Sign In
Upload
Manuals
Brands
M86 Security Manuals
Firewall
M86 Web Filter
M86 Security M86 Web Filter Manuals
Manuals and User Guides for M86 Security M86 Web Filter. We have
2
M86 Security M86 Web Filter manuals available for free PDF download: User Manual
M86 Security M86 Web Filter User Manual (556 pages)
Brand:
M86 Security
| Category:
Firewall
| Size: 8.37 MB
Table of Contents
User Guide
1
Table of Contents
3
Introductory Section
23
Web Filter
23
About this User Guide
23
How to Use this User Guide
25
Conventions
25
Terminology
26
Overview
31
Environment Requirements
32
Administrator
32
Workstation Requirements
32
End User
33
Network Requirements
33
Chapter 1: Filtering Operations
34
Operational Modes
34
Invisible Mode
35
Router Mode
37
Firewall Mode
38
Group Types
40
Global Group
40
IP Groups
41
Filtering Profile Types
42
Individual IP Member Filtering Profile
44
IP Sub-Group Filtering Profile
44
Master IP Group Filtering Profile
44
Static Filtering Profiles
44
Active Filtering Profiles
45
Global Filtering Profile
45
Lock Profile
45
Override Account Profile
45
Time Profile
45
Filtering Profile Components
46
Custom Categories
47
Library Categories
47
M86 Supplied Categories
47
Minimum Filtering Level
48
Rules
48
Service Ports
48
Filter Settings
49
Filtering Rules
50
Filtering Levels Applied
50
Chapter 2: Logging and Blocking
53
Web Access Logging
53
Instant Messaging, Peer-To-Peer Blocking
53
How IM and P2P Blocking Works
53
IM Blocking
53
P2P Blocking
54
Setting up IM and P2P
55
Using IM and P2P
55
Block IM for All Users
56
Block IM, P2P for All Users
56
Block P2P for All Users
56
Block IM for a Specific Entity
57
Block P2P for a Specific Entity
57
Block Specified Entities from Using IM, P2P
57
Chapter 3: Synchronizing Multiple Units
58
Web Filter Synchronization
58
Source Mode
59
Synchronization Setup
60
Setting up a Source Server
60
Setting up a Target Server
60
Types of Synchronization Processes
61
Filtering Profile Synchronization Process
61
Library Synchronization Process
62
Delays in Synchronization
63
Synchronized, Non-Synchronized Items
64
Functionally Synchronized Items
65
Synchronize All Items
65
Synchronized Items (All)
65
Non-Synchronized Items
66
Functionally Synchronized Items
67
Non-Synchronized Items
67
Synchronize Only Library Items
67
Synchronized Items (Library Only)
67
Server Maintenance Procedures
69
Establish Backup Procedures
69
Source Server Failure Scenarios
69
Set up a Target Server as a Source Server
70
Use a Backup File to Set up a Source Server
70
Set up a New Source Server from Scratch
71
Set up a Replacement Target Server
71
Set up a Target Server as a Source Server
71
Chapter 4: Getting Started
72
Initial Setup
72
Access the Administrator Console
72
Log on
72
Last Library Update Message
74
Access Main Sections
76
Navigation Tips
76
Access Help Topics
78
Help Features
78
Tooltips
79
Screen and Window Navigation
81
Topic Links
81
Select Sub-Topics
82
Navigate a Tree List
83
Tree List Topics and Sub-Topics
84
Navigate a Window with Tabs
85
Console Tips and Shortcuts
86
Navigation Path
86
Refresh the Console
86
Copy and Paste Text
87
Select Multiple Items
87
Calculate IP Ranges Without Overlaps
88
Re-Size the User Interface
89
Log off
90
Global Administrator Section
91
Introduction
91
Chapter 1: System Screen
92
Control
94
Filter Window
94
Disable Local Filtering Options
95
Local Filtering
95
Disable HTTP Packet Splitting Detection
96
Enable HTTP Packet Splitting Detection
96
Enable Local Filtering Options
96
HTTP Filtering
96
HTTPS Filtering
97
Enable Pattern Blocking
98
Service Control
98
Disable Filtering on Target Servers
99
Disable Pattern Blocking
99
Enable Filtering on Target Servers
99
Target(S) Filtering
99
Block Page Authentication Window
100
Enter, Edit Block Page Options
101
Block Page
102
Options Page
104
Option 2
105
Option 3
106
Shut down the Server
107
Shutdown Window
107
Reboot the Server
108
Reboot Window
108
LAN Settings Window
110
Network
110
Specify LAN Settings
111
NTP Servers Window
112
Add an NTP Server
113
Remove an NTP Server
113
Specify Network Time Protocol Servers
113
Regional Setting Window
114
Specify the Time Zone, Language Set
114
Block Page Route Table Window
115
Add a Router
116
Remove a Router
116
Administrator
117
Administrator Window
117
Add an Administrator Account
118
View Administrator Accounts
118
Delete an Administrator Account
119
Edit an Administrator Account
119
Logon Settings Window
120
Secure Logon
120
Enable, Disable Password Expiration
121
Enable, Disable Account Lockout
122
Logon Management
124
View Account Status
125
View User Account Status, Unlock Username
125
Unlock a Username
126
Unlock an IP Address
126
View Locked IP Address, Unlock IP Address
126
View Locked Ips
126
View Admin, Sub Admin User Interface Access
127
Diagnostics
128
System Command Window
128
Perform a Diagnostic Test, View Data
129
Command Selections
130
Ping
130
Process List
130
Trace Route
130
Active Connections
131
NIC Configuration
131
Routing Table
131
TOP CPU Processes
131
CPU Usage
132
Current Memory Usage
132
Recent Logins
132
System Performance
132
Df(Disk Usage)
133
Dmesg(Print Kernel Ring Buffer)
133
System Uptime
133
View Log File Window
134
View Log Results
134
Troubleshooting Mode Window
136
Use the Troubleshooting Mode
137
Active Profile Lookup Window
138
Verify Whether a Profile Is Active
139
Admin Audit Trail
142
Admin Audit Trail Window
142
FTP the Log on Demand
143
Specify FTP Criteria
143
View
144
View the Log of Administrator Changes
144
Alert
145
Alert Settings Window
145
Disable the Alert Feature
147
Enable the Alert Feature
147
Modify Alert Settings
147
Enter, Edit SMTP Server Settings
148
SMTP Server Settings Window
148
Verify SMTP Settings
149
Local Software Update Window
150
Software Update
150
Read Information about a Software Update
151
Select and Apply a Software Update
151
Software Update Log Window
154
Undo an Applied Software Update
154
Download Log, View, Print Contents
155
Download the Log
155
View Log Contents
155
View the Contents of the Log
156
Save, Print the Log File Contents
158
Synchronization
159
Setup Window
160
Set up a Web Filter to be a Source Server
161
Using more than One Web Filter on the Network
161
Using Only One Web Filter on the Network
161
Sync All Target Servers with the same Settings
164
Set up a Web Filter to be a Target Server
165
Status Window
167
View Items in the Queue
168
View the Sync Status of Targets from the Source
168
View Items Previously Synced to the Server
169
Place Items in Queue for Syncing
170
View the Sync Status of the Target Server
170
Mode
172
Operation Mode Window
172
Set the Operation Mode
173
Specify the Block Page Device
173
Specify the Listening Device
173
Invisible Option: Specify the Block Page Delivery
174
ICAP Option: Specify ICAP Server Settings
175
Apply Operation Mode Settings
177
Mobile Options: Specify the Mobile Client Control
177
Proxy Environment Settings Window
177
Use a Local Proxy Server
178
Use Proxy Port 80
178
Authentication
179
Backup/Restore
180
Backup/Restore Window
180
Backup Procedures
181
Perform a Backup on Demand
182
Configure FTP Server Settings
183
Schedule a Backup
183
Create a Backup Schedule
184
Remove a Backup Schedule
187
Download a File
188
Perform a Restoration
189
Upload a File to the Server
189
Remove a Backup File
190
Restore Configurations to the Server
190
View Backup and Restoration Details
191
Reset
192
Reset All Server Settings
192
Reset Window
192
Radius Authentication Settings
193
Radius Authentication Settings Window
193
Enable Radius
194
Specify Radius Authentication Settings
194
Apply Settings
195
Disable Radius
195
Enable SNMP
196
Snmp
196
SNMP Window
196
Create, Build the Access Control List
197
Maintain the Access Control List
197
Set up Community Token for Public Access
197
Specify Monitoring Settings
197
Hardware Failure Detection
198
Hardware Failure Detection Window
198
View the Status of the Hard Drives
198
Strikes Blocking
199
Strikes Blocking Window
199
Configuration
200
Set up Blocking Criteria
200
Reset All Workstations
201
Lock Page
202
Overblocking or Underblocking
203
Email Alert
204
Set up Email Alert Criteria
204
Set up Email Alert Recipients
205
Logon Accounts
206
Remove Email Alert Recipients
206
Set up Users Authorized to Unlock Workstations
206
Deactivate an Authorized Logon Account
207
Delete a Logon Account
207
Categories
208
Set up Categories to Receive Strikes or no Strikes
208
Go to X Strikes Unlock Workstation GUI
209
Re-Login Window
209
Strikes Unlock Workstation
210
Unlock a Workstation
210
Close the Pop-Up Window
212
Remove an Email Address from the Alert List
212
Set up an Email Address to Receive Alerts
212
Warn Option Setting
213
Warn Option Setting Window
213
Specify Interval for Re-Displaying the Warn Page
214
Customization
215
Common Customization Window
216
Enable, Disable Features
217
Lock Page Customization Window
219
Edit Entries, Setting
220
Preview Sample Lock Page
221
Block Page Customization Window
222
Add, Edit Entries
223
Preview Sample Block Page
224
Warn Page Customization Window
226
Add, Edit Entries
227
Preview Sample Warning Page
228
Profile Control Window
230
Edit Entries
231
Add, Edit Entries
232
Quota Block Page Customization Window
232
Preview Sample Quota Block Page
233
Add, Edit Entries
235
Quota Notice Page Customization Window
235
Preview Sample Quota Notice Page
236
CMC Management
238
Software Update Management Window
238
View Software Update Information
239
Apply or Undo a Software Update
240
Status Window
241
View Filtering Status Information
241
Quota Setting
243
Quota Setting Window
243
Configure Quota Hit Settings
244
Reset Quotas
245
Reset Quotas Now
245
Set up a Schedule to Automatically Reset Quotas
245
Delete a Quota Reset Time from the Schedule
246
Quota Notice Page
246
Quota Block Page
248
SSL Certificate
249
SSL Certificate Window
249
Generate an SSL Certificate for the Web Filter
250
Chapter 2: Policy Screen
251
Global Group
253
Range to Detect Window
253
Add a Segment to the Network
254
Range to Detect Setup Wizard
256
Range to Detect Advanced Settings
261
Modify a Segment of the Network
262
Remove a Segment from the Network
262
Rules Window
263
View Criteria for a Rule
263
Add a Rule
264
Copy a Rule
266
Modify a Rule
266
Global Group Profile Window
267
Remove a Rule
267
Category Profile
268
Create, Edit a List of Selected Categories
268
Port
270
Create, Edit a List of Service Ports
271
Default Redirect URL
271
Create, Edit the Filter Options
272
Create, Edit the Redirect URL
272
Filter Options
272
Override Account Window
276
Add an Override Account
277
Category Profile
278
Redirect URL
281
Filter Options
282
Change the Password
284
Edit an Override Account
284
Delete an Override Account
285
Modify an Override Account
285
Minimum Filtering Level Window
286
Minimum Filtering Categories
287
Create, Edit Minimum Filtering Categories
288
Create, Edit a List of Service Ports
289
Port
289
Minimum Filtering Bypass Options
290
Refresh All
291
Refresh All Main Branches
291
Specify Minimum Filtering Bypass Options
291
Add a Master IP Group
292
Add Group
292
Refresh
293
Refresh IP Groups
293
Chapter 3: Library Screen
294
Updates
296
Configuration Window
296
Set a Time for Updates to be Retrieved
296
Optional: Specify a Proxy Server
297
Select the Log Level
297
Manual Update Window
298
Specify the Type of on Demand Update
298
Additional Language Support Window
300
Select Additional Languages
300
Library Update Log Window
301
View the Library Update Process
301
Download Log, View, Print Contents
302
Download the Log
302
View the Contents of the Log
302
Save, Print the Log File Contents
305
Emergency Update Log Window
306
View the Emergency Software Update Process
306
Download the Software Update Log File
307
Library Lookup
308
Library Lookup Window
308
Perform a URL Check
308
URL Lookup, Removal
308
Remove a URL
309
Perform a Search Engine Keyword Check
310
Remove a Search Engine Keyword
310
Search Engine Keyword Lookup, Removal
310
Submit an Email to the Administrator
310
Customer Feedback Module
311
Customer Feedback Module Window
311
Reload the Library
311
Disable Customer Feedback Module
312
Enable Customer Feedback Module
312
Category Weight System
315
Category Weight System Window
315
Method for Weighting Library Categories
316
View the Current Selections
316
Weighting Library Categories
317
Add a Newsgroup to the Library
318
NNTP Newsgroup
318
NNTP Newsgroup Window
318
Pattern Detection Whitelist
319
Pattern Detection Whitelist Window
319
Remove a Newsgroup from the Library
319
Create, Maintain a Whitelist of IP Addresses
320
Category Groups
321
Library Details Window
322
View Library Details
322
Urls Window
323
View a List of Urls in the Library Category
324
Add a URL to the Library Category
325
Add or Remove Urls, Reload the Library
325
Add a Wildcard URL to the Library Category
326
Reload the Library
327
Remove a URL from the Library Category
327
URL Keywords Window
328
Add a URL Keyword to the Library Category
329
Add or Remove URL Keywords
329
Remove a URL Keyword from the Library
329
View a List of URL Keywords
329
Upload a List of URL Keyword Additions
330
Upload a List of URL Keywords to the Library
330
Reload the Library
331
Upload a List of URL Keyword Deletions
331
Search Engine Keywords Window
332
Add a Search Engine Keyword to the Library
333
Add or Remove Search Engine Keywords
333
View a List of Search Engine Keywords
333
Remove a Search Engine Keyword from the Library
334
Upload a List of Search Engine Keyword Additions
334
Upload a List of Search Engine Keywords
334
Reload the Library
335
Upload a List of Search Engine Keyword Deletions
335
Chapter 4: Reporting Screen
336
Report Configuration
337
Report Configuration Window
337
Specify the Reporting Device
337
Edit er Server Information
338
M86 Enterprise Reporter
338
Execute Log Transfer Now
339
Other Device
339
View Transfer Activity to the er
339
Enter or Edit Server Information
340
View Transfer Activity to the Reporting Device
341
Configuration
342
Enable Real Time Probes
342
Real Time Probe
342
Real Time Probe Window
342
Exclude an IP Address from Real Time Probing
343
Remove Ips from the White List
343
Set up Real Time Probes
343
Report Recipients
344
Set up Email Addresses to Receive Reports
344
Specify Email File Criteria
344
Logon Accounts
345
Remove Email Addresses
345
Set up Users Authorized to Create Probes
345
Deactivate an Authorized Logon Account
346
Delete a Logon Account
346
Go to Real Time Probe Reports GUI
347
Re-Login Window
347
Real Time Probe Reports
348
Create a Real Time Probe
349
View Real Time Probe Details
352
Shadow Log Format
356
Shadow Log Format Window
356
Specify the Shadow Log Format
356
Auto-Detect Option
357
Post 2.0.10 Log Format Option
357
Apply Setting
358
Post 1.9 Log Format Option
358
Post 2.0 Log Format Option
358
Pre 1.9 Log Format Option
358
Roup Dministrator Ection
359
Introduction
359
Chapter 1: Policy Screen
360
Refresh
361
Refresh the Master IP Group, Member
361
Change the Group Administrator Password
362
Group Details Window
362
Master IP Group
362
Members Window
363
Add the IP Address of the Member
364
Remove a Member from the Group
364
Override Account Window
365
Add an Override Account
366
Category Profile
367
Redirect URL
370
Filter Options
371
Change the Password
373
Edit an Override Account
373
Modify an Override Account
373
Category Profile
374
Delete an Override Account
374
Group Profile Window
374
Create, Edit a List of Selected Categories
375
Create, Edit the Redirect URL
378
Redirect URL
378
Create, Edit the Filter Options
379
Filter Options
379
Exception URL Window
382
Valid URL Entries
383
Add Urls to Block URL or Bypass URL Frame
384
Remove Urls from Block URL or Bypass URL Frame
386
Apply Settings
387
Time Profile Window
387
Add a Time Profile
388
Category Profile
393
Redirect URL
394
Filter Options
395
Exception URL
396
Delete a Time Profile
397
Modify a Time Profile
397
Upload IP Profiles
398
Upload/Download IP Profile Window
398
Download Profile
400
Add an IP Sub Group
401
Add Sub Group
401
Add an Individual IP Member
402
Add Individual IP
402
Delete a Master IP Group Profile
403
Delete Group
403
Paste a Copied IP Sub Group
403
Paste Sub Group
403
Sub Group
404
Sub Group (IP Group) Window
404
View IP Sub-Group Details
404
Add IP Sub-Group Details
405
Members Window
406
Modify Sub-Group Members
407
Sub Group Profile Window
407
Delete an IP Sub-Group
408
Delete Sub Group
408
Exception URL Window
408
Time Profile Window
408
Copy an IP Sub-Group
409
Copy Sub Group
409
Individual IP
410
Member Window
410
Enter the IP Address of the Member
411
Exception URL Window
411
Individual IP Profile Window
411
Time Profile Window
411
Delete an Individual IP Member
412
Delete Individual IP
412
Chapter 2: Library Screen
413
Library Lookup
414
Library Lookup Window
414
Look up a URL
415
Look up a Search Engine Keyword
416
Custom Categories
417
Add a Custom Library Category
418
Add Category
418
Refresh
419
Refresh the Library
419
Custom Library Category
420
Library Details Window
421
View, Edit Library Details
421
Urls Window
422
View a List of Urls in the Library Category
423
Add a URL to the Library Category
424
Add or Remove Urls or Wildcard Urls
424
Add a Wildcard URL to the Library Category
425
Remove a URL from the Library Category
426
Upload a Master List of Urls
427
Upload a Master List to the Library
427
Upload a Master List of Wildcard Urls
429
Reload the Library
430
URL Keywords Window
431
Add a URL Keyword to the Library Category
432
Add or Remove URL Keywords
432
Remove a URL Keyword from the Library
432
View a List of URL Keywords
432
Reload the Library
433
Upload a List of URL Keywords to the Library
433
Search Engine Keywords Window
434
Add a Search Engine Keyword to the Library
435
Add or Remove Search Engine Keywords
435
Remove a Search Engine Keyword
435
View a List of Search Engine Keywords
435
Delete a Custom Category
436
Delete Category
436
Reload the Library
436
Upload a Master List of Search Engine Keywords
436
Technical Support / Product Warranties
437
Technical Support
437
Contact Information
437
Domestic (United States)
437
Hours
437
International
437
E-Mail
438
M86 Corporate Headquarters (USA)
438
M86 Taiwan
438
Office Locations and Phone Numbers
438
Support Procedures
439
Product Warranties
440
Standard Warranty
440
Technical Support and Service
441
Extended Technical Support and Service
442
Extended Warranty (Optional)
442
Appendices Section
443
Appendix A Filtering Profile Format and Rules
443
Rule Criteria
444
Category Codes
445
Filter Option Codes
446
Appendix B
447
Create a Custom Block Page
447
Part I: Modify the Web Filter
447
Enable Block
447
Set up for each Sub-Group
447
Exclude Filtering <Server for Block Page> IP
448
Part II: Customize the Block Page
448
Create a Customized Block Page
448
Set up a Web Server
448
Implement the "Further Option" (Optional)
449
Show M86'S Information in the Block Page (Optional)
449
Customized Block Page Examples
450
Part III: Restart the Web Filter
450
Reference
451
Html
451
CGI Written in Perl
453
Embed Data in Query String
453
Use Java Script to Post Form Data
454
CGI Written in C
456
Advertisement
M86 Security M86 Web Filter User Manual (309 pages)
Brand:
M86 Security
| Category:
Network Hardware
| Size: 4.8 MB
Table of Contents
User Guide
1
Table of Contents
3
Hapter Ntroduction
13
About this User Guide
13
How to Use this User Guide
14
Conventions
14
Terminology
15
Filtering Elements
20
Group Types
20
Global Group
20
IP Groups
21
LDAP Domain Groups
22
Filtering Profile Types
23
Static Filtering Profiles
25
Master IP Group Filtering Profile
25
IP Sub-Group Filtering Profile
25
Individual IP Member Filtering Profile
25
Active Filtering Profiles
26
Global Filtering Profile
26
LDAP Filtering Profiles
26
Override Account Profile
27
Time Profile
27
Lock Profile
27
Filtering Profile Components
28
Library Categories
29
M86 Supplied Categories
29
Custom Categories
29
Service Ports
30
Rules
30
Minimum Filtering Level
30
Filter Settings
31
Filtering Rules
33
Authentication Solutions
36
LDAP Authentication Protocol
36
Web Filter Authentication Tiers and Options
36
Web Filter Authentication Tiers
36
Web Filter Authentication Options
37
Authentication Solution Compatibility
38
Authentication System Deployment Options
39
Ports for Authentication System Access
40
Configuring Web Filter for Authentication
41
Configuration Procedures
41
System Section
41
Policy Section
44
Chapter 2: Network Setup
45
Environment Requirements
45
Workstation Requirements
45
Administrator
45
End User
46
Network Requirements
46
Set up the Network for Authentication
47
Specify the Operation Mode
48
Specify the Subnet Mask, IP Address(Es)
50
Invisible Mode
50
Router or Firewall Mode
51
Enable Authentication, Specify Criteria
52
Net Use Based Authentication
54
Web-Based Authentication
55
Enter Network Settings for Authentication
58
Create an SSL Certificate
60
Create, Download a Self-Signed Certificate
61
Create, Upload a Third Party Certificate
62
Create a Third Party Certificate
62
Upload a Third Party Certificate
64
Download a Third Party Certificate
65
Specify Block Page Settings
66
Block Page Authentication
66
Block Page
68
User/Machine Frame
69
Standard Links
69
Optional Links
70
Options Page
71
Option 1
72
Option 2
73
Option 3
74
Common Customization
75
Enable, Disable Features
76
Authentication Form Customization
78
Preview Sample Authentication Request Form
80
Block Page Customization
82
Preview Sample Block Page
84
Set up Group Administrator Accounts
86
Add Sub Admins to Manage Nodes
86
Add a Group Administrator Account
87
Update the Group Administrator's Password
87
Delete a Group Administrator Account
88
View Log Results
89
Hapter 3: Ldap Authentication Etup
91
Create an LDAP Domain
91
Add the LDAP Domain
91
Refresh the LDAP Branch
92
View, Modify, Enter LDAP Domain Details
92
LDAP Server Type
93
Group Objects
94
User Objects
96
Workstation Objects
97
Address Info
98
Account Info
100
SSL Settings
102
Alias List
104
Default Rule
106
LDAP Backup Server Configuration
108
Configure a Backup Server
108
Modify a Backup Server's Configuration
112
Delete a Backup Server's Configuration
113
Delete a Domain
113
Set up LDAP Domain Nodes
114
Add Nodes to the Domain Tree List
114
Perform a Basic Search
115
Options for Search Results
116
Apply a Filtering Rule to a Profile
116
Delete a Rule
117
Specify a Group's Filtering Profile Priority
118
Manually Add a Workstation Name to the Tree
119
Manually Add a User's Name to the Tree
120
Manually Add a Group's Name to the Tree
121
Upload a File of Filtering Profiles to the Tree
122
Chapter 4: Manage Nodes
125
Assign Sub Admin to an LDAP Node
126
Create and Maintain Filtering Profiles
129
Add a Group Member to the Tree List
130
View Container Details
131
Add or Maintain a Node's Profile
132
Category Profile
133
Redirect URL
136
Filter Options
137
Add an Exception URL to the Profile
138
Valid URL Entries
139
Add Urls to Block URL or Bypass URL Frame
140
Remove Urls from Block URL or Bypass URL Frame
142
Apply Settings
143
Create a Time Profile for the Node
143
Add a Time Profile
144
Remove a Node's Profile from the Tree
148
Verify that an LDAP Profile Is Active
149
Chapter 5: Authentication Deployment
153
Test Authentication Settings
153
Test Web-Based Authentication Settings
155
Step 1: Create an IP Group, "Test
155
Step 2: Create a Sub-Group, "Workstation
155
Step 3: Set up "Test" with a 32-Bit Net Mask
156
Step 4: Give "Workstation" a 32-Bit Net Mask
157
Step 5: Block Everything for the Sub-Group
158
Step 6: Use Authentication Request Page for Redirect URL
159
Step 7: Disable Filter Options
160
Step 8: Attempt to Access Web Content
161
Test Net Use Based Authentication Settings
163
Activate Authentication on the Network
164
Activate Web-Based Authentication for an IP Group
165
Step 1: Create a New IP Group, "Webauth
165
Step 2: Set "Webauth" to Cover Users in Range
166
Step 3: Create an IP Sub-Group
167
Step 4: Block Everything for the Sub-Group
168
Step 5: Use Authentication Request Page for Redirect URL
169
Step 6: Disable Filter Options
170
Step 7: Set Global Group to Filter Unknown Traffic
171
Activate Web-Based Authentication for the Global Group
175
Step 1: Exclude Filtering Critical Equipment
175
Step 1A: Block Web Access, Logging Via Range to Detect
176
Range to Detect Settings
176
Range to Detect Setup Wizard
177
Step 1B: Block Web Access Via IP Sub-Group Profile
182
Step 2: Modify the Global Group Profile
184
Add Net Use Command to Login Scripts
188
Step 1: Modify the 3-Try Login Script
188
Step 2: Modify the Global Group Profile
189
Chapter 6: Technical Support
191
Hours
191
Contact Information
192
Domestic (United States)
192
International
192
E-Mail
192
Office Locations and Phone Numbers
193
M86 Corporate Headquarters (USA)
193
M86 Taiwan
193
Support Procedures
194
Appendix A: Authentication Operations
195
Authentication Tier Selections
195
Tier 1: Net Use Based Authentication
195
Tier 2, Tier 3: Web-Based Authentication
195
Tier 1: Single Sign-On Authentication
196
Net Use Based Authentication Process
196
Re-Authentication Process
197
Tier 1 Authentication Method
198
Name Resolution Methods
198
Configuring the Authentication Server
199
Login Scripts
199
Enter Net Use Syntax in the Login Script
199
View Login Script on the Server Console
200
Block Page Authentication Login Scripts
200
LDAP Server Setup Rules
201
Tier 2: Time-Based, Web Authentication
202
Tier 2 Implementation in an Environment
203
Tier 2 Script
204
Tier 1 and Tier 2 Script
205
Tier 3: Session-Based, Web Authentication
207
M86 Authenticator
208
Environment Requirements
209
Windows Minimum System Requirements
209
Recommended System Requirements
209
Macintosh Minimum System Requirements
210
Workstation Requirements
210
Work Flow in Environments
211
Windows Environment
211
Macintosh Environment
212
M86 Authenticator Configuration Priority
213
Windows
213
Macintosh
214
M86 Authenticator Configuration Syntax
215
Sample Command Line Parameters
215
Sample Configuration File
215
Sample Configuration Update Packet 'PCFG
216
Table of Parameters
217
Novell Edirectory Agent
220
Environment Requirements
220
Novell Edirectory Servers
220
Client Workstations
221
Novell Clients
221
Novell Edirectory Setup
221
Web Filter Setup and Event Logs
222
Active Directory Agent
223
Product Feature Overview
223
Windows Server Requirements
224
Work Flow in a Windows Environment
224
Set up AD Agent
225
Step 1: AD Agent Settings on the Web Filter
225
Step 2: Configure the Domain, Service Account
227
Step 3: AD Agent Installation on Windows Server
228
Step 3A: Download Dcagent.msi
228
Step 3B: Run AD Agent Installation Setup
228
Step 3C: Run AD Agent Configuration Wizard
231
Use the Active Directory Agent Console
236
Activity Tab
236
Sessions Tab
239
Session Table Spreadsheet
241
Session Properties Window
242
Workstation Interactive Probe Window
243
Active Directory Agent Configuration Window
245
Service Page
247
Appliance Page
248
Agent Hosts Page
249
Add a Satellite
250
Remove a Satellite
250
Configure a Satellite
251
Check the Status of a Satellite
253
Options Page
255
Notifications Page
257
Appendix B: Obtain , Export an Ssl Certificate
259
Export an Active Directory SSL Certificate
259
Verify Certificate Authority Has Been Installed
259
Locate Certificates Folder
260
Export the Master Certificate for the Domain
263
Export a Novell SSL Certficate
267
Obtain a Sun One SSL Certificate
269
Advertisement
Related Products
M86 Security M86 IR Enterprise Reporter
M86 Security M86 Threat Analysis Reporter
M86 Security MSA
M86 Security Categories
Network Hardware
Firewall
Security System
Server
Gateway
More M86 Security Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL