413: Create, Edit A List Of Selected Categories

    (Pass, Allow, Warn, Block) in the row corresponding to that category group/ library category to move the check mark to that column: • Pass - URLs in this category will pass to the end user. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 414 NOTE: See the Quota Settings window in Chapter 1: System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 415: Redirect Url

    Fig. 3:1-11 Group Profile window, Redirect URL tab Create, Edit the Redirect URL 1. Specify the type of redirect URL to be used: “Default Block Page”, “Authentication Request Form”, or “Custom URL”. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 416: Filter Options

    Create, Edit the Filter Options 1. Click the checkbox(es) corresponding to the option(s) to be applied to the sub-group filtering profile: “X Strikes Blocking”, “Google/Yahoo!/Ask.com/AOL Safe Search Enforcement”, “Search Engine Keyword Filter Control”, “URL Keyword Filter Control”. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 417 Search Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled, search engine keywords can be set up to be blocked. When a user enters a keyword in the search , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 418 URLs that are not even within blocked catego- ries. For example, if all URL keywords containing “sex” are blocked, users will not be able to access a non-pornographic site such as http://www.essex.com. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 419: Exception Url Window

    Minimum Filtering Bypass Options tab. (See the Override Account window in this section for informa- tion on setting up an override account to allow a user to bypass group settings and minimum filtering level settings, if allowed.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 420: Block Url Frame

    To block the group’s access to the URL again: 1. Select the URL from the ByPass URLs list box. 2. Click Remove. Apply Settings Click Apply to apply your settings after adding or removing a URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 421: Time Profile Window

    Description of any time profiles previously set up for the entity that are currently active. Add a Time Profile To create a time profile: 1. Click Add to open the Adding Time Profile pop-up box: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 422 3. Click OK to close the pop-up box and to open the Adding Time Profile pop-up window that displays the name of this profile at the top of the Time Profile frame: Fig. 3:1-16 Time Profile window Recurrence tab , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 423 • Click Today to close this box, populating the date field with today’s date. 5. In the Recurrence pattern frame, choose the frequency this time profile will be used: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 424 If the month begins on a Thursday (for example, May 1st), the third week day would be the following Monday (May 5th in this example). , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 425 Recurrence duration time frame. Specify whether or not the time profile will be effective up to a given date: • No end date - If this selection is made, the time profile will be effective indefinitely. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 426 WARNING: If there is an error in a time profile, the Description for that time profile displays in red text. Select that time profile and click View/Modify to make any necessary corrections. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 427: Category Profile

    Fig. 3:1-17 Time Profile pop-up window, Rule tab NOTE: See the Override Account window, Category Profile sub- section in this chapter for information about entries that can be made for this component of the filtering profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 428: Redirect Url

    Fig. 3:1-18 Time Profile pop-up window, Redirect URL tab NOTE: See the Override Account window, Redirect URL sub- section in this chapter for information about entries that can be made for this component of the filtering profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 429: Filter Options

    Fig. 3:1-19 Time Profile pop-up window, Filter Options tab NOTE: See the Override Account window, Filter Options sub- section in this chapter for information about entries that can be made for this component of the filtering profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 430: Exception Url

    Minimum Filtering Bypass Options tab. (See the Override Account window in this section for informa- tion on setting up an override account to allow a user to bypass group settings and minimum filtering level settings, if allowed.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 431 2. Click Add to include the URL in the ByPass URLs list box. To block the group’s access to the URL again: 1. Select the URL from the ByPass URLs list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 432: Modify A Time Profile

    Time Profile window. Delete a Time Profile To delete a time profile: 1. Select the time profile from the Current Time Profiles list box. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 433: Upload/Download Ip Profile Window

    Upload/Download IP Profile is selected from the group menu. This window is used for uploading or downloading a text file containing filtering profiles of multiple users or sub- groups. Fig. 3:1-21 Upload/Download IP Profile window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 434: Upload Ip Profiles

    4. Click the “X” in the upper right corner of the Upload IP Profiles pop-up window to close it. 5. Click OK in the message dialog box to refresh the IP groups branch of the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 435: Download Profile

    Fig. 3:1-23 Download IP Profiles window The contents of this window can viewed, printed, and/or saved. 2. Click the “X” in the upper right corner of the window to close it. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 436: Add Sub Group

    (percent sign), "<" (less than symbol), “>” (greater than symbol), "+" (plus symbol), "-" (minus sign), "=" (equals sign). 3. Click OK to close the dialog box and to add the sub- group to the master IP group tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 437: Add Individual Ip

    "{" (left brace), "}" (right brace), "[" (left bracket), "]" (right bracket), "@" (at sign), "#" (pound sign), "$" (dollar sign), "%" (percent sign), "<" (less than symbol), “>” (greater than symbol), "+" (plus symbol), "-" (minus sign), "=" (equals sign). , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 438: Delete Group

    The minimum filtering level is established by the global administrator. Delete Group Delete a Master IP Group Profile To delete a group profile, choose Delete Group from the group menu. This action removes the master IP group from the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 439: Paste Sub Group

    Fig. 3:1-26 Paste Sub Group dialog box 2. In the Input sub group name field, enter the name of the sub-group. 3. Click OK to add the sub-group to the group tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 440: Sub Group

    Click the sub-group’s link to view a menu of sub-topics: Sub Group Details, Members, Sub Group Profile, Exception URL, Time Profile, Delete Sub Group, and Copy Sub Group. Fig. 3:1-27 Group screen, Sub Group menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 441: Sub Group (Ip Group) Window

    Group Details frame cannot be edited. The following infor- mation displays: • Sub Group Name • IP Range • Member IP address and netmask or IP address range, and MAC Address(es) if using the mobile mode. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 442: Add Ip Sub-Group Details

    2. Corresponding to the selected radio button: • enter the IP address and specify the netmask, or • enter the IP address range in the text boxes. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 443: Members Window

    If using the mobile mode, MAC address(es) can be selected for inclusion in the sub-group. NOTE: See Appendix E: 8e6 Mobile Client for information on modifying members when using the mobile mode. Fig. 3:1-30 Members window , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 444: Modify Sub-Group Members

    NOTE: See the Group Profile window in this chapter for informa- tion about entries that can be made for the following components of the filtering profile: Category Profile, Redirect URL, Filter Options. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 445: Exception Url Window

    Redirect URL, Filter Options, Exception URL. Delete Sub Group Delete an IP Sub-Group To delete a sub-group, choose Delete Sub Group from the sub-group menu. This action removes the sub-group from the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 446: Copy Sub Group

    2. Select the group from the tree and choose Paste Sub Group from the group menu to paste the sub-group to the group. (See Paste Sub Group dialog box in the Group section of this chapter.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 447: Individual Ip

    Individual IP member. Click the individual IP member’s link to view a menu of sub-topics: Members, Individual IP Profile, Exception URL, Time Profile, Delete Individual IP. Fig. 3:1-31 Group screen, Individual IP menu , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 448: Member Window

    Fig. 3:1-32 Member window Enter the IP Address of the Member In the Modify Individual Group Member frame: 1. Enter the IP address in the Member field. 2. Click Modify to apply your changes. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 449: Individual Ip Profile Window

    NOTE: See the Time Profile window in the group tree section of this chapter for information on entries that can be made for the following components of the filtering profile: Category Profile, Redirect URL, Filter Options, Exception URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 450: Delete Individual Ip

    ROUP SCREEN Delete Individual IP Delete an Individual IP Member To delete an individual IP member, choose Delete Individual IP from the individual IP member menu. This action removes the member from the tree. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 451: Chapter 2: Library Screen

    Library Lookup and Category Groups, the latter topic containing the Custom Categories sub-topic. NOTE: If the synchronization feature is used, a server set up in the Target mode will only have the Library Lookup topic available. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 452: Library Lookup

    Fig. 3:2-2 Library Lookup window NOTE: This window is also used by global administrators, except their permissions let them remove URLs and search engine keywords/phrases. The reload library function is used after making changes to the library. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 453: Look Up A Url

    3. Click OK to close the alert box and to display any results in the Result Category list box, showing the long name of the library category, followed by the URL. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 454: Look Up A Search Engine Keyword

    Search Engine Keyword or keyword phrase, up to 75 alphanumeric characters. 2. Click Lookup to display results in the Result Category list box, showing the long name of all categories that contain the search engine keyword/phrase. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 455: Custom Categories

    Maintaining the list of URLs and keywords is the responsibility of the global or group administrator. WARNING: The maximum number of categories that can be saved is 250. This figure includes both 8e6 supplied categories and custom categories. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 456: Add Category

    Upon saving this entry, the long name displays in the tree list. For group administrators adding a new custom category, the group name displays in paren- theses after the long name. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 457: Refresh

    NOTE: The category must have URLs, URL keywords, and/or search keywords added to its profile in order for it to be effective. Refresh Refresh the Library Click Refresh after uploading a file to a customized library category. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 458: Custom Library Category

    Fig. 3:2-5 Library screen, custom library category menu NOTE: Since custom categories are not created by 8e6, updates cannot be provided. Maintaining the list of URLs and keywords is the responsibility of the global or group administrator. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 459: Library Details Window

    Group Name and library category Short Name. 1. The long Description name displays and can be edited. 2. After modifying the description for the library category, click Apply to save your entry. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 460: Urls Window

    URLs ending in “.playboy.com”. A URL is used in a filtering profile for blocking a user’s access to a specified site or service. Fig. 3:2-7 URLs window, Action tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 461: View A List Of Urls In The Library Category

    2. Make a selection from the pull-down menu for “Master List”, or “Wild Card Master List”. 3. Click View List to display the specified items in the Select List list box: Fig. 3:2-8 URLs window, View tab , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 462: Add Or Remove Urls Or Wildcard Urls

    Ctrl key on your keyboard. Blocks of URLs can be selected by clicking the first URL, and then pressing the Shift key on your keyboard while clicking the last URL. 4. Click Apply Action. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 463: Add A Wildcard Url To The Library Category

    *.cnn.com is added to a category set up to be blocked, the end user will be able to access http://www.cnn.com since it is a direct match, but will not be able to access http://www.sports.cnn.com, since direct URL entries take precedence over wildcard entries. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 464: Remove A Url From The Library Category

    Card URL List frame, as pertinent. 3. Click Remove to display the associated URLs in the list box below. 4. Select the URL(s) that you wish to remove from the cate- gory. 5. Click Apply Action. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 465: Upload A Master List To The Library

    TIP: A URL text file must contain one URL per line. WARNING: The text file uploaded to the server will overwrite the current file. NOTE: Before the file is uploaded to the server, it will first be vali- dated , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 466 Go to the IP Lookup Options section and click the radio button corresponding to the option to be used when uploading the file: • “Upload the file with IP Lookup” - If this option is , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 467: Upload A Master List Of Wildcard Urls

    1. Click Upload Wildcard Master to open the Upload Custom Library WildCard URL pop-up window: Fig. 3:2-11 Upload Custom Library WildCard URL window 2. Click Browse to open the Choose file pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 468 5. If the file contains invalid wildcard URLs, click Back to return to the Upload WildCard URL window. Another attempt to validate the file can be made after corrections have been made to the file. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 469: Reload The Library

    After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
  • Page 470: Url Keywords Window

    URL keywords can be added in this window but URL keyword filtering will not be in effect for the user(s). (See the Filter Options tab in the Group screen section for information about enabling URL keyword filtering.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 471: View A List Of Url Keywords

    1. Enter the Keyword in the Edit Keyword List frame. 2. Click Add. Remove a URL Keyword from the Library To remove a URL keyword from the library category: 1. Enter the Keyword. 2. Click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 472: Upload A List Of Url Keywords To The Library

    After all changes have been made to library windows, in the Reload URL Keywords frame, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
  • Page 473: Search Engine Keywords Window

    (See the Filter Options tab in the Group screen section for information about enabling search engine keyword filtering.) , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 474: View A List Of Search Engine Keywords

    To add a search engine keyword or keyword phrase to the library category: 1. In the Edit Search Keyword List frame, enter up to 75 alphanumeric characters in the Keyword field. 2. Click Add. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 475: Remove A Search Engine Keyword

    After all changes have been made to library windows, in the Reload Search Keywords frame, click Reload to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the R3000, 8e6 recommends clicking Reload only after modifications to all library windows have been made.
  • Page 476: Delete Category

    IBRARY SCREEN Delete Category Delete a Custom Category To delete a custom library category, choose Delete Cate- gory from the menu. This action removes the library cate- gory from the Custom Categories list. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 477: Technical Support

    ECHNICAL UPPORT RODUCT ARRANTIES Technical Support For technical support, visit 8e6 Technologies’s Technical Support Web page at http://www.8e6.com/support.html, or contact us by phone, by email, or in writing. Hours Regular office hours are from Monday through Friday, 8 a.m. to 5 p.m. PST.
  • Page 478: Office Locations And Phone Numbers

    Orange, CA 92865-4232 Local 714.282.6111 714.282.6116 Domestic US 1.888.786.7999 International +1.714.282.6111 8e6 Taiwan 7 Fl., No. 1, Sec. 2, Ren-Ai Rd. Taipei 10055 Taiwan, R.O.C. Taipei Local 2397-0300 2397-0306 Domestic Taiwan : 02-2397-0300 International 886-2-2397-0300 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 479: Support Procedures

    • Your trouble ticket will not be closed until your permission is confirmed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 480: Product Warranties

    ARRANTIES Product Warranties Standard Warranty 8e6 Technologies warrants the medium on which the 8e6 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “Warranty Period”) from the date of delivery. This standard Warranty Period applies to both new and refurbished equip- ment for a period of one year from the delivery date.
  • Page 481: Technical Support And Service

    RODUCT ARRANTIES Technical Support and Service 8e6 Technologies will provide initial installation support and technical support for up to 90 days following installation. 8e6 Technologies provides after-hour emergency support to 8e6 server customers. An after hours technician can be reached by voice line.
  • Page 482: Extended Warranty (Optional)

    If parts are discontinued from production during the Warranty Period, immediate replacement product(s) or hardware parts will be available for exchange with defective parts from 8e6 Technologies’ local reseller or distributor. Extended Technical Support and Service Extended technical support is available to customers under a Technical Support Agreement.
  • Page 483: A Ppendices S Ection

    5. Filter Options (optional). For IP profiles, the code 0x1 should be placed at the end with all filter options disabled. 6. Quotas (optional). NOTE: Each filtering profile should be entered on a separate line in the file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 484: Port Numbers

    FTP (File Transfer Protocol) 80 = HTTP (Hyper Text Transfer Protocol) 119 = NNTP (Network News Transfer Protocol) 443 = HTTPS (Secured HTTP Transmission) Other • Filter Mode Values: Default, Block Mode Monitoring Mode Bypassing Mode , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 485: Category Codes

    NOTE: The list of library category codes and corresponding descriptions is subject to change due to the addition of new cate- gories and modification of current categories. For explanations and examples of category items, go to http://www.8e6.com/ database-categories.html , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 486: Filter Option Codes

    ( : ), the number of quota minutes, and a comma between each quota. For example: ;10, EMPL:30, FINAN:30, GENBUS:30, TRADING:30, ESTATE:30 NOTES: See http://www.8e6.com/r3000help/files/ 2group_ipprofiles.html for examples of filtering profile entries. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 487: Appendix B

    Your R3000 receives 8e6 supplied library category updates and software updates via Traveler, 8e6’s executable program for updating the R3000 server. You can run Trav- eler on demand via the Manual Update to 8e6 Supplied Categories window, or schedule Traveler to launch at a specified time via the Configuration window.
  • Page 488: General Activity

    • Create tmp file. • getpid(). • Write pid to tmp file. • Traveler failed to create the tmp file: <ServerConstants.TRAVELER_TEMP> • Temp file deleted. • Fail to rename <szFileUrlTemp> to final <szFileUrl> , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 489: Library Download Process

    • File does not exist on the update server. • Login error. • Could not write history file! (exception) • Could not read emergency date from: <emergency update file>. • Failed to download <filename> (Exception) • Finished updating libraries! , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 490: Customer Feedback Module Option

    • PrintstackTrace - Fail to back up file for <FileUrl> • PrintStackTrace - <java error message> • PrintstackTrace - Fail to back up file for <category>.sew • PrintstackTrace - Fail to copy file for merging , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 491: Error Messages

    • Reloading library encounters an exception • Send alert encountered an exception • Traveler exits after reaching time limit: <time limit> mins • Log file could not be set. (Exception) • List could not be read from file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 492: Weekly Update (7 Days Library)

    • Was not a primary language deletion file. • Failed to sort the library files. • Failed to merge files for <category> • File is the most current version. • Successfully updated. • Checksum verification failed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 493: Full Url Library Update (Urls, Url Keywords)

    • Failed to download <pattern> • IM and P2P Update has successfully completed. Newsgroup Library Update (News) • Download newsgroup: • Successfully downloaded newslist • Failed to download newslist • Newsgroup Library Update has successfully completed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 494: Search Engine Keywords Library Update

    • Successfully processed <patch> • Failed to download <patch> • Patch Update has completed. Emergency Update • Emergency update: • Could not read emergency date from: <emergency update file>. • Emergency Update has completed. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 495: Appendix C

    Block page, not the Options page. Part I: Modify the R3000 1. Enable block page redirection Select either of the following options to modify the R3000. Option 1 lets you modify the back end, and Option 2 lets you modify the R3000 console.
  • Page 496: Option 2: Modify The R3000 Console

    (e.g. “_”), if such characters are used in the URL a modified name must be used instead for the <blockpage>. As a result, the R3000 will redirect the block page to the customized one with the following link format: http://<server for block_page>[:<port for block page>]/ <blockpage>?URL=<blocked url>&IP=<client...
  • Page 497: Part Ii: Customize The Block

    Blocked URL: From the query string of the block page URL IP that accessed the blocked URL: (see URL) Category of the blocked URL: (see URL) USER User Name that accessed the blocked URL: (see URL) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 498: Implement The "Further Option" (Optional)

    3. CGI written in C See the Reference portion of this appendix for coding details. NOTE: Don’t forget to replace <R3000 IP> with the real IP in the HTML/CGI before using these samples. Part III: Restart the R3000 You must restart the R3000 to make your changes effective.
  • Page 499: Reference

    PPENDICES ECTION PPENDIX Reference HTML <!-- Description: Sample HTML for R3000 customized block page --> <!-- Replace <R3000 IP> with real IP before using --> <!-- Revision: 1 --> <!-- Date: 03/08/2004 --> <html> <head> <script language=javascript> function parseData(str, start, end) result = "";...
  • Page 500 <input type=hidden name="URL" value=""> <input type=hidden name="IP" value=""> <input type=hidden name="CAT" value=""> <input type=hidden name="USER" value=""> <input type=hidden name="STEP" value="STEP2"> </form> <br>R3000 Customized Block Page (HTML using Java Script to parse and post form data)<br> <script language=javascript> getData(); showData(); </script>...
  • Page 501: Cgi Written In Perl

    # File Type: # Description: Sample Perl script for R3000 customized block page # Replace the <R3000 IP> with the real IP before using. # This script provide data to the options CGI through query string # Revision: # Date: 03/08/2004 $method = $ENV{'REQUEST_METHOD'};...
  • Page 502: Use Java Script To Post Form Data

    # File Type: # Description: Sample Perl script for R3000 customized block page # Replace the <R3000 IP> with the real IP before using. # This script uses Java Script to post form data to # options CGI # Revision: # Date: 03/08/2004 $method = $ENV{'REQUEST_METHOD'};...
  • Page 503 "<input type=hidden name=\"URL\" value=\"$url\">\n"; print "<input type=hidden name=\"CAT\" value=\"$cat\">\n"; print "<input type=hidden name=\"USER\" value=\"$user\">\n"; print "<input type=hidden name=\"STEP\" value=\"STEP2\">\n"; print "<br>R3000 Customized Block Page (CGI written with Perl using Java Script to post form data)<br>\n"; print "URL: $url<br>\n"; print "IP: $ip<br>\n";...
  • Page 504: Cgi Written In C

    PPENDIX CGI written in C * cusc_block.c * Description: sample C source code of CGI for customized block page * Replace <R3000 IP> with real IP and recompile before using * Revision: 1 * Date: 03/08/2004 #include <stdio.h> struct { char *name;...
  • Page 505 (strcmp(entries[index].name, "IP") == 0) strcpy(szIP, entries[index].val); else if (strcmp(entries[index].name, "URL") == 0) strcpy(szURL, entries[index].val); else if (strcmp(entries[index].name, "CAT") == 0) strcpy(szCategory, entries[index].val); else if (strcmp(entries[index].name, "USER") == 0) strcpy(szUserName, entries[index].val); printhtml(); void printhtml() , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 506 Customized Block Page (CGI written with C using Java Script to post form data)<br>\n"); printf("URL: %s<br>\n", szURL); printf("IP: %s<br>\n", szIP); printf("CAT: %s<br>\n", szCategory); printf("USER: %s<br>\n", szUserName);...
  • Page 507 = '\0'; if(line[x]) ++x; y=0; while(line[y++] = line[x++]); return word; void plustospace(char *str) register int x; for(x=0;str[x];x++) if(str[x] == '+') str[x] = ' '; char *fmakeword(FILE *f, char stop, int *cl) int wsize; , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 508 * Change the string to upper case int to_upper(char *string) int len; int i; char *tmp=NULL; if (string && strlen(string)) if (!(tmp=(char*)strdup(string))) return 0; len=strlen(string); for (i=0; i<len; i++) string[i]=toupper(tmp[i]); free(tmp); return 1; , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 509 PPENDICES ECTION PPENDIX void getquery(char *paramd, char **paramv) if (paramd == NULL) *paramv = NULL; else *paramv = (char *)strtok(paramd, "&"); void getnextquery(char **paramv) *paramv = (char *)strtok(NULL, "&"); , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 510: Appendix D

    This appendix provides instructions on how to use an over- ride account if typical pop-up blocking software is installed, as in the following products: Yahoo! Toolbar, Google Toolbar, AdwareSafe, Mozilla Firefox, and Windows XP Service Pack 2 (SP2). , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 511: Yahoo! Toolbar Pop-Up Blocker

    1. Go to the Yahoo! Toolbar and click the pop-up icon to open the pop-up menu: Fig. D-2 Select menu option Always Allow Pop-Ups From 2. Choose Always Allow Pop-Ups From to open the Yahoo! Pop-Up Blocker dialog box: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 512 Pop-Ups list box to activate the Allow button. 4. Click Allow to move the selected source to the Always Allow Pop-Ups From These Sources list box. 5. Click Close to save your changes and to close the dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 513: Google Toolbar Pop-Up Blocker

    # blocked icon: Fig. D-4 # blocked icon enabled Clicking this icon toggles to the Site pop-ups allowed icon, adding the override account window to your white list: Fig. D-5 Site pop-ups allowed icon enabled , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 514: Adwaresafe Pop-Up Blocker

    3. Click the Override button to open the override account pop-up window. 4. Go back to the SearchSafe toolbar and click the icon for Popup protection off to toggle back to # popups blocked. This action turns on pop-up blocking again. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 515: Mozilla Firefox Pop-Up Blocker

    3. With the “Block unrequested popup windows” checkbox checked, click Allowed Sites and enter the URL to allow the override account window to pass. 4. Click OK to save your changes and to close the dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 516: Windows Xp Sp2 Pop-Up Blocker

    Internet Options to open the Internet Options dialog box. 2. Click the Privacy tab: Fig. D-7 Enable pop-up blocking 3. In the Pop-up Blocker frame, check “Block pop-ups”. 4. Click Apply and then click OK to close the dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 517: Use The Ie Toolbar

    1. In the Options page (see Fig. D-1), enter your Username and Password. 2. Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button—this action opens the override account pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 518: Add Override Account To The White List

    3. In the Options page (see Fig. D-1), enter your Username and Password. 4. Click the Override button to open the override account pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 519: Use The Information Bar

    2. Click the Override button. This action displays the following message in the Information Bar: “Pop-up blocked. To see this pop-up or additional options click here...”: Fig. D-10 Information Bar showing blocked pop-up status , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 520 NOTE: To view your white list, go to the Pop-up Blocker Settings dialog box (see Fig. D-9) and see the entries in the Allowed sites list box. 6. Go back to the Options page and click Override to open the override account window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 521: Appendix E

    8e6 Mobile Client ensures Internet activity of all end users located outside the organization will be tracked and filtered in the same manner as end users on the R3000 filtering appliance used in house, thereby giving you, the administrator, assurance that your organization will be...
  • Page 522: Environment Requirements

    IE 6.0 or higher • JavaScript enabled • Pop-up blocking software, if installed, must be disabled Network Requirement • High speed connection from the external mobile R3000 server to mobile PCs Remote Filtering Components • Mobile Client software installed on each end user’s mobile PC •...
  • Page 523: Work Flow Overview

    Mobile Client Installed on a Mobile PC For mobile PCs located outside of the organization: • a mobile R3000 filtering appliance set in the mobile mode is used for obtaining the end user’s profile and for logging his/her Internet activity •...
  • Page 524: Network Operations Overview

    R3000 filtering appliance and an 8e6 ER (Enter- prise Reporter) reporting appliance on the network: Fig. E:1-2 Diagram showing 8e6 Mobile Client with R3000 and ER 8e6 Mobile Client 1. A URL request is made from an end user’s mobile PC to access inappropriate content on the Internet.
  • Page 525: Enterprise Reporter

    URL is found and the site is disallowed, the Mobile Client software blocks the connection to the Web server. Enterprise Reporter A. The mobile R3000 appliance sends logs to the local Enterprise Reporter (ER) for processing. B. Using the ER Web Client, an administrator can generate customized reports on the remote end user in minutes.
  • Page 526: Mobile Server Section

    IP address on your network. NOTE: If you do not have the R3000 Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you. The basic requirements for initial network setup are as follows: •...
  • Page 527: Configure The R3000 To Use The Mobile Mode

    Configure the R3000 to use the Mobile Mode The Operation Mode window is used for setting up the external mobile R3000 to use the mobile mode for filtering mobile PCs. 1. In the Mode frame, select “Mobile” to display frames used for configuring the R3000 in the mobile mode: Fig.
  • Page 528 If his/her profile does not contain blocked categories but instead contains categories with Warn settings, the global group profile will be assigned instead.) 5. Click Apply to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 529: Add Mac Addresses To The Master Ip Group

    Current Members list box. NOTES: Follow steps 2-3 for each MAC address to be added. To remove a member from the Current Members list box, select the MAC address from the list box, and then click Remove. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 530: Select Mac Addresses For A Sub Group

    • To add MAC addresses to the sub-group, select each sub-group by highlighting it in the Available MAC(s) list box, and then clicking the left arrow to move the item(s) to the Member MAC(s) list box. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 531 MAC address, and then pressing the Shift key on your keyboard while clicking the last MAC address, and then clicking the arrow key pointing to that list box. 2. Click Modify to apply your settings. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 532: View Sub Group Mac Addresses

    MAC addresses display in the Member MAC(s) list box in the MAC Address frame. If the sub-group has been completely defined, IP address criteria was entered in the IP Address frame and saved in this window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 533: Add A Mac Address To An Individual Member

    Fig. E:2-5 Member window with MAC Address 1. In the Modify Individual Group Member frame, select the member’s MAC Address from the pull-down menu. 2. Click Modify to apply your changes. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 534: Upload Mac Address File For Ip Group

    IP group’s profile file: tlind,150.100.30.2,A,J CHAT R GPORN M I,1, ,0x103 tlind, 00:04:21:AF:33:E1,A,J CHAT R GPORN M I,1, ,0x103 , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 535: Troubleshoot Mac Addresses

    "target" R3000 servers, to verify whether settings for user profiles match the ones synced over from the "source" R3000 server. Fig. E:2-7 Active Profile Lookup window with MAC Address NOTE: See Active Profile Lookup window in Chapter 1: System screen from the Global Administrator Section for information on using the Active Profile Lookup window.
  • Page 536: Mobile Client Section

    Mobile Client. NOTE: The 8e6 Mobile Macintosh Deployment Kit should be used in a “Macintosh only” environment. The unconfigured 8e6clientInstaller.mpkg.tar package in this kit contains Mobile Client software for Macintosh OS X. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 537: Download And Install The Deployment Kit

    Download and Install the Deployment Kit To download the 8e6 Mobile Client Windows Deployment Kit to your machine: 1. Insert the CD-ROM that was sent with your R3000 server into your machine. 2. Open the 8e6MobileClient folder and find the .msi file for the 8e6 Mobile Client application.
  • Page 538 6. Specify the destination folder to be used, and then click Next to go to the page that confirms the installation process is ready to begin: Fig. E:3-3 Installation process ready to begin , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 539 7. Click Next to begin the installation process: Fig. E:3-4 Installation process in progress The following page displays when the installation process is complete: Fig. E:3-5 Installation complete 8. Click Finish to close the wizard dialog box. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 540: Access The Mobile Client Configuration Editor

    To begin using the Configuration Editor, consult the help topics at Start > Programs > 8e6 Mobile Client Deploy- ment Kit > Online Help, or via the Help link in the Configu- ration Editor. Or, refer to the instructions in this appendix. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 541: Select The Package: Windows Or Macintosh Os X

    Mobile Server cannot be found checkboxes.”—the latter which is populated with a check mark. For Windows, the “Force auto-reboot even if user is logged in during instal- lation.” checkbox also is activated. This checkbox displays greyed-out for Macintosh packages. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 542 PPENDICES ECTION PPENDIX Fig. E:3-8 Windows package opened Fig. E:3-9 Macintosh package opened , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 543: Configure The Mobile Client For Deployment

    4. Click Add to include the entry in the list box below. 5. After entering each mobile R3000, click OK to close the dialog box and to display your entries in the Mobile filter host(s) field of the 8e6 Mobile Client Configuration Editor.
  • Page 544: Add, Remove Internal R3000

    R3000 is using a different port. 4. Click Add to include the entry in the list box below. 5. After entering each internal R3000, click OK to close the dialog box and to display your entries in the Internal filter host(s) field of the 8e6 Mobile Client Configuration Editor.
  • Page 545: Add Proxy Address Or Host Name

    Click the “Proxy authentication required” checkbox; this action activates the Username and Password fields. b. Enter the proxy server Username. c. Enter the proxy server Password twice: , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 546: Option: Block All Urls If Filter Cannot Be Found

    The “Block all URLs if filter cannot be found” checkbox is checked by default. This setting indicates that if the Mobile Client cannot detect the mobile R3000, all URLs requested by the end user will be blocked. Uncheck this box if the end user’s workstation should be permitted unrestricted Internet access when the mobile R3000 is unavailable.
  • Page 547: Windows Option: Force Reboot With User Logged In

    NOTE: The forced reboot option does not provide the end user with an opportunity to save files and close applications. Save settings Select File > Save as... and choose a filename, or select “8e6client.msi” or “8e6clientInstaller.mpkg.tar” to overwrite the original file. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 548: Mobile Client Deployment To Windows Computers

    Right-click the new package and choose Properties > Deployment, and then check the "Uninstall this appli- cation when it falls out of the scope of management" box. Click OK. f. Close the Group Policy Object Editor. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 549 To create a WMI filter: WMI filters are capable of applying very sophisticated selection criteria to set the scope of a policy. See Microsoft Knowledgebase article #555253 for details on creating WMI filters: http://support.microsoft.com/kb/ 555253 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 550 NOTE: In some cases involving Windows XP workstations, it may be necessary to reboot twice for Group Policy processing to occur. c. Verify the Mobile Client is blocking access to unautho- rized Web sites, and is allowing access to other sites. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 551: Installation On A Single Computer

    Fig. E:3-15 Finish installation process 2. To complete the installation process now, save any appli- cations—if necessary, and then click Yes to shut down and restart the computer. Or, click No to complete the installation process later. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 552: Mobile Client Removal From Computers

    1. On the Windows workstation that needs to have the Mobile Client removed, go to the taskbar and do the following, based on the type of Windows operating system: • Windows Vista: Start icon > Control Panel > Programs: Uninstall a program , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 553 3. Click UNINSTALL to close the Uninstall 8e6 Mobile Client dialog box, and to open the Uninstall dialog box: Fig. E:3-17 Second Uninstall dialog box 4. Copy the eight-digit number displayed in the ID field. In this example: 23526528 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 554 6. Click the Generate button to display the generated six- character Uninstall key: Fig. E:3-19 Generate a key Copy this Uninstall key. In this example: 0d72dd NOTE: Click Close to close the Create Uninstall Key pop-up window. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 555 8. Click OK to begin the uninstallation process. When the Mobile Client has been uninstalled, a message displays asking you to restart the machine: Fig. E:3-21 Restart message 9. Click Restart to restart the machine. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 556: Appendix F

    PPENDIX Appendix F Configuring the R3000 for ER Reporting When configuring the R3000 to be used with an ER unit, the following procedures must be completed in order for the ER to receive logs from the R3000. Entries in the R3000 Administrator console 1.
  • Page 557 Remove. 4. After the ER has been configured, and logs have been transferred from the R3000 to the ER, click the Log tab to view transfer activity. 5. On the Log tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
  • Page 558: Entries In The Er Administrator Console

    IMPORTING: shadow.log.machine1. Once you see an entry, reporting information will be available one hour after the timestamp of the import listing. NOTE: Transfers occur each hour. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 559: Appendix G

    PPENDIX Appendix G RAID Maintenance This appendix pertains to R3000 “H”, “SL”, and “HL” servers and is divided into three parts: Hardware Components, Server Interface, and Troubleshooting—in the event of a failure in one of the drives, power supplies, or fans.
  • Page 560: Part 2: Server Interface

    • FLTR = Filtering Status • LIBR = Library Update Status • RAID = Hard Drive Status • UPDT = Software Update Status , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 561 Library updated more than three days ago RAID Green RAID mode enabled and running RAID mode is inactive Hard drive fault or failure UPDT Amber Software update detected No software update detected , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 562: Front Control Panels On H, Sl, And Hl Units

    (see also Rear of chassis). These indicators are used for easy location of the chassis in a large stack config- uration. The LED remains on until the button is pressed a second time. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 563 When the power button is pressed again, the main power to the server is removed but standby power is still supplied to the server. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 564: Rear Panels On H And Hl Units

    An LED indi- cator is located above each of the power plugs. (See Power supply failure in the Troubleshooting sub-section for infor- mation on detecting a power supply failure and resolving this problem.) , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 565: Part 3: Troubleshooting

    Verification of the failed drive should first be made in the Administrator console before proceeding, as data on the server will be lost in the event that the wrong drive is removed from the unit. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 566: Step 2: Verify The Failed Drive In The Admin Console

    However, if a hard drive has failed, the message “FAIL” displays to the right of the hard drive number. Before taking any action in this window, proceed to Step 3. , R3000 E ECHNOLOGIES NTERPRISE ILTER...
  • Page 567: Step 3: Replace The Failed Hard Drive

    Replace the failed drive with your spare replacement drive. NOTE: Contact Technical Support if you have any questions about replacing a failed hard drive. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 568: Step 4: Rebuild The Hard Drive

    Removing the wrong power supply will cause the system to crash. Step 2: Unplug the power cord To prevent electrical shock to yourself and damage to the unit, unplug the power cord from the failed power supply. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 569: Step 3: Replace The Failed Power Supply

    Step 4: Contact Technical Support Contact Technical Support to order a new replacement power supply and for instructions on returning your failed power supply to 8e6. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 570: Fan Failure

    Check the routing of the cables and make sure all fans are present and operating normally. The LED will remain steady as long as the over- heating condition exists. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 571: Appendix H

    - An R3000 set up in the firewall mode will filter all requests. If the request is appropriate, the original packet will pass unchanged. If the request is inappropriate, the original packet will be blocked from being routed through.
  • Page 572 IM services specified in the library category. invisible mode - An R3000 set up in the invisible mode will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment.
  • Page 573 (global) filtering profile is used, and the minimum filtering level does not apply to that user. mobile mode - The operations mode used on an R3000 configured for filtering end users on machines located outside of the in-house network.
  • Page 574 Using this feature of the R3000, groups and/or individual client machines can be set up to block the use of P2P services specified in the library category.
  • Page 575 The user profile in the Radius accounting server holds the filter definition for the user. Real Time Probe - On the R3000, this tool is used for moni- toring the Internet activity of specified users in real time. The report generated by the probe lets the administrator know whether end users are using the Internet appropriately.
  • Page 576 Traveler - 8e6’s executable program that downloads updates to your R3000 on demand or at a scheduled time. URL - An abbreviation for Uniform Resource Locator, the global address of Web pages and other resources on the Internet.
  • Page 577 URL from that library category or an uncategorized URL is requested. white list - A list of approved library categories for a speci- fied entity’s filtering profile. , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 578 PPENDICES ECTION PPENDIX , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 579 Authentication menu 174 backup procedures 180 Backup/Restore menu 179 Backup/Restore window 179 block page 12 custom 471 route table 98 Block Page Authentication window 79 Block Page Customization window 219 Block Page Device 168 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 580 Ctrl key 66 Current memory usage diagnostic tool 117 custom categories 24 delete 452 menu 434 Custom Categories menu 431 custom category definition 547 Customer Feedback Module menu 321 Customer Feedback Module window 321 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 581 278 static profiles 21 URL keyword 279 Firefox 10 firewall mode 15 definition 547 diagram with filtering and cache setup 16 diagram with firewall and cache setup 15 frame, terminology 5 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 582 IP 18 types of 17 group administrator 1 definition 548 Group Details window 375 group name, definition 548 Group Profile window 388 Group screen 55 Hardware Failure Detection window 194 Help screen 56 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 583 IP group 18 category profile 388 create 298 diagram 18 Java Plug-in 10 Java Virtual Machine 10 JavaScript 10 keyword definition 548 search engine, 8e6 supplied category 342 search engine, custom category 449 update 305 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 584 Library screen 55 Library Update Log window 309 list box, terminology 5 Listening Device 168 Local Patch window 139 lock page 199 Lock Page Customization window 216 lock profile 20 profile type 22 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 585 186 emergency patch update 315 ER 532 library update 309 library update message 463 patch updates 144 R3000 log transfer 348 realtime traffic, usage 120 log off Administrator GUI 68 log on Administrator GUI 50 Logon Management window 108...
  • Page 586 NNTP Newsgroup window 328 NTP Servers window 94 open setting 26 definition 550 Operation Mode window 167 mobile mode 503 Options page 84 override account 378 AdwareSafe popup blocking 490 block page authentication 80 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 587 486 pop-up box/window, terminology 6 port profile global 274 minimum filtering level 293 Print Kernel Ring Buffer diagnostic tool 118 Process list diagnostic tool 115 Product Warranties section 456 profile , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 588 Quota Notice Page Customization window 233 Quota Setting menu 243 Quota Setting window 243 R2000 1 R3000 Enterprise Filter 1 R3000 Quick Start Guide 502 radio button, terminology 6 Radius definition 551 Radius Authentication Settings menu 188 Radius Authentication Settings window 188...
  • Page 589 Safari 10 screen, terminology 6 search engine definition 551 search engine keyword 8e6 supplied category 342 custom category 449 Search Engine Keyword Filter Control global group filter option 278 search engine keyword filtering 278 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 590 IP group 412 copy 422 definition 552 delete 421 paste 415 sub-topic 61 terminology 7 synchronization 150 backup procedures 47 definition 552 delays 41 overview 36 server maintenance 47 setup 38 Setup window 152 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 591 TOP CPU processes diagnostic tool 116 topic 60 terminology 7 Trace Route 115 Traveler 2 definition 552 tree 62 terminology 8 Troubleshooting Mode window 122 update add patch to server 139 emergency patches 315 library categories 309 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 592 26 definition 553 Web access logging 30 Web-based authentication block page authentication 80 white list definition 553 wildcard 318 window, terminology 8 Windows 2000 498 Windows XP 498 workstation requirements 10 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 593 NDEX X Strikes Blocking global group filter option 277 X Strikes Blocking window 196 , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...
  • Page 594 NDEX , R3000 E ECHNOLOGIES NTERPRISE ILTER UIDE...

Table of Contents