M86 Security M86 Web Filter User Manual

Other manuals for M86 Web Filter: User Manual

Summary of M86 Web Filter

  • Page 1

    M86 web filter user guide software version: 4.0.10 document version: 06.08.10

  • Page 2: M86 W

    Ii m86 s ecurity u ser g uide m86 w eb f ilter u ser g uide © 2010 m86 security all rights reserved. 828 w. Taft ave., orange, ca 92865, usa version 1.01, published june 2010 for software release 4.0.10 printed in the united states of america this document may not, in whole or in part, be copied, ph...

  • Page 3: Ontents

    M86 s ecurity u ser g uide iii c ontents i ntroductory s ection .................................................. 1 web filter ..................................................................................... 1 about this user guide .................................................................

  • Page 4

    C ontents iv m86 s ecurity u ser g uide m86 supplied categories.................................................... 25 custom categories ............................................................. 25 service ports . ........................................................................... 26 rul...

  • Page 5

    C ontents m86 s ecurity u ser g uide v non-synchronized items ..................................................... 45 server maintenance procedures ..................................................... 47 source server failure scenarios .............................................. 47 establish ba...

  • Page 6

    C ontents vi m86 s ecurity u ser g uide filter window ............................................................................. 72 local filtering...................................................................... 73 disable local filtering options ..................................... 73 ena...

  • Page 7

    C ontents m86 s ecurity u ser g uide vii delete an administrator account......................................... 97 secure logon .................................................................................. 98 logon settings window ............................................................. ...

  • Page 8

    C ontents viii m86 s ecurity u ser g uide view ................................................................................. 122 view the log of administrator changes ..................... 122 alert ............................................................................................... 1...

  • Page 9

    C ontents m86 s ecurity u ser g uide ix mobile options: specify the mobile client control ........... 155 apply operation mode settings ........................................ 155 proxy environment settings window ...................................... 155 use a local proxy server ....................

  • Page 10

    C ontents x m86 s ecurity u ser g uide configuration..................................................................... 178 set up blocking criteria .............................................. 178 reset all workstations................................................ 179 lock page.................

  • Page 11

    C ontents m86 s ecurity u ser g uide xi preview sample quota block page .................................. 211 quota notice page customization window ............................. 213 add, edit entries ............................................................... 213 preview sample quota notice pa...

  • Page 12

    C ontents xii m86 s ecurity u ser g uide create, edit a list of service ports............................. 249 default redirect url ........................................................ 249 create, edit the redirect url .................................... 250 filter options.........................

  • Page 13

    C ontents m86 s ecurity u ser g uide xiii download log, view, print contents ................................ 280 download the log....................................................... 280 view the contents of the log...................................... 280 save, print the log file contents ........

  • Page 14

    C ontents xiv m86 s ecurity u ser g uide remove a url from the library category ................. 305 reload the library ...................................................... 305 url keywords window ........................................................... 306 view a list of url keywords ...........

  • Page 15

    C ontents m86 s ecurity u ser g uide xv set up email addresses to receive reports.............. 322 remove email addresses .......................................... 323 logon accounts ................................................................ 323 set up users authorized to create probes.........

  • Page 16

    C ontents xvi m86 s ecurity u ser g uide change the password ................................................ 351 modify an override account ....................................... 351 delete an override account ............................................. 352 group profile window ....................

  • Page 17

    C ontents m86 s ecurity u ser g uide xvii exception url window ........................................................... 386 time profile window ............................................................... 386 delete sub group ................................................................... ...

  • Page 18: / P

    C ontents xviii m86 s ecurity u ser g uide add a url keyword to the library category.............. 410 remove a url keyword from the library .................. 410 upload a list of url keywords to the library ................. 411 reload the library......................................................

  • Page 19

    C ontents m86 s ecurity u ser g uide xix part i: modify the web filter ................................................... 425 1. Enable block page redirection....................................... 425 set up for each sub-group .......................................... 425 2. Exclude filtering ip....

  • Page 20

    C ontents xx m86 s ecurity u ser g uide appendix d .............................................................................. 452 mobile client ................................................................................. 452 environment requirements . ..........................................

  • Page 21

    C ontents m86 s ecurity u ser g uide xxi mobile client removal from computers .......................... 495 uninstallation from a windows group ......................... 495 uninstallation from an individual computer ................. 495 appendix e ....................................................

  • Page 22

    C ontents xxii m86 s ecurity u ser g uide.

  • Page 23: Ntroductory

    I ntroductory s ection w eb f ilter m86 s ecurity u ser g uide 1 i ntroductory s ection web filter m86 security’s web filter tracks each user’s online activity, and can be configured to block specific web sites, service ports, and pattern and file types, and lock out an end user from internet access...

  • Page 24

    I ntroductory s ection a bout this u ser g uide 2 m86 s ecurity u ser g uide • introductory section - this section is comprised of an overview on filtering, web access logging, instant messaging and peer-to-peer blocking, and synchronizing multiple web filter units. This section also provides infor-...

  • Page 25: How to Use This User Guide

    I ntroductory s ection h ow to u se this u ser g uide m86 s ecurity u ser g uide 3 how to use this user guide conventions the following icons are used throughout this user guide: note: the “note” icon is followed by italicized text providing additional information about the current subject. Tip: the...

  • Page 26: Terminology

    I ntroductory s ection h ow to u se this u ser g uide 4 m86 s ecurity u ser g uide terminology the following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box that opens in response to an entry you made in a dialog box, wi...

  • Page 27

    I ntroductory s ection h ow to u se this u ser g uide m86 s ecurity u ser g uide 5 • frame - a boxed-in area in a dialog box, window, or screen that includes a group of objects such as fields, text boxes, list boxes, buttons, radio buttons, check- boxes, and/or tables. Objects within a frame belong ...

  • Page 28

    I ntroductory s ection h ow to u se this u ser g uide 6 m86 s ecurity u ser g uide • pop-up box or pop-up window - a box or window that opens after you click a button in a dialog box, window, or screen. This box or window may display infor- mation, or may require you to make one or more entries. Unl...

  • Page 29

    I ntroductory s ection h ow to u se this u ser g uide m86 s ecurity u ser g uide 7 • sub-topic - a subset of a main topic that displays as a menu item for the topic. The menu of sub-topics opens when a perti- nent topic link in the left panel—the navigation panel—of a screen is clicked. If a sub-top...

  • Page 30

    I ntroductory s ection h ow to u se this u ser g uide 8 m86 s ecurity u ser g uide • tree - a tree displays in the naviga- tion panel of a screen, and is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign when the branch is collap...

  • Page 31: Overview

    I ntroductory s ection o verview m86 s ecurity u ser g uide 9 overview the web filter’s administrator console is used by the global administrator—and group administrator, as required—to configure the web filter server to perform the following basic functions: • filter urls (web addresses) on the int...

  • Page 32: Environment Requirements

    I ntroductory s ection e nvironment r equirements 10 m86 s ecurity u ser g uide environment requirements workstation requirements administrator system requirements for the administrator include the following: • windows xp, vista, or 7 operating system running: • internet explorer (ie) 7.0 or 8.0 • f...

  • Page 33: End User

    I ntroductory s ection e nvironment r equirements m86 s ecurity u ser g uide 11 end user system requirements for the end user include the following: • windows xp, vista, or 7 operating system running: • internet explorer (ie) 7.0 or 8.0 • firefox 3.5 • macintosh os x version 10.5 or 10.6 running: • ...

  • Page 34: Operational Modes

    I ntroductory s ection c hapter 1: f iltering o perations 12 m86 s ecurity u ser g uide chapter 1: filtering operations operational modes based on the setup of your network, the web filter can be configured to use one of these operational modes for filtering the network: • invisible mode • router mo...

  • Page 35: Invisible Mode

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 13 invisible mode if the web filter is set up in the invisible mode, the unit will filter all connections on the ethernet between client pcs and the internet, without stopping each ip packet on the same ethernet seg...

  • Page 36

    I ntroductory s ection c hapter 1: f iltering o perations 14 m86 s ecurity u ser g uide when users (client pcs) make internet requests, the traffic flows (1) through the network path without interruption. The web filter captures the request as the user’s request (2) leaves the network. The web filte...

  • Page 37: Router Mode

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 15 router mode if the web filter is set up in the router mode, the unit will act as an ethernet router, filtering ip packets as they pass from one card to another. While all original packets from client pcs are allo...

  • Page 38: Firewall Mode

    I ntroductory s ection c hapter 1: f iltering o perations 16 m86 s ecurity u ser g uide warning: m86 recommends contacting one of our solutions engineers if you need assistance with router mode setup proce- dures. Firewall mode the firewall mode is a modification of the router mode. With the web fil...

  • Page 39

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 17 the firewall mode cannot be used with any other mode (invisible or router). Figure 1:1-4 illustrates an example of a firewall mode setup in which requests are never sent to the caching server. In this scenario th...

  • Page 40: Group Types

    I ntroductory s ection c hapter 1: f iltering o perations 18 m86 s ecurity u ser g uide group types after the operational filtering mode is configured on the web filter, the group type(s) that will be used on the web filter must be set up so that filtering can take place. In the policy section of th...

  • Page 41: Ip Groups

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 19 ip groups the ip group type is represented in the tree by the ip icon . A master ip group is comprised of sub-group members and/or individual ip members . The global administrator adds master ip groups, adds and ...

  • Page 42: Filtering Profile Types

    I ntroductory s ection c hapter 1: f iltering o perations 20 m86 s ecurity u ser g uide filtering profile types a filtering profile is used by all users who are set up to be filtered on the network. This profile consists of rules that dictate whether a user has access to a specified web site or serv...

  • Page 43

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 21 • override account profile - set up in either the global group section or the master ip group section of the console. • lock profile - set up under x strikes blocking in the filter options section of the profile....

  • Page 44: Static Filtering Profiles

    I ntroductory s ection c hapter 1: f iltering o perations 22 m86 s ecurity u ser g uide static filtering profiles static filtering profiles are based on fixed ip addresses and include profiles for master ip groups and their members. Master ip group filtering profile the master ip group filtering pro...

  • Page 45: Active Filtering Profiles

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 23 active filtering profiles active filtering profiles include the global group profile, override account profile, time profile, and lock profile. Note: for information about authentication filtering profiles, see t...

  • Page 46: Filtering Profile Components

    I ntroductory s ection c hapter 1: f iltering o perations 24 m86 s ecurity u ser g uide filtering profile components filtering profiles are comprised of the following compo- nents: • library categories - used when creating a rule, minimum filtering level, or filtering profile for the global group or...

  • Page 47: Library Categories

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 25 library categories a library category contains a list of web site addresses and keywords for search engines and urls that have been set up to be blocked or white listed. Library categories are used when creating ...

  • Page 48: Service Ports

    I ntroductory s ection c hapter 1: f iltering o perations 26 m86 s ecurity u ser g uide service ports service ports are used when setting up filter segments on the network (the range of ip addresses/netmasks to be detected by the web filter), the global (default) filtering profile, and the minimum f...

  • Page 49: Filter Settings

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 27 note: if the minimum filtering level is not set up, global (default) filtering settings will apply instead. If an override account is established at the ip group level for a member of a master ip group, filtering...

  • Page 50: Filtering Rules

    I ntroductory s ection c hapter 1: f iltering o perations 28 m86 s ecurity u ser g uide • filter - if a service port is given a filter setting, that port will use filter settings created for library categories (block or open settings) to determine whether users should be denied or allowed access to ...

  • Page 51

    I ntroductory s ection c hapter 1: f iltering o perations m86 s ecurity u ser g uide 29 b. An individual ip member time profile takes precedence over the individual ip member profile. 6. An authentication (ldap) profile—this includes a work- station profile—takes precedence over an individual ip mem...

  • Page 52

    I ntroductory s ection c hapter 1: f iltering o perations 30 m86 s ecurity u ser g uide fig. 1:1-7 sample filtering hierarchy diagram.

  • Page 53: Web Access Logging

    I ntroductory s ection c hapter 2: l ogging and b locking m86 s ecurity u ser g uide 31 chapter 2: logging and blocking web access logging one of the primary functions of the web filter is to log the activity of users on the internet. Information captured in the log can be transferred to a reporting...

  • Page 54: P2P Blocking

    I ntroductory s ection c hapter 2: l ogging and b locking 32 m86 s ecurity u ser g uide machines can be set up to block the use of im services specified in the library category. When the im module is loaded on the server, the web filter compares packets on the network with im libraries stored on the...

  • Page 55: Setting Up Im and P2P

    I ntroductory s ection c hapter 2: l ogging and b locking m86 s ecurity u ser g uide 33 setting up im and p2p im and p2p are set up in the system and library sections of the administrator console. 1. In the system section, activate pattern blocking in the filter window. 2. In the library section, no...

  • Page 56: Block Im, P2P For All Users

    I ntroductory s ection c hapter 2: l ogging and b locking 34 m86 s ecurity u ser g uide block im, p2p for all users block im for all users to block im for all users on the network: • the pattern blocking option in the filter window must be activated • the global filtering profile must have both chat...

  • Page 57

    I ntroductory s ection c hapter 2: l ogging and b locking m86 s ecurity u ser g uide 35 block specified entities from using im, p2p block im for a specific entity to block im for a specified group or user: • the pattern blocking option in the filter window must be activated • the chat and specified ...

  • Page 58: Web Filter Synchronization

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 36 m86 s ecurity u ser g uide chapter 3: synchronizing multiple units web filter synchronization the web filter can function in one of three modes—“stand alone” mode, “source” mode, or “target” mode—based on the setup within your org...

  • Page 59: Unctional

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 37 f unctional m odes stand alone mode in the stand alone mode, the web filter functions as the only internet filter on the network. This mode is used if there is only one web filter on the network. Synchro...

  • Page 60: Synchronization Setup

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 38 m86 s ecurity u ser g uide synchronization setup to set up synchronization on a web filter, a selection must be made in setup window from the system section of the web filter console to specify whether the web filter will function...

  • Page 61

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 39 should receive its running filter configuration in the event of a reboot. Warning: if a web filter server is set up in the target mode with a nat device between the target and source server, be sure that...

  • Page 62

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 40 m86 s ecurity u ser g uide if the target server is rebooted for any reason (loss of power etc.) upon bootup, the target server will actively download and apply the current running configuration from the source server. It will then...

  • Page 63: Delays In Synchronization

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 41 delays in synchronization when a filtering profile is applied to the source server, there is a slight delay in the time it takes to apply the profile to the target server. This delay is caused by the amo...

  • Page 64

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 42 m86 s ecurity u ser g uide synchronized, non-synchronized items it is important to note that while some items are synchro- nized to the target web filters, they do not become perma- nent configurations on the target web filter. Th...

  • Page 65: Synchronize All Items

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 43 synchronize all items the following lists show which items will be synchronized when the option to synchronize all items is selected. Synchronized items (all) • m86 library additions/deletions • custom l...

  • Page 66: Non-Synchronized Items

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 44 m86 s ecurity u ser g uide non-synchronized items • filter control settings • virtual ip and authentication ip addresses • ip addresses • default routes • patch application • synchronization settings • filter mode • backup/restore...

  • Page 67: Non-Synchronized Items

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 45 synchronize only library items the following lists show which items will be synchronized when the option to synchronize only library items is selected. Synchronized items (library only) • m86 library add...

  • Page 68

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 46 m86 s ecurity u ser g uide • ldap user/group: additions/deletions, changes, filter changes, profile activation/deactivation • filter control settings • virtual ip and authentication ip addresses • ip addresses • default routes • s...

  • Page 69: Establish Backup Procedures

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 47 server maintenance procedures source server failure scenarios in the event that the source web filter unit should fail, the target servers will continue to run using the last known configuration loaded f...

  • Page 70

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits 48 m86 s ecurity u ser g uide use a backup file to set up a source server in the event of a source server failure, the global adminis- trator should designate a target server as the new source server. Set up a target server as a sour...

  • Page 71

    I ntroductory s ection c hapter 3: s ynchronizing m ultiple u nits m86 s ecurity u ser g uide 49 set up a replacement target server once the original source server is replaced or repaired, it can then be configured to replace the empty spot created by the movement of the target server to the positio...

  • Page 72: Chapter 4: Getting Started

    I ntroductory s ection c hapter 4: g etting s tarted 50 m86 s ecurity u ser g uide chapter 4: getting started initial setup to begin setting up your web filter server, follow the instruc- tions in the m86 web filter installation guide, the booklet packaged with your web filter unit. This guide expla...

  • Page 73

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 51 3. After accepting the security certificate, click go to open the web filter login window: fig. 1:4-1 login window 4. Enter your username and password. Tip: the default username is admin and the password is user3. To ...

  • Page 74: Last Library Update Message

    I ntroductory s ection c hapter 4: g etting s tarted 52 m86 s ecurity u ser g uide on this screen, the web filter version number displays in the product frame, and dates for the last software update and last library update display in the web filter status frame. The following information displays at...

  • Page 75

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 53 fig. 1:4-3 welcome screen , last library update text click the checkbox “do not show “old library warning” dialog box in future” to disable the last library update message pop-up box. After the libraries are updated, ...

  • Page 76: Navigation Tips

    I ntroductory s ection c hapter 4: g etting s tarted 54 m86 s ecurity u ser g uide navigation tips access main sections the administrator console is organized into six sections, each accessible by clicking the corresponding link in the navigation toolbar at the top of the screen: • home - clicking t...

  • Page 77

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 55 • help - clicking this link displays the help screen. This screen includes navigation tips and a link to a page where you can access the latest user guides (in the .Pdf format) for this application: fig. 1:4-4 help sc...

  • Page 78: Help Features

    I ntroductory s ection c hapter 4: g etting s tarted 56 m86 s ecurity u ser g uide help features help features provide information about how to use windows in the administrator console. Such features include help topics and tooltips. Access help topics each of the main section screens contains a lin...

  • Page 79: Tooltips

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 57 tooltips in any window that features the icon in the navigation path bar beneath the banner, additional information about that window can be obtained by hovering over that icon with your mouse, or by pressing the f1 k...

  • Page 80

    I ntroductory s ection c hapter 4: g etting s tarted 58 m86 s ecurity u ser g uide • help pop-up box the help pop-up box opens when you press the f1 key on your keyboard: fig. 1:4-7 help pop-up box click ok to close the pop-up box..

  • Page 81: Topic Links

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 59 screen and window navigation all screens are divided into two panels: a navigation panel to the left, and a window in the panel to the right. Windows display in response to a selection made in the navigation panel. In...

  • Page 82: Select Sub-Topics

    I ntroductory s ection c hapter 4: g etting s tarted 60 m86 s ecurity u ser g uide select sub-topics some topics in library and system screens consist of more than one window. For these topics, clicking a topic link opens a menu of sub-topics: fig. 1:4-9 sub-topics menu when a sub-topic from this me...

  • Page 83: Navigate A Tree List

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 61 navigate a tree list tree lists are included in the navigation panel of policy and library screens. Fig. 1:4-10 tree menu a tree is comprised of a hierarchical list of items. An entity associated with a branch of the ...

  • Page 84

    I ntroductory s ection c hapter 4: g etting s tarted 62 m86 s ecurity u ser g uide tree list topics and sub-topics policy and library tree lists possess a menu of topics and sub-topics. Topics in the tree list display by default when the tree is opened. Examples of tree list topics are circled in fi...

  • Page 85: Navigate A Window With Tabs

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 63 navigate a window with tabs in each section of the console, there are windows with tabs. When selecting a window with tabs from the navigation panel, the main tab for that window displays. Entries made in a tab must b...

  • Page 86: Console Tips And Shortcuts

    I ntroductory s ection c hapter 4: g etting s tarted 64 m86 s ecurity u ser g uide console tips and shortcuts the following list of tips and shortcuts is provided to help you use windows in the administrator console with greater efficiency. Navigation path the navigation path displays at the top of ...

  • Page 87: Select Multiple Items

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 65 select multiple items when moving several items from one list box to another, or when deleting several items, the ctrl and shift keys can be used to expedite this task. • ctrl key to select multiple items from a list ...

  • Page 88

    I ntroductory s ection c hapter 4: g etting s tarted 66 m86 s ecurity u ser g uide calculate ip ranges without overlaps the calculator button displays on windows in which ip ranges are entered. These windows include: range to detect and members windows from the policy section, and block page route t...

  • Page 89: Re-Size The User Interface

    I ntroductory s ection c hapter 4: g etting s tarted m86 s ecurity u ser g uide 67 2. After making a note of the information in this pop-up window, click close to close the ip calculator. Re-size the user interface for greater ease in viewing content in any screen, re-size the browser window by plac...

  • Page 90: Log Off

    I ntroductory s ection c hapter 4: g etting s tarted 68 m86 s ecurity u ser g uide log off to log off the administrator console: 1. Click the logout button in the navigation toolbar at the top of the screen. This action opens the quit dialog box: fig. 1:4-15 quit dialog box 2. Click yes to return to...

  • Page 91: Lobal

    G lobal a dministrator s ection i ntroduction m86 s ecurity u ser g uide 69 g lobal a dministrator s ection introduction the global administrator section of this user guide is comprised of four chapters, based on the layout of the administrator console. This section is used by the autho- rized globa...

  • Page 92: Chapter 1: System Screen

    G lobal a dministrator s ection c hapter 1: s ystem screen 70 m86 s ecurity u ser g uide chapter 1: system screen the system screen is comprised of windows used for configuring and maintaining the server to authenticate users, and to filter, log, or block specified internet content for each user bas...

  • Page 93

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 71 if the synchronization feature is used and a web filter is set up in the target mode to synchronize both profile and library setting changes, settings in the filter window and customization windows cannot be edi...

  • Page 94: Control

    G lobal a dministrator s ection c hapter 1: s ystem screen 72 m86 s ecurity u ser g uide control control includes options for controlling basic web filter server functions. Click the control link to view a menu of sub-topics: filter, block page authentication, shutdown, and reboot. Filter window the...

  • Page 95: Local Filtering

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 73 clients such as google web accelerator and proxy patterns that bypass filtering (see http://www.M86security.Com/ software/8e6/hlp/r3000/files/1system_proxy_block .Html for a list of proxy pattern types set up to...

  • Page 96: Http Filtering

    G lobal a dministrator s ection c hapter 1: s ystem screen 74 m86 s ecurity u ser g uide enable local filtering options to enable local filtering, click “on”. The server will filter the specified range to detect on the network. To enable the detection of vlan traffic on the network, at vlan detectio...

  • Page 97: Https Filtering

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 75 https filtering specify your preference for filtering https sites in the https filtering frame. Select from the following settings for the https filtering level: • “none” - if you do not want the web filter to f...

  • Page 98: Service Control

    G lobal a dministrator s ection c hapter 1: s ystem screen 76 m86 s ecurity u ser g uide note: after making all entries in this window, click apply. Service control in the service control frame, indicate whether or not pattern blocking with be enabled or disabled. Enable pattern blocking by default,...

  • Page 99: Disable Pattern Blocking

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 77 to create a whitelist of pattern ip addresses, see the pattern detection whitelist window in chapter 3: library screen. Disable pattern blocking click “off” to disable pattern blocking. Note: after making all en...

  • Page 100

    G lobal a dministrator s ection c hapter 1: s ystem screen 78 m86 s ecurity u ser g uide block page authentication window the block page authentication window displays when block page authentication is selected from the control menu. This feature is used for entering criteria the web filter will use...

  • Page 101

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 79 enter, edit block page options note: if you are not using authentication, and/or if your users do not have override accounts set up, you do not need to select any option at the re-authentication options field. 1...

  • Page 102: Block Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 80 m86 s ecurity u ser g uide 2. If the re-authentication option was selected, in the logon script path field, \\pdcshare\scripts displays by default. In this field, enter the path of the logon script that the web filter will use when re-aut...

  • Page 103

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 81 by default, the following data displays in the user/machine frame of the block page: • user/machine field - the username displays for the ldap user. This field is blank for the ip group user. • ip field - the us...

  • Page 104: Options Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 82 m86 s ecurity u ser g uide email address field populates the “to” field. The user’s message is submitted to the global administrator. Options page the options page displays when the user clicks the following link in the block page: for fu...

  • Page 105: Option 2

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 83 the frame beneath the user/machine frame includes infor- mation for options (1, 2, and/or 3) based on settings made in this window and the common customization window. Note: information about option 1 is include...

  • Page 106: Option 3

    G lobal a dministrator s ection c hapter 1: s ystem screen 84 m86 s ecurity u ser g uide the user should click the logon.Bat icon to run a script that will re-authenticate his/her profile on the network. Option 3 option 3 is included in the options page, if “override account” was selected at the re-...

  • Page 107: Shutdown Window

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 85 shutdown window the shutdown window displays when shutdown is selected from the control menu. This window is used for powering off the server. Fig. 2:1-8 shutdown window shut down the server in the shutdown fram...

  • Page 108: Reboot Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 86 m86 s ecurity u ser g uide reboot window the reboot window displays when reboot is selected from the control menu. This window is used for reconnecting the server on the network. Fig. 2:1-9 reboot window reboot the server 1. In the reboot...

  • Page 109

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 87 the server connected alert box also opens, informing you that the server is connected, and that you must restart the server. 3. Click ok to close the web filter ready alert box. 4. Click ok to close the server c...

  • Page 110: Network

    G lobal a dministrator s ection c hapter 1: s ystem screen 88 m86 s ecurity u ser g uide network network includes options for configuring the web filter on the network. Click the network link to view a menu of sub- topics: lan settings, ntp servers, regional setting, and block page route table. Lan ...

  • Page 111: Specify Lan Settings

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 89 specify lan settings 1. In the host name field, enter up to 50 alphanumeric characters for the name of the host for this server, such as wf.Logo.Com. 2. Specify the following information, as necessary: • in the ...

  • Page 112: Ntp Servers Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 90 m86 s ecurity u ser g uide ntp servers window the ntp servers window displays when ntp servers is selected from the network menu. This window is used for specifying ip addresses of servers running network time protocol (ntp) software. Ntp...

  • Page 113: Add An Ntp Server

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 91 specify network time protocol servers in the details frame, three ntp server ip addresses display by default in the servers list box. These ip addresses are: 128.59.35.142, 142.3.100.15, and 129.132.98.11. Note:...

  • Page 114: Regional Setting Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 92 m86 s ecurity u ser g uide regional setting window the regional setting window displays when regional setting is selected from the network menu. This window is used for specifying the time zone to be used by the web filter and the languag...

  • Page 115

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 93 warning: if using the web filter with an m86 security reporter or m86 enterprise reporter unit, be sure each web filter used by the sr or er is set up in the same time zone as the sr or er. These “like” settings...

  • Page 116: Add A Router

    G lobal a dministrator s ection c hapter 1: s ystem screen 94 m86 s ecurity u ser g uide add a router in the route table frame: 1. Enter the ip address. 2. Select the network subnet mask from the pull-down menu. 3. In the gateway field, enter the ip address of the portal to which packets will be tra...

  • Page 117: Administrator

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 95 administrator administrator window the administrator window displays when administrator is selected from the navigation panel. This window is used for adding and maintaining global administrator (admin), group a...

  • Page 118: View Administrator Accounts

    G lobal a dministrator s ection c hapter 1: s ystem screen 96 m86 s ecurity u ser g uide tip: the default username is admin and the password is user3. M86 recommends that you retain this default account and pass- word in the event that the web filter cannot be accessed. An authorized m86 security te...

  • Page 119

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 97 edit an administrator account to change an administrator’s password and/or account type: 1. Select the username from the current user list box; this action populates the account details frame with data. 2. In th...

  • Page 120: Secure Logon

    G lobal a dministrator s ection c hapter 1: s ystem screen 98 m86 s ecurity u ser g uide secure logon secure logon includes options for setting user passwords to expire after a designated number of days, and/or locking out users from the web filter after unsuccessfully attempting to log in for the s...

  • Page 121

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 99 enable, disable password expiration in the logon expiration frame, at the number of days prior to expiration [1-365] field, specify the number of days logon passwords will be effective by doing one of the follow...

  • Page 122

    G lobal a dministrator s ection c hapter 1: s ystem screen 100 m86 s ecurity u ser g uide enable, disable account lockout 1. In the logon options frame, enable any of the following options: • at the lockout by username field, click the radio button corresponding to either of the following options: •...

  • Page 123

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 101 • at the failed password attempts timespan (in minutes) [1-1440] field—with the lockout by user- name and/or lockout by ip address option(s) enabled—enter the number of minutes that defines the interval in whic...

  • Page 124: Logon Management

    G lobal a dministrator s ection c hapter 1: s ystem screen 102 m86 s ecurity u ser g uide logon management the logon management window displays when logon management is selected from the secure logon menu. This window is used for viewing the status of user accounts— including the date passwords will...

  • Page 125: View Account Status

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 103 view user account status, unlock username view account status the all accounts status frame displays password statuses of current login accounts set up in this web filter being configured, including: • account ...

  • Page 126: Unlock A Username

    G lobal a dministrator s ection c hapter 1: s ystem screen 104 m86 s ecurity u ser g uide unlock a username to unlock a username: 1. Select the account name from the all accounts status frame by clicking on it to highlight it. 2. Click unlock to open the dialog box asking if you wish to proceed with...

  • Page 127

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 105 view admin, sub admin user interface access to view the areas of the user interface accessible by a global administrator, ldap group administrator, or help desk administrator: 1. Select the admin, sub admin, or...

  • Page 128: Diagnostics

    G lobal a dministrator s ection c hapter 1: s ystem screen 106 m86 s ecurity u ser g uide diagnostics diagnostics includes options for setting up or running processes for maintaining the server. Click the diagnostics link to view a menu of sub-topics: system command, view log file, troubleshooting m...

  • Page 129

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 107 perform a diagnostic test, view data 1. Select a diagnostic tool from the command pull-down menu: ping(ping), traceroute(trace route), ps(process list), top(top cpu processes), ifconfig(nic configura- tion), ne...

  • Page 130: Command Selections

    G lobal a dministrator s ection c hapter 1: s ystem screen 108 m86 s ecurity u ser g uide command selections ping the ping diagnostic tool is used for verifying whether the web filter can communicate with a machine at a given ip address within the network, and the speed of the network connection. En...

  • Page 131: Top Cpu Processes

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 109 top cpu processes the top cpu processes diagnostic tool is used for analyzing how much memory and cpu power is being consumed by which processes. When execute is clicked, the pop-up window displays the followin...

  • Page 132: Current Memory Usage

    G lobal a dministrator s ection c hapter 1: s ystem screen 110 m86 s ecurity u ser g uide current memory usage when current memory usage is selected and execute is clicked, the pop-up window shows the amount of memory being used, and the amount of memory available for three intervals of one second e...

  • Page 133: System Uptime

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 111 system uptime the system uptime diagnostic tool is used for showing the amount of time the web filter has been "up" and running. When execute is clicked, the pop-up window displays a row of data showing the cur...

  • Page 134: View Log File Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 112 m86 s ecurity u ser g uide view log file window the view log file window displays when view log file is selected from the diagnostics menu. This window is used for viewing the most recent log file results of various activi- ties and for ...

  • Page 135

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 113 • “error log (error.Log)” - used only if an alternate ip address is being used in the block page route frame of the operation mode window. This log only displays information if the ip address used for sending b...

  • Page 136: Troubleshooting Mode Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 114 m86 s ecurity u ser g uide troubleshooting mode window the troubleshooting mode window displays when trouble- shooting is selected from the diagnostics menu. This window is used if the server is not sending or receiving packets as normal...

  • Page 137: Use The Troubleshooting Mode

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 115 use the troubleshooting mode 1. Click enable to begin working in the troubleshooting mode. 2. In the packet logging frame, select the packet logging time from the available selections (10 seconds, 30 seconds, 6...

  • Page 138

    G lobal a dministrator s ection c hapter 1: s ystem screen 116 m86 s ecurity u ser g uide 8. After performing the fixes on the web filter, return to this window and click disable to resume filtering the network. Active profile lookup window the active profile lookup window displays when active profi...

  • Page 139

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 117 verify whether a profile is active 1. In the user ip/mac address field, enter the ip address or mac address of the end user. 2. Click lookup to verify whether or not a profile is active for that ip/mac address....

  • Page 140

    G lobal a dministrator s ection c hapter 1: s ystem screen 118 m86 s ecurity u ser g uide • global profile - global group profile • override profiles - override account profile • lock profiles - x strikes blocking lock out profile • time profiles - time profile • tar profile - threat analysis report...

  • Page 141

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 119 message and agreeing to its terms. • block- urls in this category will be blocked. • quota - if a number displays in this column, the corresponding category group/library category was set up as passed but with ...

  • Page 142: Admin Audit Trail Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 120 m86 s ecurity u ser g uide • filter options (optional) - filter options to be used in the user’s profile: “x strikes blocking”, “google/bing/ yahoo!/youtube/ask/aol safe search enforcement”, “search engine keyword filter control”, and/or...

  • Page 143: Specify Ftp Criteria

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 121 specify ftp criteria 1. Enter the ip address of the ftp server. 2. The log will be sent to the current default directory, unless a remote directory is specified. 3. At the transfer mode field, “passive” is sele...

  • Page 144: View

    G lobal a dministrator s ection c hapter 1: s ystem screen 122 m86 s ecurity u ser g uide view view the log of administrator changes to view the log, click the view tab: fig. 2:1-27 admin audit trail window, view tab click view log to display data on recent activity. For each change made on the serv...

  • Page 145: Alert

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 123 alert alert includes options for setting up alert emails that notify designated individuals of problems on the network. Click the alert link to view a menu of sub-topics: alert settings, and smtp server setting...

  • Page 146

    G lobal a dministrator s ection c hapter 1: s ystem screen 124 m86 s ecurity u ser g uide trator in troubleshooting the problem. In most cases, the reload procedure will fix the error, and no futher interven- tion will be required. However, if the error is not fixed— such as if a misconfiguration wa...

  • Page 147: Enable The Alert Feature

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 125 enable the alert feature by default, the “disable” radio button is selected. To enable the feature for sending automated email notifications: 1. Click the “enable” radio button to activate all elements in the e...

  • Page 148: Smtp Server Settings Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 126 m86 s ecurity u ser g uide smtp server settings window the smtp server settings window displays when smtp server settings is selected from the alert menu. This window is used for entering settings for the simple mail transfer protocol th...

  • Page 149: Verify Smtp Settings

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 127 4. By default, authentication is disabled. Click “enable” if a username and password are required for logging into the smtp server. This action activates the fields below. Make the following entries: a. Enter t...

  • Page 150: Software Update

    G lobal a dministrator s ection c hapter 1: s ystem screen 128 m86 s ecurity u ser g uide software update software update includes options for uploading software updates. Click the software update link to view a menu of sub-topics: local software update, and software update log. Local software updat...

  • Page 151

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 129 tip: click the link (“here”) at the bottom of the window to go to the web page at m86 security’s public site (http:// www.M86security.Com/support/wf/upgrade.Asp) where release notes about software updates can b...

  • Page 152

    G lobal a dministrator s ection c hapter 1: s ystem screen 130 m86 s ecurity u ser g uide fig. 2:1-33 software update installation dialog box 3. Click yes to open the eula dialog box: fig. 2:1-34 eula dialog box 4. After reading the contents of the end user license agreement, click yes if you agree ...

  • Page 153

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 131 fig. 2:1-35 software update verification message box note: to verify whether or not a software update has been successfully applied, go to the view log file window and select “software update log (patch.Log)”. ...

  • Page 154: Software Update Log Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 132 m86 s ecurity u ser g uide undo an applied software update note: only the most recently applied software update can be uninstalled. Warning: if a software update is uninstalled, configuration settings will revert to the previous settings...

  • Page 155: View Log Contents

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 133 view log contents click view log to display contents of the log in the frame below with the status of the software update. Download log, view, print contents download the log 1. Click download log to open the a...

  • Page 156: View The Contents of The Log

    G lobal a dministrator s ection c hapter 1: s ystem screen 134 m86 s ecurity u ser g uide view the contents of the log once the software update log file has been downloaded to your workstation, you can view its contents. 1. Find the log file in the folder, and right-click on it to open the pop-up me...

  • Page 157

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 135 3. If using winzip, click i agree to open the window containing the zip file: fig. 2:1-40 winzip window 4. Right-click the zip file to open the pop-up menu, and choose “view” to open the view dialog box: fig. 2...

  • Page 158

    G lobal a dministrator s ection c hapter 1: s ystem screen 136 m86 s ecurity u ser g uide save, print the log file contents with the log file displaying correctly formatted in winzip’s view window, if you wish to save or print the contents of this file: 1. Click clipboard copy, wait for the dialog b...

  • Page 159: Synchronization

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 137 synchronization by default, the synchronization pop-up menu includes the setup option that lets you specify the web filter server’s function on the network: whether it will be a stand alone box, or whether it w...

  • Page 160: Setup Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 138 m86 s ecurity u ser g uide setup window the setup window displays when setup is selected from the synchronization menu. This window is used for establishing the function of the web filter, especially if there is more than one web filter ...

  • Page 161

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 139 using only one web filter on the network by default, the “stand alone” mode is selected in the mode frame. This indicates that all settings on the web filter that is currently being configured apply only to tha...

  • Page 162

    G lobal a dministrator s ection c hapter 1: s ystem screen 140 m86 s ecurity u ser g uide fig. 2:1-44 setup window, source mode 2. At the selective synchronization field, by default “all” is selected. This choice includes both profile and library setting changes. Choose “library” if only library cat...

  • Page 163

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 141 • the mobile mode cannot be used • if “library” selective synchronization is enabled, end users for the failed web filter “node” might be given the global group profile instead of their active filtering profile...

  • Page 164

    G lobal a dministrator s ection c hapter 1: s ystem screen 142 m86 s ecurity u ser g uide • to remove an ip address from the list box, select it and click remove target. Note: this test only verifies whether this server can contact the target server(s). In order for synchronization to be operable on...

  • Page 165

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 143 note: see the backup/restore window for information on restoring data to a server. Set up a web filter to be a target server a web filter configured to be a target server will receive profile/library setting ch...

  • Page 166

    G lobal a dministrator s ection c hapter 1: s ystem screen 144 m86 s ecurity u ser g uide note: if a source server is set up with a nat device, the nat ip address must be used instead of the source server’s own ip address. 3. Click test source to open an alert box that provides the server mode statu...

  • Page 167: Status Window

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 145 status window the status window displays when status is selected from the synchronization menu. This menu selection is available only if this server currently being configured is either set up in the source mod...

  • Page 168: View Items In The Queue

    G lobal a dministrator s ection c hapter 1: s ystem screen 146 m86 s ecurity u ser g uide view the sync status of targets from the source if the server is set up in the source mode, the web filter system time displays at the top of the target(s) status frame. This is the current date and time from t...

  • Page 169

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 147 fig. 2:1-47 queue of target pop-up window 2. Click close to close the pop-up window. View items previously synced to the server to view items previously synced to a specified target server: 1. In the history co...

  • Page 170

    G lobal a dministrator s ection c hapter 1: s ystem screen 148 m86 s ecurity u ser g uide place items in queue for syncing to place new sync items in queue for the target server(s), click test sync. View the sync status of the target server if the server is set up in the target mode, the web filter ...

  • Page 171

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 149 • last successful sync - the date and time of the last successful synchronization displays, using the yyyy/ mm/dd and hh:mm:ss format. • history log - click the details button to open the history of target pop-...

  • Page 172: Mode

    G lobal a dministrator s ection c hapter 1: s ystem screen 150 m86 s ecurity u ser g uide mode mode includes options for configuring the web filter to filter the network. Click the mode link to view a menu of sub- topics: operation mode and proxy environment settings. Operation mode window the opera...

  • Page 173: Set The Operation Mode

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 151 set the operation mode the default mode setting is “invisible”. To change this setting, click the radio button corresponding to “router”, “firewall”, “icap”, or “mobile only”. Selecting icap would make the web ...

  • Page 174

    G lobal a dministrator s ection c hapter 1: s ystem screen 152 m86 s ecurity u ser g uide notes: after making all selections in this window, click apply. The lan ip address saved for the device to send block page will display in the ip field at the bottom of the administrator console. Invisible opti...

  • Page 175

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 153 notes: the current mac address displays if there is a resolu- tion between the ip address and the mac address of the router or device used for serving block pages. If an alternate ip address is used, that addre...

  • Page 176

    G lobal a dministrator s ection c hapter 1: s ystem screen 154 m86 s ecurity u ser g uide 2. In the uri field, enter the uniform resource identifier that must specify the complete hostname and path of the resource being requested. For example: icap:// icap.Logo.Com:1344/services/icap-services note: ...

  • Page 177

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 155 mobile options: specify the mobile client control the mobile client control frame displays if the mobile only operational mode or the mobile option is selected. Either selection should be made if this web filte...

  • Page 178: Use A Local Proxy Server

    G lobal a dministrator s ection c hapter 1: s ystem screen 156 m86 s ecurity u ser g uide note: basic proxy authentication must be used if using https in a proxy environment. The web filter has been tested with isa, blue coat, and squid proxies. Use a local proxy server in the proxy setting frame, t...

  • Page 179: Authentication

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 157 authentication authentication includes options for configuring the web filter to authenticate and re-authenticate users on the network. Click the authentication link to view a menu of sub- topics: enable/disabl...

  • Page 180: Backup/restore

    G lobal a dministrator s ection c hapter 1: s ystem screen 158 m86 s ecurity u ser g uide backup/restore backup/restore window the backup/restore window displays when backup/ restore is selected from the navigation panel. This window is used for saving configuration settings and/or custom library ad...

  • Page 181: Backup Procedures

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 159 tips: the order in which columns display in the grid can be changed by clicking the column header and sliding the column to another position in the grid. To change the sort order, click the header of a column. ...

  • Page 182: Perform A Backup On Demand

    G lobal a dministrator s ection c hapter 1: s ystem screen 160 m86 s ecurity u ser g uide perform a backup on demand 1. In the manual backup frame on the backup tab, click backup to open the web filter backup dialog box: fig. 2:1-53 web filter backup dialog box 2. Type in the filename for the backup...

  • Page 183: Schedule A Backup

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 161 schedule a backup configure ftp server settings 1. In the server configuration section of the scheduled backup frame, enter the ip address of the remote server. 2. In the ftp directory field, enter the path whe...

  • Page 184: Create A Backup Schedule

    G lobal a dministrator s ection c hapter 1: s ystem screen 162 m86 s ecurity u ser g uide create a backup schedule 1. In the recurrence schedule section of the scheduled backup frame, click schedule to open the scheduled backup pop-up box: fig. 2:1-54 scheduled backup pop-up box 2. In the recurrence...

  • Page 185

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 163 in this pop-up box you can do the following: • click the left or right arrow at the top of this box to navigate to the prior month or the next month. • double-click a date to select it and to close this box, po...

  • Page 186

    G lobal a dministrator s ection c hapter 1: s ystem screen 164 m86 s ecurity u ser g uide • monthly - if this selection is made, first enter the interval for the months this time profile will be used, and next specify which day of the month: • if day is chosen, select from “1” - “31”. • if a non-spe...

  • Page 187: Remove A Backup Schedule

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 165 “weekday”, “weekend” - month: “january” - “december”. By default, the “first” “sunday” of “january” are selected. If 2 is entered and the “first” “monday” of “june” are selected, this profile will be used every...

  • Page 188: Download A File

    G lobal a dministrator s ection c hapter 1: s ystem screen 166 m86 s ecurity u ser g uide download a file to download a file to your machine: 1. In the restore tab, select the file from the backup config- urations grid: fig. 2:1-55 backup/restore window, restore tab 2. Click download to open the ale...

  • Page 189: Perform A Restoration

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 167 perform a restoration to restore backup data to the server, the backup file must be listed in the backup configurations grid in the restore tab, and the restoration function must be executed. If the backup file...

  • Page 190: Remove A Backup File

    G lobal a dministrator s ection c hapter 1: s ystem screen 168 m86 s ecurity u ser g uide 6. Click upload file to upload this file to the server. If the file is successfully uploaded, the pop-up window’s banner name says: “upload successful.” after a few seconds, the pop-up window closes. 7. Click r...

  • Page 191

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 169 view backup and restoration details to view details on backup and/or restoration activities: 1. Click log to open the backup/restore log pop-up box: fig. 2:1-57 backup/restore pop-up box the pop-up box includes...

  • Page 192: Reset

    G lobal a dministrator s ection c hapter 1: s ystem screen 170 m86 s ecurity u ser g uide reset reset window the reset window displays when reset is selected from the navigation panel. This window is used for resetting the server back to the default settings when the box was first acquired. Fig. 2:1...

  • Page 193

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 171 radius authentication settings radius authentication settings window the radius authentication settings window displays when radius authentication settings is selected from the naviga- tion panel. This window i...

  • Page 194: Enable Radius

    G lobal a dministrator s ection c hapter 1: s ystem screen 172 m86 s ecurity u ser g uide access server or proxy server) that sends accounting request packets to the external radius accounting server. Enable radius the radius mode is “off” by default. To use radius, click the “on” radio button. This...

  • Page 195: Apply Settings

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 173 • check the box for use web filter ip as source ip, if the ip address of the web filter (lan1 or lan2) should be used when forwarding packets instead of the ip address of the nas. To disable the forward mode op...

  • Page 196: Snmp

    G lobal a dministrator s ection c hapter 1: s ystem screen 174 m86 s ecurity u ser g uide snmp snmp window the snmp window displays when snmp is selected from the navigation panel. This feature lets the global adminis- trator use a third party simple network management protocol (snmp) product for mo...

  • Page 197: Specify Monitoring Settings

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 175 specify monitoring settings set up community token for public access enter the password to be used as the community token for public access. This is the password that the manage- ment web filter console would u...

  • Page 198: Hardware Failure Detection

    G lobal a dministrator s ection c hapter 1: s ystem screen 176 m86 s ecurity u ser g uide hardware failure detection hardware failure detection window the hardware failure detection window displays when hardware failure detection is selected from the navigation panel. This feature shows the status o...

  • Page 199: X Strikes Blocking

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 177 2. Replace the failed drive with your spare replacement drive 3. Click on the “rebuild” button on the gui 4. To return a failed drive to m86 or to order additional replacement drives, please call m86 technical ...

  • Page 200: Configuration

    G lobal a dministrator s ection c hapter 1: s ystem screen 178 m86 s ecurity u ser g uide notes: the x strikes blocking topic does not display if the synchronization feature is used, and this server being configured is set up in the target mode to synchronize both profile and library setting changes...

  • Page 201: Reset All Workstations

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 179 if “defined” is selected, enter the number of minutes in the text box. The default setting is 5. 6. Specify a redirect url to be used when the end user is locked out from his/her workstation. By default, “defau...

  • Page 202: Lock Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 180 m86 s ecurity u ser g uide lock page a user who receives the final strike that locks him/her out the workstation will see the following lock page display on the screen: fig. 2:1-63 sample lock page the text informs the user: “your intern...

  • Page 203

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 181 “locked” life time field passes, or unless an authorized staff member manually unlocks that user’s workstation (see go to x strikes unlock workstation gui in this section). Overblocking or underblocking notes: ...

  • Page 204: Email Alert

    G lobal a dministrator s ection c hapter 1: s ystem screen 182 m86 s ecurity u ser g uide • the maximum number of strikes may need to be increased if these configuration settings do not block users often enough • the time span for the maximum number of strikes may need to be reduced • the maximum nu...

  • Page 205

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 183 for example, by entering 300 in this field and 30 in the previous field, if there are any email alerts they will be sent at 5:30:00 am, 10:30:00 am, 3:30:00 pm, 8:30:00 pm, and at midnight when the time interva...

  • Page 206: Logon Accounts

    G lobal a dministrator s ection c hapter 1: s ystem screen 184 m86 s ecurity u ser g uide remove email alert recipients 1. Select the email address(es) from the current email alerts list box. 2. Click delete to remove the email address(es) from list. Logon accounts click the logon accounts tab to di...

  • Page 207: Delete A Logon Account

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 185 note: when an authorized staff member is added to this list, that username is automatically added to the current un-accessible users list box in the logon accounts tab of the real time probe window. Deactivate ...

  • Page 208: Categories

    G lobal a dministrator s ection c hapter 1: s ystem screen 186 m86 s ecurity u ser g uide categories click the categories tab to display categories: fig. 2:1-67 x strikes blocking window, categories tab set up categories to receive strikes or no strikes 1. Select library categories from the “no stri...

  • Page 209: Re-Login Window

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 187 go to x strikes unlock workstation gui when any administrator clicks the x strikes blocking icon or go to x strikes unlock workstation gui, either the re-login window or the x strikes unlock workstation pop-up ...

  • Page 210: X Strikes Unlock Workstation

    G lobal a dministrator s ection c hapter 1: s ystem screen 188 m86 s ecurity u ser g uide x strikes unlock workstation the following information displays in the x strikes unlock workstation pop-up window: ip address, user name, and expire date/time of currently locked workstations. Fig. 2:1-69 x str...

  • Page 211

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 189 note: an authorized staff member can click a link in an email alert, or type in http://x.X.X.X:88/xstrike.Html in the address field of a browser window—in which “x.X.X.X” is the ip address of the web filter—to ...

  • Page 212: Close The Pop-Up Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 190 m86 s ecurity u ser g uide set up an email address to receive alerts to send locked workstation information to a designated administrator: 1. Enter the email address in the email address to be subscribed/unsubscribed text box. 2. Click s...

  • Page 213: Warn Option Setting

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 191 warn option setting warn option setting window the warn option setting window displays when warn option setting is selected from the navigation panel. This feature lets a global administrator specify the number...

  • Page 214

    G lobal a dministrator s ection c hapter 1: s ystem screen 192 m86 s ecurity u ser g uide notes: if using the synchronization feature, the warn option setting window is available in the stand alone and source mode. This topic does not display if this server being configured is set up in the target m...

  • Page 215: Customization

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 193 customization customization includes options to customize settings for html pages that display for end users who execute a command that triggers the associated pop-up window to open. Click the customization lin...

  • Page 216: Common Customization Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 194 m86 s ecurity u ser g uide common customization window the common customization window displays when common customization is selected from the customization menu. This window is used for specifying elements to be included in block, lock,...

  • Page 217: Enable, Disable Features

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 195 enable, disable features 1. Click “on” or “off” to enable or disable the following elements in the html pages, and make entries in fields to display customized text, if necessary: • username display - if enable...

  • Page 218

    G lobal a dministrator s ection c hapter 1: s ystem screen 196 m86 s ecurity u ser g uide • help link url - by default, http:// www.M86security.Com/support/r3000/accessde- nied.Asp displays as the help link url. Enter the url to be used when the end user clicks the help link text (specified in the h...

  • Page 219

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 197 lock page customization window the lock page customization displays when lock page is selected from the customization menu. This window is used with the x strikes blocking feature, and lets you customize text i...

  • Page 220: Edit Entries, Setting

    G lobal a dministrator s ection c hapter 1: s ystem screen 198 m86 s ecurity u ser g uide edit entries, setting 1. Make an entry in any of the following fields: • in the header field, enter a static header to be displayed at the top of the lock page. • in the description field, enter a static text m...

  • Page 221: Preview Sample Lock Page

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 199 preview sample lock page 1. Click preview to launch a separate browser window containing a sample customized lock page, based on entries saved in this window and in the common customization window: fig. 2:1-75 ...

  • Page 222

    G lobal a dministrator s ection c hapter 1: s ystem screen 200 m86 s ecurity u ser g uide • m86 security - clicking this link takes the user to m86’s web site. 2. Click the “x” in the upper right corner of the window to close the sample customized lock page. Tip: if necessary, make edits in the lock...

  • Page 223: Add, Edit Entries

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 201 tip: an entry in any of the fields in this window is optional, but if an entry is made in the link text field, a corresponding entry must also be made in the link url field. Add, edit entries 1. Make an entry i...

  • Page 224: Preview Sample Block Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 202 m86 s ecurity u ser g uide preview sample block page 1. Click preview to launch a separate browser window containing a sample customized block page, based on entries saved in this window and in the common customization window: fig. 2:1-7...

  • Page 225

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 203 by default, the following standard links are included in the block page: • help - clicking this link takes the user to m86’s tech- nical support page that explains why access to the site or service may have bee...

  • Page 226

    G lobal a dministrator s ection c hapter 1: s ystem screen 204 m86 s ecurity u ser g uide warn page customization window the warn page customization window displays when warn page is selected from the customization menu. This window is used with the warn option setting feature, and lets you customiz...

  • Page 227: Add, Edit Entries

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 205 add, edit entries 1. Make an entry in any of the following fields: • in the header field, enter a static header to be displayed at the top of the warning page. • in the description field, enter a static text me...

  • Page 228: Preview Sample Warning Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 206 m86 s ecurity u ser g uide preview sample warning page 1. Click preview to launch a separate browser window containing a sample customized warning page, based on entries saved in this window and in the common customization window: fig. 2...

  • Page 229

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 207 by default, the following standard links are included in the warning page: • help - clicking this link takes the user to m86’s tech- nical support page that explains why access to the site or service may have b...

  • Page 230: Profile Control Window

    G lobal a dministrator s ection c hapter 1: s ystem screen 208 m86 s ecurity u ser g uide 2. Click the “x” in the upper right corner of the window to close the sample customized warning page. Tip: if necessary, make edits in the warn page customization window or the common customization window, and ...

  • Page 231: Edit Entries

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 209 tip: an entry in any of the fields in this window is optional. Edit entries 1. Make an entry in any of the following fields: • in the header field, enter a static header to be displayed at the top of the profil...

  • Page 232: Add, Edit Entries

    G lobal a dministrator s ection c hapter 1: s ystem screen 210 m86 s ecurity u ser g uide quota block page customization window the quota block page customization window displays when quota block page is selected from the customization menu. This window is used for making customizations to the quota...

  • Page 233

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 211 • in the link text field, enter text for the link's url, and in the link url field, enter the corresponding hyper- link in plain text using the http:// or https:// syntax. Any entries made in these fields will ...

  • Page 234

    G lobal a dministrator s ection c hapter 1: s ystem screen 212 m86 s ecurity u ser g uide • requested url field - the url the user attempted to access displays. • ip field - the user’s ip address displays. • user/machine field - the username displays for the ldap user. This field is blank for the ip...

  • Page 235: Add, Edit Entries

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 213 quota notice page customization window the quota notice page customization window displays when quota notice page is selected from the customiza- tion menu. This window is used for making customizations to the ...

  • Page 236

    G lobal a dministrator s ection c hapter 1: s ystem screen 214 m86 s ecurity u ser g uide • in the link text field, enter text for the link's url, and in the link url field, enter the corresponding hyper- link in plain text using the http:// or https:// syntax. Any entries made in these fields will ...

  • Page 237

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 215 by default, the following data displays in the category frame: • category field - the name of the library category containing a url the user accessed—that triggered the quota notice—displays. • requested url fi...

  • Page 238: Cmc Management

    G lobal a dministrator s ection c hapter 1: s ystem screen 216 m86 s ecurity u ser g uide cmc management cmc management displays on a web filter set up in the source mode, and includes centralized management console options for viewing the filtering statuses of this source server and its target serv...

  • Page 239

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 217 view software update information the software updates frame displays the software update statuses of the source and each target web filter: host- name/location (information entered in the lan settings window fo...

  • Page 240

    G lobal a dministrator s ection c hapter 1: s ystem screen 218 m86 s ecurity u ser g uide apply or undo a software update to apply a software update: 1. Click to select the row(s) corresponding to the servers to be updated. 2. Click apply. Notes: if the source server is selected for a software updat...

  • Page 241: Status Window

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 219 status window the status window displays when status is selected from the cmc management menu. This window is used for viewing the filtering status of the source and target server(s) for troubleshooting purpose...

  • Page 242

    G lobal a dministrator s ection c hapter 1: s ystem screen 220 m86 s ecurity u ser g uide • last library update - most recent date the library was updated on the server, using the yyyy/mm/dd format, if this information is available. Tips: the order in which columns display in the grid can be changed...

  • Page 243: Quota Setting

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 221 quota setting quota setting window the quota setting window displays when quota setting is selected from the navigation panel. This window lets a global administrator configure url hits that—along with quotas s...

  • Page 244: Configure Quota Hit Settings

    G lobal a dministrator s ection c hapter 1: s ystem screen 222 m86 s ecurity u ser g uide configure quota hit settings 1. Enter the number of seconds per hit to indicate how much time will be applied towards a “hit” (url access) in any category with a quota. The default is 10 seconds per hit. The en...

  • Page 245: Reset Quotas

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 223 reset quotas quotas are automatically reset at midnight, but also can be manually reset on demand or scheduled to be reset at specific times each day. Reset quotas now click reset now to reset all quotas to zer...

  • Page 246: Quota Notice Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 224 m86 s ecurity u ser g uide delete a quota reset time from the schedule 1. Select the quota reset time from the current reset time(s) list box. 2. Click remove to remove the quota reset time from the list box. Tip: after making all config...

  • Page 247

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 225 • requested url field - the url that triggered the quota notice page. • ip field - the end user’s ip address. • user/machine field - the username displays for the ldap user. This field is blank for the ip group...

  • Page 248: Quota Block Page

    G lobal a dministrator s ection c hapter 1: s ystem screen 226 m86 s ecurity u ser g uide quota block page when the end user has spent 100 percent of time in a quota-restricted library group/category, the quota block page displays: fig. 2:1-89 sample quota block page once receiving a quota block pag...

  • Page 249: Ssl Certificate

    G lobal a dministrator s ection c hapter 1: s ystem screen m86 s ecurity u ser g uide 227 by default, the following standard links are included in the quota block page: • help - clicking this link takes the user to m86’s tech- nical support page that explains why access to the site or service may ha...

  • Page 250

    G lobal a dministrator s ection c hapter 1: s ystem screen 228 m86 s ecurity u ser g uide generate an ssl certificate for the web filter 1. Click generate ssl certificate to open the pop-up box that asks if you wish to continue, which would restart your server. Tip: click no to close the pop-up wind...

  • Page 251: Chapter 2: Policy Screen

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 229 chapter 2: policy screen the policy screen is comprised of windows and dialog boxes used for adding ip groups and/or ldap domains, and for creating filtering profiles for ip/ldap groups and their members. Fig. ...

  • Page 252

    G lobal a dministrator s ection c hapter 2: p olicy screen 230 m86 s ecurity u ser g uide double-click the branch of your selection to display the list of groups/domains previously added to that branch. Keep double-clicking items in the tree list to view additional items. Click an entity in the tree...

  • Page 253: Global Group

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 231 global group global group includes options for creating and maintaining groups. Click the global group link to view a menu of sub- topics: range to detect, rules, global group profile, over- ride account, minim...

  • Page 254: Add A Segment to The Network

    G lobal a dministrator s ection c hapter 2: p olicy screen 232 m86 s ecurity u ser g uide the main window (fig. 2:2-2) lets you add segments to the network, or modify or remove existing segments. The current ranges list box includes a list of segments previ- ously added using this feature. The manda...

  • Page 255

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 233 fig. 2:2-4 range to detect settings, second window 2. Click one of the following buttons to select the procedure for adding the segment: • start the setup wizard - clicking this button takes you to the range to...

  • Page 256: Range to Detect Setup Wizard

    G lobal a dministrator s ection c hapter 2: p olicy screen 234 m86 s ecurity u ser g uide range to detect setup wizard click the start the setup wizard button to display step 1 of the range to detect setup wizard. The wizard is comprised of six steps. An entry is required in step 1, but not in steps...

  • Page 257

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 235 2. Click add to include the segment in the list box above. Note: to modify the segment, select it from the list box and click modify to move the segment to the field(s) below for editing. To remove the segment,...

  • Page 258

    G lobal a dministrator s ection c hapter 2: p olicy screen 236 m86 s ecurity u ser g uide step 3: optional in this step you define the source ip address(es) to be excluded from filtering. Fig. 2:2-7 range to detect setup wizard window, step 3 step 4: optional in this step you define the destination ...

  • Page 259

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 237 fig. 2:2-8 range to detect setup wizard window, step 4 step 5: optional in this step you enter destination port numbers to be excluded from filtering. Fig. 2:2-9 range to detect setup wizard window, step 5.

  • Page 260

    G lobal a dministrator s ection c hapter 2: p olicy screen 238 m86 s ecurity u ser g uide 1. In the individual port field, enter the port number to be excluded from filtering. 2. Click add to include the entry in the list box above. Note: to remove the port number, select it from the list box and cl...

  • Page 261

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 239 • click finish to accept all your entries. This action takes you to the main range to detect settings window where the segment you entered now displays in the current ranges list box. Range to detect advanced s...

  • Page 262

    G lobal a dministrator s ection c hapter 2: p olicy screen 240 m86 s ecurity u ser g uide modify a segment of the network to modify a segment: 1. In the main range to detect settings window (see fig. 2:2-2), select the segment from the current ranges list box. 2. Click modify to go to the second pag...

  • Page 263: Rules Window

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 241 rules window the rules window displays when rules is selected from the global group menu. This window is used for adding a filtering rule when creating a filtering profile for an entity. Fig. 2:2-12 rules windo...

  • Page 264: Add A Rule

    G lobal a dministrator s ection c hapter 2: p olicy screen 242 m86 s ecurity u ser g uide add a rule to create a new rule: 1. Click new rule to populate the rule # field with the next consecutive rule number available. 2. Enter up to 20 characters for a unique rule description that describes the the...

  • Page 265

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 243 note: if a category group does not display any filter setting (i.E. The check mark does not display in any column for the category group), one or more library categories within that group has a filter setting i...

  • Page 266: Modify A Rule

    G lobal a dministrator s ection c hapter 2: p olicy screen 244 m86 s ecurity u ser g uide • the overall quota field becomes enabled if a quota is entered for any library group/category. By default, the enabled overall quota is turned “off”. If turned “on”, enter the number of minutes in the min fiel...

  • Page 267: Remove A Rule

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 245 5. Click save rule. Remove a rule to delete a rule: 1. Select the rule from the current rules pull-down menu. 2. Click delete rule. Global group profile window the global group profile window displays when glob...

  • Page 268: Category Profile

    G lobal a dministrator s ection c hapter 2: p olicy screen 246 m86 s ecurity u ser g uide category profile category profile displays by default when global group profile is selected from the global group menu, or when the category tab is clicked. This tab is used for assigning filter settings to cat...

  • Page 269

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 247 • block - urls in this category will be blocked. Note: if a category group does not display any filter setting (i.E. The check mark does not display in any column for the category group), one or more library ca...

  • Page 270: Port

    G lobal a dministrator s ection c hapter 2: p olicy screen 248 m86 s ecurity u ser g uide note: see the quota settings window in chapter 1: system screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas. • the overall quota field becom...

  • Page 271: Default Redirect Url

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 249 create, edit a list of service ports all service ports are filtered by default. To block a service port from being accessed by global filtering profile users: 1. Enter the port number in the port field. 2. Clic...

  • Page 272: Filter Options

    G lobal a dministrator s ection c hapter 2: p olicy screen 250 m86 s ecurity u ser g uide create, edit the redirect url 1. Specify the type of redirect url to be used: “default block page”, “authentication request form”, or “custom url”. If “custom url” is selected, enter the redirect url in the cor...

  • Page 273

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 251 control”, “url keyword filter control”. If url keyword filter control is selected, the “extend url keyword filter control” option can be selected. 2. Click apply to apply your settings. X strikes blocking with ...

  • Page 274

    G lobal a dministrator s ection c hapter 2: p olicy screen 252 m86 s ecurity u ser g uide search engine keyword filter control with the search engine keyword filter control option enabled, search engine keywords can be set up to be blocked. When a user enters a keyword in the search engine, if that ...

  • Page 275

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 253 url keyword filter control with the url keyword filter control option enabled, url keywords can be set up to be blocked. When a user enters a keyword in the address line of a browser window, if that keyword has...

  • Page 276: Override Account Window

    G lobal a dministrator s ection c hapter 2: p olicy screen 254 m86 s ecurity u ser g uide override account window the override account window displays when override account is selected from the global group menu. This window is used for creating an override account that allows an ip group user to by...

  • Page 277: Add An Override Account

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 255 add an override account to create an override account profile: 1. In the account details frame, enter the username in the name field. 2. Enter the password. 3. Make the same entry again in the confirm password ...

  • Page 278: Category Profile

    G lobal a dministrator s ection c hapter 2: p olicy screen 256 m86 s ecurity u ser g uide category profile the rule tab is used for creating the categories portion of the override account profile. Fig. 2:2-18 override account pop-up window, rule tab to create the category profile: 1. Select a filter...

  • Page 279

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 257 in the adult content category group some of the library catego- ries have a block setting and other library categories have a warn setting, there would be no category group filter setting, since all library cat...

  • Page 280

    G lobal a dministrator s ection c hapter 2: p olicy screen 258 m86 s ecurity u ser g uide • in the quota column, enter the number of minutes the user will be able to access the library group/category. The minimum number of minutes is “1” and the maximum is “1439” (one day minus one minute). The numb...

  • Page 281: Redirect Url

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 259 redirect url the redirect tab is used for specifying the url to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked. Fig. 2:2-19 override account pop-up window, ...

  • Page 282: Filter Options

    G lobal a dministrator s ection c hapter 2: p olicy screen 260 m86 s ecurity u ser g uide filter options the filter options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig. 2:2-20 override account pop-up window, filter options tab 1. Click the c...

  • Page 283

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 261 • “google/bing/yahoo!/youtube/ask/aol safe search enforcement” - with the google/yahoo!/youtube/ask/ aol safe search enforcement option enabled, google, bing.Com, yahoo!, youtube, ask.Com, and aol’s “strict” sa...

  • Page 284: Edit An Override Account

    G lobal a dministrator s ection c hapter 2: p olicy screen 262 m86 s ecurity u ser g uide • “url keyword filter control”- with the url keyword filter control option enabled, url keywords can be set up to be blocked. When the user enters a keyword in the address line of a browser window, if that keyw...

  • Page 285: Modify An Override Account

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 263 4. Make the same entry again in the confirm password field. 5. Click view/modify to open the pop-up window. 6. Click apply. 7. Click close to close the pop-up window. Modify an override account to modify an ove...

  • Page 286

    G lobal a dministrator s ection c hapter 2: p olicy screen 264 m86 s ecurity u ser g uide minimum filtering level window the minimum filtering level window displays when minimum filtering level is selected from the global group menu. This window is used for establishing the minimum filtering level t...

  • Page 287: Minimum Filtering Categories

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 265 minimum filtering categories minimum filtering categories displays by default when minimum filtering level is selected from the global group menu, or when the category tab is clicked. This tab is used for makin...

  • Page 288

    G lobal a dministrator s ection c hapter 2: p olicy screen 266 m86 s ecurity u ser g uide create, edit minimum filtering categories to create the categories portion of the minimum filtering level profile: 1. Double-click the column (pass, block) in the row corre- sponding to that category group/libr...

  • Page 289: Port

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 267 port port displays when the port tab is clicked. This tab is used for blocking access to specified ports at the minimum filtering level. Fig. 2:2-22 minimum filtering level window, port tab create, edit a list ...

  • Page 290

    G lobal a dministrator s ection c hapter 2: p olicy screen 268 m86 s ecurity u ser g uide 3. Click apply to apply your settings at the minimum filtering level. Minimum filtering bypass options minimum filtering bypass options displays when the min. Filter bypass tab is clicked. This tab is used for ...

  • Page 291: Refresh All

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 269 specify minimum filtering bypass options to allow a user to override settings made at the minimum filtering level: 1. In the override account frame, click the “on” checkbox. Any user who has an override account...

  • Page 292: Add Group

    G lobal a dministrator s ection c hapter 2: p olicy screen 270 m86 s ecurity u ser g uide ip ip includes options for adding a master ip group and to refresh the tree list. Click the ip link to view a menu of sub- topics: add group, and refresh. Add group add a master ip group from the ip group menu:...

  • Page 293: Refresh

    G lobal a dministrator s ection c hapter 2: p olicy screen m86 s ecurity u ser g uide 271 3. Enter the password, and re-enter it in the confirm password field, using eight to 20 characters and at least one alpha character, one numeric character, and one special character. The password is case sensit...

  • Page 294: Chapter 3: Library Screen

    G lobal a dministrator s ection c hapter 3: l ibrary screen 272 m86 s ecurity u ser g uide chapter 3: library screen the library screen is comprised of windows and dialog boxes used for adding and maintaining library categories. Library categories are used when creating or modifying filtering profil...

  • Page 295

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 273 click library lookup, customer feedback module, cate- gory weight system, nntp newsgroup, or pattern detec- tion whitelist to select that topic. To view the list of category groups, double-click category group...

  • Page 296: Updates

    G lobal a dministrator s ection c hapter 3: l ibrary screen 274 m86 s ecurity u ser g uide updates updates includes options for making configurations for library category activities. Click the updates link to view a menu of sub-topics: configuration, manual update, addi- tional language support, lib...

  • Page 297: Select The Log Level

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 275 optional: specify a proxy server 1. In the ftp proxy setting frame, by default “disable” is selected. Click “enable” if the server is in a proxy server environment. This selection activates the fields in this ...

  • Page 298: Manual Update Window

    G lobal a dministrator s ection c hapter 3: l ibrary screen 276 m86 s ecurity u ser g uide manual update window the manual update to m86 supplied categories window displays when manual update is selected from the updates menu. This window is used for updating specified m86 supplied library categorie...

  • Page 299

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 277 • full url library update - select this option to update url library categories with core library files, and to update search engine keywords, newsgroup libraries, and im/p2p pattern files. Choose this option ...

  • Page 300: Select Additional Languages

    G lobal a dministrator s ection c hapter 3: l ibrary screen 278 m86 s ecurity u ser g uide additional language support window the additional language support window displays when additional language support is selected from the updates menu. This window is used for including additional m86- supporte...

  • Page 301: Library Update Log Window

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 279 3. Click apply to have urls from the selected language(s) included in the library categories. Library update log window the library update log window displays when library update log is selected from the updat...

  • Page 302: Download The Log

    G lobal a dministrator s ection c hapter 3: l ibrary screen 280 m86 s ecurity u ser g uide download log, view, print contents download the log 1. Click download log to open the alert box containing a message on how to download the log file to your worksta- tion, if using windows xp. 2. Click ok to c...

  • Page 303

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 281 fig. 2:3-6 folder containing downloaded file 2. Choose “open with” and then select a zip file executable program such as “winzip executable” to launch that application: fig. 2:3-7 winzip executable program 3. ...

  • Page 304

    G lobal a dministrator s ection c hapter 3: l ibrary screen 282 m86 s ecurity u ser g uide fig. 2:3-8 winzip window 4. Right-click the zip file to open the pop-up menu, and choose “view” to open the view dialog box: fig. 2:2-9 view dialog box 5. Select “internal ascii text viewer”, and then click vi...

  • Page 305

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 283 save, print the log file contents with the log file displaying correctly formatted in winzip’s view window, if you wish to save or print the contents of this file: 1. Click clipboard copy, wait for the dialog ...

  • Page 306: Emergency Update Log Window

    G lobal a dministrator s ection c hapter 3: l ibrary screen 284 m86 s ecurity u ser g uide emergency update log window the emergency update log window displays when emer- gency update log is selected from the updates menu. This window is used for viewing transfer activity of emergency software updat...

  • Page 307

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 285 download the software update log file note: see library update log window for screen shots pertaining to downloading the software update log file. 1. Click download log to open the alert box containing a messa...

  • Page 308: Library Lookup

    G lobal a dministrator s ection c hapter 3: l ibrary screen 286 m86 s ecurity u ser g uide library lookup library lookup window the library lookup window displays when library lookup is selected from the navigation panel. This window is used for verifying whether a url or search engine keyword or ke...

  • Page 309: Remove A Url

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 287 the following types of url formats also can be entered in this field: • ip address - e.G. "209.247.228.221" in http:// 209.247.228.221 • octal format - e.G. Http://0106.0125.0226.0322 • hexadecimal short forma...

  • Page 310

    G lobal a dministrator s ection c hapter 3: l ibrary screen 288 m86 s ecurity u ser g uide submit an email to the administrator if using a non-web based email client such as outlook, you can send an email to the administrator at your organization regarding a url or search engine keyword that appears...

  • Page 311: Reload The Library

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 289 reload the library once all changes have been made to library windows, click reload library to refresh. Note: since reloading the library utilizes system resources that impact the performance of the web filter...

  • Page 312

    G lobal a dministrator s ection c hapter 3: l ibrary screen 290 m86 s ecurity u ser g uide warning: this feature is enabled by default. Please refer to the sub-section enable customer feedback module to review the contents of the disclaimer that applies when this feature is enabled. Note: for optimu...

  • Page 313

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 291 3. Scroll down to read the text in this box: “customer feedback module disclosure statement “customer feedback module shall mean the function installed on m86 security’s products used to transmit selective web...

  • Page 314

    G lobal a dministrator s ection c hapter 3: l ibrary screen 292 m86 s ecurity u ser g uide “your agreement to activate the customer feedback module will be transmitted back to m86 security once you click the ‘accept’ button.” 4. After reading this text, if you agree with the terms, click in the chec...

  • Page 315: Category Weight System

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 293 category weight system category weight system window the category weight system window displays when cate- gory weight system is selected from the navigation panel. This feature lets you choose which category ...

  • Page 316: View The Current Selections

    G lobal a dministrator s ection c hapter 3: l ibrary screen 294 m86 s ecurity u ser g uide view the current selections this window contains two list boxes: • “no weight” categories - populated with m86 supplied categories • “weight” categories - pre-populated by default with cate- gories m86 suggest...

  • Page 317: Weighting Library Categories

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 295 weighting library categories 1. Select the category from the "no weight" categories list box. Tip: multiple categories can be selected by clicking each cate- gory while pressing the ctrl key on your keyboard. ...

  • Page 318: Nntp Newsgroup

    G lobal a dministrator s ection c hapter 3: l ibrary screen 296 m86 s ecurity u ser g uide nntp newsgroup nntp newsgroup window the nntp newsgroup window displays when nntp news- group is selected from the navigation panel. This window is used for adding or removing a newsgroup from the libraries. F...

  • Page 319: Pattern Detection Whitelist

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 297 remove a newsgroup from the library to remove a newsgroup from the library: 1. In the newsgroup frame, enter the newsgroup address. 2. Click remove. After all changes have been made to library windows, click r...

  • Page 320

    G lobal a dministrator s ection c hapter 3: l ibrary screen 298 m86 s ecurity u ser g uide note: this feature can be used in conjunction with the pattern blocking feature, which, when enabled, blocks ip address patterns. (see the filter window sub-section in chapter 1: system screen.) create, mainta...

  • Page 321: Category Groups

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 299 category groups category groups is represented by a tree of library category groups, with each group comprised of m86 supplied library categories. M86 supplied library categories are updated regularly with new...

  • Page 322: Library Details Window

    G lobal a dministrator s ection c hapter 3: l ibrary screen 300 m86 s ecurity u ser g uide double-click a category group’s envelope to open that segment of the tree and to view library categories belonging to that group. Click the m86 supplied category link to view a menu of sub- topics: library det...

  • Page 323: Urls Window

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 301 urls window the urls window displays when urls is selected from the library category’s menu of sub-topics. This window is used for viewing, or adding and/or removing a url from a library category. A url is use...

  • Page 324

    G lobal a dministrator s ection c hapter 3: l ibrary screen 302 m86 s ecurity u ser g uide view a list of urls in the library category to view a list of all urls that either have been added or deleted: 1. Click the view tab. 2. Make a selection from the pull-down menu for “addition list”, “deletion ...

  • Page 325

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 303 add or remove urls, reload the library the action tab is used for making entries in the urls window for adding or removing a url, or reloading the library. Add a url to the library category to add a url to the...

  • Page 326

    G lobal a dministrator s ection c hapter 3: l ibrary screen 304 m86 s ecurity u ser g uide tip: multiple urls can be selected by clicking each url while pressing the ctrl key on your keyboard. Blocks of urls can be selected by clicking the first url, and then pressing the shift key on your keyboard ...

  • Page 327: Reload The Library

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 305 remove a url from the library category to remove a url or wildcard url from the library category: 1. Click the action tab. 2. Enter the url in the edit url list frame or edit wild- card url list frame, as pert...

  • Page 328: Url Keywords Window

    G lobal a dministrator s ection c hapter 3: l ibrary screen 306 m86 s ecurity u ser g uide url keywords window the url keywords window displays when url keywords is selected from the library category’s menu of sub-topics. This window is used for adding and removing url keywords from a library catego...

  • Page 329: View A List of Url Keywords

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 307 view a list of url keywords to view a list of all url keywords that either have been added or deleted: 1. In the view keyword addition/deletion list frame, make a selection from the pull-down menu for “additio...

  • Page 330

    G lobal a dministrator s ection c hapter 3: l ibrary screen 308 m86 s ecurity u ser g uide upload a list of url keywords to the library before uploading a text file with url keyword additions or deletions, in the upload url keyword file frame, specify whether the contents of this file will add to th...

  • Page 331: Reload The Library

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 309 upload a list of url keyword deletions to upload a text file with url keyword deletions: 1. Click upload to deletion file to open the upload library keyword pop-up window (see fig. 2:3-25). 2. Click browse... ...

  • Page 332

    G lobal a dministrator s ection c hapter 3: l ibrary screen 310 m86 s ecurity u ser g uide search engine keywords window the search engine keywords window displays when search engine keywords is selected from the library cate- gory’s menu of sub-topics. This window is used for adding and removing se...

  • Page 333

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 311 warning: use extreme caution when setting up search engine keywords for filtering. If a non-offending keyword contains the same consecutive characters as a keyword set up to be blocked, users will be denied th...

  • Page 334

    G lobal a dministrator s ection c hapter 3: l ibrary screen 312 m86 s ecurity u ser g uide remove a search engine keyword from the library to remove a search engine keyword/phrase from the library category: 1. In the edit search keyword list frame, enter up to 75 alphanumeric characters in the keywo...

  • Page 335: Reload The Library

    G lobal a dministrator s ection c hapter 3: l ibrary screen m86 s ecurity u ser g uide 313 upload a list of search engine keyword deletions to upload a text file with search engine keyword/phrase deletions: 1. Click upload to deletion to open the upload library keyword pop-up window (see fig. 2:3-25...

  • Page 336: Chapter 4: Reporting Screen

    G lobal a dministrator s ection c hapter 4: r eporting screen 314 m86 s ecurity u ser g uide chapter 4: reporting screen the reporting screen contains options for transferring and/ or reviewing internet usage data collected by the web filter. Fig. 2:4-1 reporting screen from the navigation panel at ...

  • Page 337: Report Configuration

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 315 report configuration report configuration window the report configuration window displays when report configuration is selected from the navigation panel. This window is used if a reporting application needs...

  • Page 338: M86 Enterprise Reporter

    G lobal a dministrator s ection c hapter 4: r eporting screen 316 m86 s ecurity u ser g uide m86 enterprise reporter if “m86 enterprise reporter” was selected, the m86 enter- prise reporter tab displays by default. On this tab, you need to specify criteria for the er server that will receive logs fr...

  • Page 339: Execute Log Transfer Now

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 317 execute log transfer now in the initiating log transfer frame, click initiate to transfer the log on demand. View transfer activity to the er after the er has been configured and logs have been trans- ferred...

  • Page 340

    G lobal a dministrator s ection c hapter 4: r eporting screen 318 m86 s ecurity u ser g uide fig. 2:4-5 report configuration window, other device option and tab enter or edit server information in the server configuration frame: 1. In the remote server field, enter the ip address of the remote serve...

  • Page 341

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 319 6. Click save. In the ftp log update frame: 1. At the hour field, make a selection from the pull-down menu (1, 2, 3, 4, 6, 8, 12, 24) to specify the interval between hours—in military time—when the update sh...

  • Page 342: Real Time Probe

    G lobal a dministrator s ection c hapter 4: r eporting screen 320 m86 s ecurity u ser g uide real time probe real time probe window the real time probe window displays when real time probe is selected from the navigation panel. This feature lets the probe administrator monitor a user's internet usag...

  • Page 343: Set Up Real Time Probes

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 321 set up real time probes 1. Enter the maximum probes to run/schedule simulta- neously, up to 99 probes. The default setting is 10 probes. 2. Enter the maximum probes that can be scheduled, equal to or less th...

  • Page 344: Report Recipients

    G lobal a dministrator s ection c hapter 4: r eporting screen 322 m86 s ecurity u ser g uide report recipients click the report recipients tab to display email report: fig. 2:4-7 real time probe window, report recipients tab specify email file criteria 1. Click the radio button corresponding the to ...

  • Page 345: Remove Email Addresses

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 323 note: the maximum number of report recipients is 50. If more than 50 recipients need to be included, m86 recommends setting up an email alias list for group distribution. Remove email addresses 1. Select the...

  • Page 346: Delete A Logon Account

    G lobal a dministrator s ection c hapter 4: r eporting screen 324 m86 s ecurity u ser g uide 3. Click add to include the username in the current acces- sible users list box. Note: when an authorized staff member is added to this list, that username is automatically added to the current un-accessible...

  • Page 347: Re-Login Window

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 325 go to real time probe reports gui when any administrator clicks the real time probe icon or go to real time probe reports gui, either the re-login window or the real time probe reports pop-up window opens. R...

  • Page 348: Real Time Probe Reports

    G lobal a dministrator s ection c hapter 4: r eporting screen 326 m86 s ecurity u ser g uide real time probe reports the real time probe reports window is comprised of the view and create tabs. The view tab displays by default (see fig. 2:4-11), showing the global administrator information on all ac...

  • Page 349: Create A Real Time Probe

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 327 fig. 2:4-11 real time probes introductory window this window must be left open during the entire session. Create a real time probe click the create tab to enter and specify criteria for the report you wish t...

  • Page 350

    G lobal a dministrator s ection c hapter 4: r eporting screen 328 m86 s ecurity u ser g uide the current probe count displays the total number of active probes, and the number of probes created under this account. The maximum probes to run/schedule simultaneously entered on the configuration tab dis...

  • Page 351

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 329 • “category”: select the library category to be probed. This selection generates a report with data for the specified library category. Note: up to 250 characters will be accepted for the ip address, user na...

  • Page 352: View Real Time Probe Details

    G lobal a dministrator s ection c hapter 4: r eporting screen 330 m86 s ecurity u ser g uide view real time probe details click the view tab to view details about active probes: fig. 2:4-13 real time probe reports, view tab the display name shows the name assigned to the probe on the create tab. The...

  • Page 353

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 331 view option if a probe is completed or in progress, clicking view opens the real time information box: fig. 2:4-14 real time information box this box displays the number of minutes left for the probe to run ...

  • Page 354

    G lobal a dministrator s ection c hapter 4: r eporting screen 332 m86 s ecurity u ser g uide • after the probe is completed, the email button is avail- able instead of the stop button. Clicking email opens the email option dialog box in which you specify an email address to send the completed report...

  • Page 355

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 333 stop, delete options clicking stop halts the probe and gives it a completed status. This option is also available in the real time infor- mation box via the “stop” button. Clicking delete opens the following...

  • Page 356: Shadow Log Format

    G lobal a dministrator s ection c hapter 4: r eporting screen 334 m86 s ecurity u ser g uide shadow log format shadow log format window the shadow log format window displays when shadow log format is selected from the navigation panel. If the web filter's reporting device is the m86 enterprise repor...

  • Page 357: Auto-Detect Option

    G lobal a dministrator s ection c hapter 4: r eporting screen m86 s ecurity u ser g uide 335 auto-detect option by default, “auto-detect” is selected. Using this option, the web filter will search for a connection to an er and identify the software version of the software update applied to that appl...

  • Page 358: Post 2.0 Log Format Option

    G lobal a dministrator s ection c hapter 4: r eporting screen 336 m86 s ecurity u ser g uide post 2.0 log format option if this web filter currently has the 2.0 or higher software update applied, the post 2.0 log option should be selected, since the er 4.1 or higher software update uses the new log ...

  • Page 359: Roup

    G roup a dministrator s ection i ntroduction m86 s ecurity u ser g uide 337 g roup a dministrator s ection introduction the group administrator section of this user guide is comprised of two chapters that include information on func- tions performed by the group administrator. Chapter 1 includes inf...

  • Page 360: Chapter 1: Policy Screen

    G roup a dministrator s ection c hapter 1: p olicy screen 338 m86 s ecurity u ser g uide chapter 1: policy screen group administrators use policy screen windows to add members to a master ip group, create sub-groups and/or individual ip members, and define and maintain members’ filtering profiles. A...

  • Page 361: Refresh

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 339 ip refresh refresh the master ip group, member click refresh whenever a change has been made to the master ip group or member level of the tree. Fig. 3:1-2 policy screen, ip menu.

  • Page 362: Master Ip Group

    G roup a dministrator s ection c hapter 1: p olicy screen 340 m86 s ecurity u ser g uide master ip group master ip group includes options for defining and main- taining group accounts, setting up an override account and/ or exception urls to bypass global settings, and uploading or downloading ip pr...

  • Page 363: Members Window

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 341 to change the password for this group: 1. Enter the password in the password and confirm pass- word fields, using eight to 20 characters and at least one alpha character, one numeric character, and one special c...

  • Page 364

    G roup a dministrator s ection c hapter 1: p olicy screen 342 m86 s ecurity u ser g uide add the ip address of the member if using the invisible or router mode: 1. Specify whether to add an ip address range with or without a netmask by selecting either “source ip” or “source ip start / end”. • if “s...

  • Page 365: Override Account Window

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 343 override account window the override account window displays when override account is selected from the menu. This window is used for creating an override account that allows an end user from a master ip group t...

  • Page 366: Add An Override Account

    G roup a dministrator s ection c hapter 1: p olicy screen 344 m86 s ecurity u ser g uide how a user with an override account can authenticate if a pop-up blocker is installed on his/her workstation. Add an override account to create an override account profile: 1. In the account details frame, enter...

  • Page 367: Category Profile

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 345 category profile the rule tab is used for creating the categories portion of the override account profile. Fig. 3:1-6 override account pop-up window, rule tab to create the category profile: 1. Select a filterin...

  • Page 368

    G roup a dministrator s ection c hapter 1: p olicy screen 346 m86 s ecurity u ser g uide in the adult content category group some of the library catego- ries have a block setting and other library categories have a warn setting, there would be no category group filter setting, since all library cate...

  • Page 369

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 347 • in the quota column, enter the number of minutes the user will be able to access the library group/category. The minimum number of minutes is “1” and the maximum is “1439” (one day minus one minute). The numbe...

  • Page 370: Redirect Url

    G roup a dministrator s ection c hapter 1: p olicy screen 348 m86 s ecurity u ser g uide redirect url the redirect tab is used for specifying the url to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked. Fig. 3:1-7 override account pop-up window, re...

  • Page 371: Filter Options

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 349 filter options the filter options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig. 3:1-8 override account pop-up window, filter options tab click the checkb...

  • Page 372

    G roup a dministrator s ection c hapter 1: p olicy screen 350 m86 s ecurity u ser g uide aol’s “strict” safesearch filtering option will be used whenever the end user performs a google, bing.Com, yahoo!, youtube, ask.Com, or aol web search or image search. Warning: if this option is used in conjunct...

  • Page 373: Edit An Override Account

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 351 note: to set up url keywords in a url keywords window, see the url keywords window in chapter 2. Edit an override account change the password to change an override account’s password: 1. In the current accounts ...

  • Page 374: Delete An Override Account

    G roup a dministrator s ection c hapter 1: p olicy screen 352 m86 s ecurity u ser g uide delete an override account to delete an override account: 1. In the current accounts frame, select the username from the list box. 2. Click remove. Group profile window the group profile window displays when gro...

  • Page 375

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 353 fig. 3:1-9 group profile window, profile tab note: in order to use this tab, filtering rules profiles must already have been set up by the global administrator. By default, “rule0 minimum filtering level” displa...

  • Page 376

    G roup a dministrator s ection c hapter 1: p olicy screen 354 m86 s ecurity u ser g uide tip: in the category groups tree, double-click the group enve- lope to open that segment of the tree and to view library catego- ries belonging to that group. Note: if a category group does not display any filte...

  • Page 377

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 355 4. To use the quota feature to restrict the end user’s access to a passed library group/category, do the following: • in the quota column, enter the number of minutes the user will be able to access the library ...

  • Page 378: Redirect Url

    G roup a dministrator s ection c hapter 1: p olicy screen 356 m86 s ecurity u ser g uide redirect url redirect url displays when the redirect url tab is clicked. This tab is used for specifying the url to be used for redirecting users who attempt to access a site or service set up to be blocked at t...

  • Page 379: Filter Options

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 357 filter options filter options displays when the filter options tab is clicked. This tab is used for specifying which filter option(s) will be applied to the group’s filtering profile. Fig. 3:1-11 group profile w...

  • Page 380

    G roup a dministrator s ection c hapter 1: p olicy screen 358 m86 s ecurity u ser g uide note: see the x strikes blocking window in chapter 1: system screen of the global group section for information on setting up the x strikes blocking feature. Google/bing/yahoo!/youtube/ask/aol safe search enforc...

  • Page 381

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 359 notes: search engine keyword filtering relies on an exact keyword match. For example, if the word “sex” is set up to be blocked, but “sexes” is not set up to be blocked, a search will be allowed on “sexes” but n...

  • Page 382: Exception Url Window

    G roup a dministrator s ection c hapter 1: p olicy screen 360 m86 s ecurity u ser g uide exception url window the exception url window displays when exception url is selected from the group menu. This window is used for blocking group members’ access to specified urls and/or for letting group member...

  • Page 383: Valid Url Entries

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 361 valid url entries the following types of url entries are accepted in this window: • formats such as: http://www.Coors.Com, www.Coors.Com, or coors.Com • ip address - e.G. "209.247.228.221" in http:// 209.247.228...

  • Page 384

    G roup a dministrator s ection c hapter 1: p olicy screen 362 m86 s ecurity u ser g uide add urls to block url or bypass url frame to block or bypass specified urls, in the block url or the bypass url frame: 1. Type the url to be blocked in the block urls field, or the url to be bypassed in the bypa...

  • Page 385

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 363 the message “url can be added, but conflicting urls will be removed” applies to any url that the query found included in the opposite frame of the exception url window. When this scenario occurs, for each confli...

  • Page 386

    G roup a dministrator s ection c hapter 1: p olicy screen 364 m86 s ecurity u ser g uide remove urls from block url or bypass url frame to remove urls from the block url or the bypass url frame: 1. Select a url to be removed from the block url / bypass url list box; your selection populates the bloc...

  • Page 387: Apply Settings

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 365 3. Click remove selected to close the pop-up window and to remove your selection(s) from the appropriate url list box. Apply settings click apply to apply your settings after adding or removing any urls. Time pr...

  • Page 388: Add A Time Profile

    G roup a dministrator s ection c hapter 1: p olicy screen 366 m86 s ecurity u ser g uide add a time profile to create a time profile: 1. Click add to open the adding time profile pop-up box: fig. 3:1-17 adding time profile 2. Type in three to 20 alphanumeric characters—the under- score ( _ ) charact...

  • Page 389

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 367 a. Select from a list of time slots incremented by 15 minutes: “12:00” to “11:45”. By default, the start field displays the closest 15-minute future time, and the end field displays a time that is one hour ahead...

  • Page 390

    G roup a dministrator s ection c hapter 1: p olicy screen 368 m86 s ecurity u ser g uide if 5 is entered, this profile will be used every five days at the specified time. • weekly - if this selection is made, enter the interval for the weeks this time profile will be used, and specify the day(s) of ...

  • Page 391

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 369 first enter the year(s) for the interval. By default “1” displays, indicating this time profile will be used each year. Next, choose from one of two options to specify the day of the month for the interval: • th...

  • Page 392

    G roup a dministrator s ection c hapter 1: p olicy screen 370 m86 s ecurity u ser g uide 7. Click each of the tabs (rule, redirect, filter options, exception) and specify criteria to complete the time profile. (see category profile, redirect url, filter options, and exception url in this sub-section...

  • Page 393: Category Profile

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 371 category profile the rule tab is used for creating the categories portion of the time profile. Fig. 3:1-19 time profile pop-up window, rule tab note: see the override account window, category profile sub- sectio...

  • Page 394: Redirect Url

    G roup a dministrator s ection c hapter 1: p olicy screen 372 m86 s ecurity u ser g uide redirect url the redirect tab is used for specifying the url to be used for redirecting users who attempt to access a site or service set up to be blocked. Fig. 3:1-20 time profile pop-up window, redirect url ta...

  • Page 395: Filter Options

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 373 filter options the filter options tab is used for specifying which filter option(s) will be applied to the time profile. Fig. 3:1-21 time profile pop-up window, filter options tab note: see the override account ...

  • Page 396: Exception Url

    G roup a dministrator s ection c hapter 1: p olicy screen 374 m86 s ecurity u ser g uide exception url the exception tab is used for allowing users to be blocked from accessing specified urls and/or to be allowed to access specified urls blocked at the minimum filtering level. Fig. 3:1-22 time profi...

  • Page 397: Modify A Time Profile

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 375 modify a time profile to modify an existing time profile: 1. Select the time profile from the current time profiles list box. 2. Click view/modify to open the modify time profiles pop- up window. 3. Make modific...

  • Page 398: Upload Ip Profiles

    G roup a dministrator s ection c hapter 1: p olicy screen 376 m86 s ecurity u ser g uide upload/download ip profile window the ip profile management window displays when upload/ download ip profile is selected from the group menu. This window is used for uploading or downloading a text file containi...

  • Page 399

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 377 note: leave the refresh page open until the file containing the profile has been uploaded. 2. Click browse... To open the choose file window in which you find and select the file containing the ip profiles to be...

  • Page 400: Download Profile

    G roup a dministrator s ection c hapter 1: p olicy screen 378 m86 s ecurity u ser g uide download profile if profiles have been created and/or uploaded to the server: 1. Click download profile to open a browser window containing the profiles: fig. 3:1-26 download ip profiles window the contents of t...

  • Page 401: Add Sub Group

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 379 add sub group add an ip sub group from the group menu: 1. Click add sub group to open the create sub group dialog box: fig. 3:1-27 create sub group box 2. Enter the group name for the sub-group. Notes: the name ...

  • Page 402: Add Individual Ip

    G roup a dministrator s ection c hapter 1: p olicy screen 380 m86 s ecurity u ser g uide add individual ip add an individual ip member from the group menu: 1. Click add individual ip to open the create individual ip dialog box: fig. 3:1-28 create individual ip box 2. Enter the member name for the in...

  • Page 403: Delete Group

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 381 delete group delete a master ip group profile to delete a group profile, choose delete group from the group menu. This action removes the master ip group from the tree. Paste sub group the paste sub group functi...

  • Page 404: Sub Group

    G roup a dministrator s ection c hapter 1: p olicy screen 382 m86 s ecurity u ser g uide sub group sub group includes options for creating and maintaining the filtering profile for the sub-group. Click the sub-group’s link to view a menu of sub-topics: sub group details, members, sub group profile, ...

  • Page 405: Add Ip Sub-Group Details

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 383 • memberip address and netmask or ip address range, and mac address(es) if using the mobile mode. Note: see appendix d: mobile client for information on using the mobile mode. Add ip sub-group details if the sub...

  • Page 406: Members Window

    G roup a dministrator s ection c hapter 1: p olicy screen 384 m86 s ecurity u ser g uide 3. Click apply to save your entries. Once applied, the member fields become greyed-out and the apply button becomes deactivated (see fig. 3:1-30). Members window the members window displays when members is selec...

  • Page 407: Modify Sub-Group Members

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 385 modify sub-group members the modify sub group member frame is comprised of the ip address and mac address frames. 1. In the ip address frame, specify whether to add or edit an ip address range with or without a ...

  • Page 408: Exception Url Window

    G roup a dministrator s ection c hapter 1: p olicy screen 386 m86 s ecurity u ser g uide exception url window the exception url window displays when exception url is selected from the sub-group menu. This window is used for blocking sub-group members’ access to specified urls and/or for letting sub-...

  • Page 409: Copy Sub Group

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 387 copy sub group the copy sub group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists. Copy an ip sub-g...

  • Page 410: Individual Ip

    G roup a dministrator s ection c hapter 1: p olicy screen 388 m86 s ecurity u ser g uide individual ip individual ip includes options for creating and maintaining the filtering profile for the individual ip member. Click the individual ip member’s link to view a menu of sub-topics: members, individu...

  • Page 411: Individual Ip Profile Window

    G roup a dministrator s ection c hapter 1: p olicy screen m86 s ecurity u ser g uide 389 enter the ip address of the member in the modify individual group member frame: 1. Enter the ip address in the member field. 2. Click modify to apply your changes. Individual ip profile window the individual ip ...

  • Page 412: Delete Individual Ip

    G roup a dministrator s ection c hapter 1: p olicy screen 390 m86 s ecurity u ser g uide note: see the time profile window in the policy tree section of this chapter for information on entries that can be made for the following components of the filtering profile: category profile, redirect url, fil...

  • Page 413: Chapter 2: Library Screen

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 391 chapter 2: library screen group administrators use windows and dialog boxes in the library screen to look up urls and to add and maintain custom library categories for a group. Library categories are used when ...

  • Page 414: Library Lookup

    G roup a dministrator s ection c hapter 2: l ibrary screen 392 m86 s ecurity u ser g uide library lookup library lookup window the library lookup window displays when library lookup is selected from the navigation panel. This window is used for verifying whether or not a url or search engine keyword...

  • Page 415: Look Up A Url

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 393 look up a url 1. In the url lookup frame, enter the url. For example, enter http://www.Coors.Com, coors.Com, or use a wild- card by entering *.Coors.Com. A wildcard entry finds all urls containing text that fol...

  • Page 416

    G roup a dministrator s ection c hapter 2: l ibrary screen 394 m86 s ecurity u ser g uide look up a search engine keyword to see if a search engine keyword or keyword phrase has been included in any library category: 1. In the search engine keyword lookup frame, enter the search engine keyword or ke...

  • Page 417: Custom Categories

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 395 custom categories custom categories includes options for adding a custom category to the tree list and to refresh the menu. Click the custom categories link to view a menu of topics: add cate- gory, and refresh...

  • Page 418: Add Category

    G roup a dministrator s ection c hapter 2: l ibrary screen 396 m86 s ecurity u ser g uide add category a unique custom library category should be created only if it does not exist in the category groups tree, and if any sub- group needs to use that library category. Custom library categories for a g...

  • Page 419: Refresh

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 397 note: the category must have urls, url keywords, and/or search keywords added to its profile in order for it to be effective. Refresh refresh the library click refresh after uploading a file to a customized lib...

  • Page 420: Custom Library Category

    G roup a dministrator s ection c hapter 2: l ibrary screen 398 m86 s ecurity u ser g uide custom library category when a custom library category is created, its long name displays in the custom categories tree list. Click the custom library category link to view a menu of sub-topics: library details...

  • Page 421: Library Details Window

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 399 library details window the library details window displays when library details is selected from the library category’s menu of sub-topics. This window is used for editing the long name of the custom library ca...

  • Page 422: Urls Window

    G roup a dministrator s ection c hapter 2: l ibrary screen 400 m86 s ecurity u ser g uide urls window the urls window displays when urls is selected from the custom library category’s menu of sub-topics. This window is used for viewing, adding and/or removing a url from a custom library category’s m...

  • Page 423

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 401 view a list of urls in the library category to view a list of all urls that either have been added or deleted from the master url list or master wildcard url list: 1. Click the view tab. 2. Make a selection fro...

  • Page 424

    G roup a dministrator s ection c hapter 2: l ibrary screen 402 m86 s ecurity u ser g uide add or remove urls or wildcard urls the action tab is used for making entries in the urls window for adding or removing a url or wildcard url, uploading a master url list or master wildcard url list, or reloadi...

  • Page 425

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 403 tip: multiple urls can be selected by clicking each url while pressing the ctrl key on your keyboard. Blocks of urls can be selected by clicking the first url, and then pressing the shift key on your keyboard w...

  • Page 426

    G roup a dministrator s ection c hapter 2: l ibrary screen 404 m86 s ecurity u ser g uide remove a url from the library category to remove a url or wildcard url from the library category: 1. Click the action tab. 2. Enter the url in the edit url list frame or edit wild- card url list frame, as perti...

  • Page 427

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 405 upload a master list to the library upload a master list of urls to upload a master file with url additions: 1. Click upload master to open the upload custom library url pop-up window: fig. 3:2-9 upload custom ...

  • Page 428

    G roup a dministrator s ection c hapter 2: l ibrary screen 406 m86 s ecurity u ser g uide 4. Click upload file to display the results of the library file content validation in the library file content/ip lookup options pop-up window: fig. 3:2-10 library file content/ip lookup options urls contained ...

  • Page 429

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 407 selected, an ip lookup for ip addresses that correspond to urls in the uploaded file will not be performed. B. Click upload to open the upload successful pop-up window. Note: in order for the urls to take effec...

  • Page 430: Reload The Library

    G roup a dministrator s ection c hapter 2: l ibrary screen 408 m86 s ecurity u ser g uide note: before the file is uploaded to the server, it will first be vali- dated . 4. Click upload file to display the results of the library file content validation in the library file content/ip lookup options p...

  • Page 431: Url Keywords Window

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 409 note: since reloading the library utilizes system resources that impact the performance of the web filter, m86 recommends clicking reload library only after modifications to all library windows have been made. ...

  • Page 432: View A List of Url Keywords

    G roup a dministrator s ection c hapter 2: l ibrary screen 410 m86 s ecurity u ser g uide warning: use extreme caution when setting up url keywords for filtering. If a keyword contains the same consecutive charac- ters as a keyword set up to be blocked, users will be denied access to urls that are n...

  • Page 433: Reload The Library

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 411 upload a list of url keywords to the library to upload a text file containing url keyword additions: 1. In the upload master url keyword file frame, click upload master to open the upload library keyword pop-up...

  • Page 434

    G roup a dministrator s ection c hapter 2: l ibrary screen 412 m86 s ecurity u ser g uide search engine keywords window the search engine keywords window displays when search engine keywords is selected from the custom library category’s menu of sub-topics. This window is used for adding and removin...

  • Page 435

    G roup a dministrator s ection c hapter 2: l ibrary screen m86 s ecurity u ser g uide 413 able to run a search on a subject such as “cotton gin”. However, if the word “sex” is set up to be blocked, a search will be allowed on “sexes” but not “sex” since a search engine keyword must exactly match a w...

  • Page 436: Reload The Library

    G roup a dministrator s ection c hapter 2: l ibrary screen 414 m86 s ecurity u ser g uide upload a master list of search engine keywords to upload a master list containing search engine keyword/ phrase additions: 1. In the upload search keywords file frame, click upload master to open the upload lib...

  • Page 437: Echnical

    T echnical s upport / p roduct w arranties t echnical s upport m86 s ecurity u ser g uide 413 t echnical s upport / p roduct w arranties technical support for technical support, visit m86 security’s technical support web page at http://www.M86security.Com/ support/ or contact us by phone, by email, ...

  • Page 438: E-Mail

    T echnical s upport / p roduct w arranties t echnical s upport 414 m86 s ecurity u ser g uide e-mail for non-emergency assistance, email us at support@m86security.Com office locations and phone numbers m86 corporate headquarters (usa) 828 west taft avenue orange, ca 92865-4232 usa local : 714.282.61...

  • Page 439: Support Procedures

    T echnical s upport / p roduct w arranties t echnical s upport m86 s ecurity u ser g uide 415 support procedures when you contact our technical support department: • you will be greeted by a technical professional who will request the details of the problem and attempt to resolve the issue directly....

  • Page 440: Product Warranties

    T echnical s upport / p roduct w arranties p roduct w arranties 416 m86 s ecurity u ser g uide product warranties standard warranty m86 security warrants the medium on which the m86 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “...

  • Page 441

    T echnical s upport / p roduct w arranties p roduct w arranties m86 s ecurity u ser g uide 417 technical support and service m86 security will provide initial installation support and technical support for up to 90 days following installation. M86 security provides after-hour emergency support to m8...

  • Page 442: Extended Warranty (Optional)

    T echnical s upport / p roduct w arranties p roduct w arranties 418 m86 s ecurity u ser g uide extended warranty (optional) the extended warranty applies to hardware and software of the product(s) except any misuse or modification of the product(s), or product(s) located outside of the united states...

  • Page 443: Ppendices

    A ppendices s ection a ppendix a m86 s ecurity u ser g uide 421 a ppendices s ection appendix a filtering profile format and rules a filtering profile must be set up in a specified format, containing the following items: 1. The username or group name 2. Ip address or mac address 3. Filtering profile...

  • Page 444: Rule Criteria

    A ppendices s ection a ppendix a 422 m86 s ecurity u ser g uide rule criteria rule criteria consists of selections made from the following lists of codes that are used in profile strings: • port command codes: a = filter all ports b = filter the defined port number(s) i = open all ports j = open the...

  • Page 445

    A ppendices s ection a ppendix a m86 s ecurity u ser g uide 423 • category command codes: category command codes must be entered in the following order: j, r, m, i. “passed” should either be entered after j, r, or m, or after a string of category codes following j, r, or m. J = positioned before the...

  • Page 446

    A ppendices s ection a ppendix a 424 m86 s ecurity u ser g uide • filter option codes: • 0x1 = exception url query (always enabled) • 0x2 = x strikes blocking • 0x4 = google/bing/yahoo!/youtube/ask/aol safe search enforcement • 0x100 = search engine keyword • 0x200 = url keyword • 0x1000= extend url...

  • Page 447: Appendix B

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 425 appendix b create a custom block page m86 offers ways for you to customize the block page so that the page can have a different look while retaining the infor- mation/functionality provided in m86’s default block page. Note: the solutio...

  • Page 448: 2. Exclude Filtering Ip

    A ppendices s ection a ppendix b 426 m86 s ecurity u ser g uide http://[:]/ ?Url=&ip= ip>&cat=&user= 2. Exclude filtering ip 1. Go to: gui: policy > global group > range to detect 2. Input the ip address under “destination ip” > ”exclude ip” without excluding this ip address, the web filter may capt...

  • Page 449: (Optional)

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 427 show m86’s information in the block page (optional) the following information is passed to the through the query string: implement the “further option” (optional) the “further option” is included in m86’s default block page. If used, th...

  • Page 450

    A ppendices s ection a ppendix b 428 m86 s ecurity u ser g uide customized block page examples the examples in the reference portion of this appendix illustrate how form data is parsed and posted in the custom- ized block page. Examples include: 1. Html (using java script to parse/post form data) 2....

  • Page 451: Reference

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 429 reference html function parsedata(str, start, end) { result = ""; i = str.Indexof(start); if (i >= 0) { len = str.Length; substr = str.Substr(i+start.Length, len - start.Length); j = substr.Indexof(end); if ( j > 0) { result = substr.Su...

  • Page 452

    A ppendices s ection a ppendix b 430 m86 s ecurity u ser g uide user = parsedata(query, "user=", "&"); document.Block.User.Value = user; } } function showdata(){ document.Write("url:" + document.Block.Url.Value + ""); document.Write("ip:" + document.Block.Ip.Value + ""); document.Write("cat:" + docu...

  • Page 453: Cgi Written In Perl

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 431 cgi written in perl there are two methods for cgi written in perl: one lets you embed data in the query string to pass data to the options cgi, and the other lets you use java script to post form data to the options cgi. Embed data in q...

  • Page 454

    A ppendices s ection a ppendix b 432 m86 s ecurity u ser g uide print "for further options, :81/ cgi/ block.Cgi?Url=$url&ip=$ip&cat=$cat&user=$user&step=step2\">click here"; print " "; print " "; use java script to post form data #!/usr/bin/perl # original filename: cusp_block2.Cgi # file type...

  • Page 455

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 433 print " print " print " value=\"_block_site_\">"; print ""; print ""; print ""; print ""; print ""; print "web filter customized block page (cgi written with perl using java script to post form data)"; print "url: $url";...

  • Page 456: Cgi Written In C

    A ppendices s ection a ppendix b 434 m86 s ecurity u ser g uide cgi written in c /* * cusc_block.C * description: sample c source code of cgi for customized block page * replace with real ip and recompile before using * revision: 1 * date: 03/08/2004 */ #include struct { char *name; char *val; } ent...

  • Page 457

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 435 unescape_url(paramv); paramn = (char *)makeword(paramv, '='); to_upper(paramn); if (strcmp(paramn, "ip") == 0) strcpy(szip, paramv); else if (strcmp(paramn, "url") == 0) strcpy(szurl, paramv); else if (strcmp(paramn, "cat") == 0) strcpy...

  • Page 458

    A ppendices s ection a ppendix b 436 m86 s ecurity u ser g uide { printf(""); printf(" printf(""); printf("function do_options()"); printf("{"); printf("document.Block.Action=\"http://:81/cgi/ block.Cgi\""); printf("document.Block.Submit()"); printf("}"); printf(""); printf(""); pr...

  • Page 459

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 437 { url[x] = x2c(&url[y+1]); y+=2; } } url[x] = '\0'; } char x2c(char *what) { register char digit; digit = (what[0] >= 'a' ? ((what[0] & 0xdf) - 'a')+10 : (what[0] - '0')); digit *= 16; digit += (what[1] >= 'a' ? ((what[1] & 0xdf) - 'a')...

  • Page 460

    A ppendices s ection a ppendix b 438 m86 s ecurity u ser g uide char *word; int ll; wsize = 102400; ll=0; word = (char *) malloc(sizeof(char) * (wsize + 1)); while(1) { word[ll] = (char)fgetc(f); if(ll==wsize) { word[ll+1] = '\0'; wsize+=102400; word = (char *)realloc(word,sizeof(char)*(wsize+1)); }...

  • Page 461

    A ppendices s ection a ppendix b m86 s ecurity u ser g uide 439 } void getquery(char *paramd, char **paramv) { if (paramd == null) *paramv = null; else *paramv = (char *)strtok(paramd, "&"); } void getnextquery(char **paramv) { *paramv = (char *)strtok(null, "&"); }.

  • Page 462: Appendix C

    A ppendices s ection a ppendix c 440 m86 s ecurity u ser g uide appendix c override pop-up blockers an override account user with pop-up blocking software installed on his/her workstation will need to temporarily disable pop-up blocking in order to authenticate him/herself via the options page: fig....

  • Page 463

    A ppendices s ection a ppendix c m86 s ecurity u ser g uide 441 yahoo! Toolbar pop-up blocker if pop-up blocking is enabled 1. In the options page (see fig. C-1), enter your username and password. 2. Press and hold the ctrl key on your keyboard while simultaneously clicking the override button—this ...

  • Page 464

    A ppendices s ection a ppendix c 442 m86 s ecurity u ser g uide fig. C-3 allow pop-ups from source 3. Select the source from the sources of recently blocked pop-ups list box to activate the allow button. 4. Click allow to move the selected source to the always allow pop-ups from these sources list b...

  • Page 465

    A ppendices s ection a ppendix c m86 s ecurity u ser g uide 443 google toolbar pop-up blocker if pop-up blocking is enabled 1. In the options page (see fig. C-1), enter your username and password. 2. Press and hold the ctrl key on your keyboard while simultaneously clicking the override button—this ...

  • Page 466: Adwaresafe Pop-Up Blocker

    A ppendices s ection a ppendix c 444 m86 s ecurity u ser g uide adwaresafe pop-up blocker if pop-up blocking is enabled 1. In the options page (see fig. C-1), enter your username and password. 2. Press and hold the ctrl key on your keyboard while simultaneously clicking the override button—this acti...

  • Page 467

    A ppendices s ection a ppendix c m86 s ecurity u ser g uide 445 mozilla firefox pop-up blocker add override account to the white list 1. From the firefox browser, go to the toolbar and select tools > options to open the options dialog box. 2. Click the content tab at the top of this box to open the ...

  • Page 468

    A ppendices s ection a ppendix c 446 m86 s ecurity u ser g uide fig. C-7 mozilla firefox pop-up window exceptions 4. Enter the address of the web site to let the override account window pass. 5. Click allow to add the url to the list box section below. 6. Click close to close the allowed sites - pop...

  • Page 469: Set Up Pop-Up Blocking

    A ppendices s ection a ppendix c m86 s ecurity u ser g uide 447 windows xp sp2 pop-up blocker set up pop-up blocking there are two ways to enable the pop-up blocking feature in the ie browser. Use the internet options dialog box 1. From the ie browser, go to the toolbar and select tools > internet o...

  • Page 470: Use The Ie Toolbar

    A ppendices s ection a ppendix c 448 m86 s ecurity u ser g uide use the ie toolbar in the ie browser, go to the toolbar and select tools > pop- up blocker > turn on pop-up blocker: fig. C-9 toolbar setup when you click turn on pop-up blocker, this menu selec- tion changes to turn off pop-up blocker ...

  • Page 471: Use The Ie Toolbar

    A ppendices s ection a ppendix c m86 s ecurity u ser g uide 449 add override account to the white list there are two ways to disable pop-up blocking for the over- ride account and to add the override account to your white list. Use the ie toolbar 1. With pop-up blocking enabled, go to the toolbar an...

  • Page 472: Use The Information Bar

    A ppendices s ection a ppendix c 450 m86 s ecurity u ser g uide use the information bar with pop-up blocking enabled, the information bar can be set up and used for viewing information about blocked pop- ups or allowing pop-ups from a specified site. Set up the information bar 1. Go to the toolbar a...

  • Page 473

    A ppendices s ection a ppendix c m86 s ecurity u ser g uide 451 3. Click the information bar for settings options: fig. C-12 information bar menu options 4. Select always allow pop-ups from this site—this action opens the allow pop-ups from this site? Dialog box: fig. C-13 allow pop-ups dialog box 5...

  • Page 474: Appendix D

    A ppendices s ection a ppendix d 452 m86 s ecurity u ser g uide appendix d mobile client mobile client performs internet filtering and blocking on mobile pcs physically located outside your organization. This product is comprised of a web filter configured to use the mobile mode, profiles of end use...

  • Page 475: Environment Requirements

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 453 environment requirements workstation requirements system requirements for the administrator include the following: • web filter must be configured to use the mobile mode option • session cookies from the web filter must be allowed in or...

  • Page 476: Network Requirement

    A ppendices s ection a ppendix d 454 m86 s ecurity u ser g uide network requirement • high speed connection from the web filter to mobile pcs remote filtering components • mobile client software installed on each end user’s mobile pc work flow overview mobile client installed on a mobile pc for mobi...

  • Page 477: Network Operations Overview

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 455 network operations overview mobile client on the network mobile client 1. A url request is made from an end user’s mobile pc to access inappropriate content on the internet. 2. The mobile client installed on the end user’s workstation s...

  • Page 478: Mobile Server Section

    A ppendices s ection a ppendix d 456 m86 s ecurity u ser g uide mobile server section the mobile server section of this user guide contains infor- mation on how to set up and configure the web filter’s hard- ware and software to be used with the mobile client. Initial setup the basic requirements fo...

  • Page 479

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 457 configure the web filter to use the mobile mode the operation mode window is used for setting up the web filter to use the mobile mode for filtering mobile pcs. 1. In the mode frame, choose either “mobile only” or one of the filtering m...

  • Page 480

    A ppendices s ection a ppendix d 458 m86 s ecurity u ser g uide exception url, ldap authentication, and warn and quota filter settings. (an end user with categories blocked in his/her profile will be blocked from categories with a warn or quota setting instead of receiving a warning or quota page. I...

  • Page 481

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 459 notes: follow steps 2-3 for each mac address to be added. To remove a member from the current members list box, select the mac address from the list box, and then click remove. Select mac addresses for a sub group in the mobile mode, th...

  • Page 482: View Sub Group Mac Addresses

    A ppendices s ection a ppendix d 460 m86 s ecurity u ser g uide • to remove mac addresses from the sub-group, select each sub-group by highlighting it in the member mac(s) list box, and then clicking the right arrow to move the item(s) to the available mac(s) list box. Tips: multiple mac addresses c...

  • Page 483

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 461 if the sub-group has been completely defined, ip address criteria was entered in the ip address frame and saved in this window. Add a mac address to an individual member when using the mobile mode, the individual ip’s member window is u...

  • Page 484

    A ppendices s ection a ppendix d 462 m86 s ecurity u ser g uide upload mac address file for ip group a file containing multiple mac addresses can be uploaded to the master ip group using the upload/download ip profile window. Fig. D-6 master ip group’s upload/download ip profile window warning: any ...

  • Page 485: Troubleshoot Mac Addresses

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 463 troubleshoot mac addresses when using the mobile mode, the active profile lookup is used for verifying whether an entity has an active filtering profile for his/her mac address. This window also is used for troubleshooting synchronizati...

  • Page 486: Mobile Client Section

    A ppendices s ection a ppendix d 464 m86 s ecurity u ser g uide mobile client section the mobile client section of this user guide contains infor- mation on how the windows network administrator uses the mobile client deployment kit to install the mobile client on a windows or macintosh network, con...

  • Page 487

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 465 download and install the deployment kit to download the mobile client deployment kit to your machine: 1. Insert the cd-rom—that was packaged in the carton containing your web filter appliance—into your machine. 2. After launching the st...

  • Page 488

    A ppendices s ection a ppendix d 466 m86 s ecurity u ser g uide fig. D-9 end user license agreement 5. Click next to go to the choose setup type step, and select the setup option for installing the mobile client: “typical”, “custom”, “complete”: fig. D-10 choose setup type 6. Click next to proceed w...

  • Page 489

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 467 fig. D-11 installation process ready to begin 7. Click install to begin the installation process. The following page displays when the installation process is complete: fig. D-12 installation complete 8. Click finish to close the wizard...

  • Page 490

    A ppendices s ection a ppendix d 468 m86 s ecurity u ser g uide access the mobile client deployment tool window once the mobile client deployment kit is installed on your machine, the mobile client deployment tool window (see fig. D-13) and package configuration window (see fig. D- 15) are used for ...

  • Page 491: Configure A New Package Set

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 469 configure a new package set 1. In the mobile client deployment tool window, go to file > new package... To open the choose product version dialog box: fig. D-14 choose product version dialog box 2. Select the mobile client software vers...

  • Page 492: Specify Package Criteria

    A ppendices s ection a ppendix d 470 m86 s ecurity u ser g uide the package configuration window is comprised of the following frames: package information, network settings, automatic update settings, and application options settings. Note: to exit the package configuration window at any time before...

  • Page 493: Configure Network Settings

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 471 configure network settings the network settings frame includes fields for entering ip addresses of host servers used for filtering mobile worksta- tions and in-house workstations, and proxy server criteria— the latter, if a proxy server...

  • Page 494

    A ppendices s ection a ppendix d 472 m86 s ecurity u ser g uide add, remove internal filter host server note: entries made in this portion of the user interface are optional. If you have one filter host server on your network, the ip address would be the same ip address you entered for the mobile fi...

  • Page 495

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 473 add proxy address or host name 1. If your organization is using a proxy server on the network, in the proxy address or host name field, enter the ip address or host name of your proxy server. 2. In the port field, enter the port number ...

  • Page 496

    A ppendices s ection a ppendix d 474 m86 s ecurity u ser g uide optional: specify url for mobile client updates notes: a url directory entry is required in the automatic update settings frame only if the mobile client updater will be installed on end user workstations and a web server will be used f...

  • Page 497

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 475 3. Click add to include the entry in the list box below. 4. After entering the url, click ok to close the dialog box and to display your entries in the update url base field of the package configuration window. Note: to remove a url fro...

  • Page 498

    A ppendices s ection a ppendix d 476 m86 s ecurity u ser g uide step 1: first line entry by default, the application options settings field is empty. If you wish to add any options, you must first type in mode 0 on the first line. For example: mode 0 {option #1} {option #2} … step 2: identify the na...

  • Page 499

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 477 step 3: add an option line for the application enter an option line for each application to be blocked or bypassed. To block an application, for example: block_firefox -c “c:\program files\mozilla firefox\firefox.Exe” -k to bypass an ap...

  • Page 500

    A ppendices s ection a ppendix d 478 m86 s ecurity u ser g uide line encryptor/decryptor... Other types of application qualifying arguments exist in addition to the examples provided in the previous para- graphs of this user guide. It is also possible to encrypt the application options settings if y...

  • Page 501

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 479 • md5 calculation - use the tools in this frame to generate an md5 “digital thumbprint” for a file. • aes / base64 encryption - use the tools in this frame to generate advanced encryption standard (aes) base64 encryption: 2. Click exit ...

  • Page 502

    A ppendices s ection a ppendix d 480 m86 s ecurity u ser g uide fig. D-20 mobile client package contents page.

  • Page 503

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 481 the mobile client package contents page includes the following information: • component versions - the mobile client windows and macintosh version numbers and mcu version numbers • packages - links to downloadable components for: • wind...

  • Page 504

    A ppendices s ection a ppendix d 482 m86 s ecurity u ser g uide • configuration - mobile client and server settings: • configuration revision number • mobile server host ip address(es) and port number(s) • internal server host ip address(es) and port number(s) • proxy server - server host name or ip...

  • Page 505

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 483 edit a package configuration 1. From the mobile client deployment tool window, select file > edit package... To open the select package window: fig. D-21 select package window 2. From the packages list box, choose the package to be edit...

  • Page 506

    A ppendices s ection a ppendix d 484 m86 s ecurity u ser g uide edit default configuration settings 1. From the mobile client deployment tool window, select tools > edit default configuration... To open the package configuration window for default settings: fig. D-22 package configuration window for...

  • Page 507

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 485 tip: select file > cancel to exit without saving your edits. 2. Make your edits in this window and then select from the following options to save the default configuration: file > save or file > save and quit. Note: see save configurati...

  • Page 508: McU File Preparations

    A ppendices s ection a ppendix d 486 m86 s ecurity u ser g uide mcu file preparations in order to use the optional mobile client updater (mcu) component to distribute product or configuration updates to end users, you must first install the mcu on end user work- stations. Then you must select the ho...

  • Page 509

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 487 step 2: choose a deployment host for updates decide where to host mobile client update files: • a web server you maintain • mobile server web filter host mc file on your web server this choice is advantageous for environments with multi...

  • Page 510

    A ppendices s ection a ppendix d 488 m86 s ecurity u ser g uide not coordinate their synchronization attempts with each other, the timing of download attempts will follow a random statistical distribution. Nevertheless, it is conceivable that if you have 4,000 client workstations, they might all att...

  • Page 511

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 489 step 3: post the latest files for mcu next you must post the mobile client configuration files to the host server. After this initial posting, whenever changes are made to the client configuration, or whenever a new software version of ...

  • Page 512

    A ppendices s ection a ppendix d 490 m86 s ecurity u ser g uide 3. Click browse... To open the file upload window and search for the .Tgz file to be uploaded to the server. Warning: uploading subsequent packages of the mobile client to the server will overwrite the current file configuration. 4. Onc...

  • Page 513: Deployment to A Group

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 491 mc deployment to windows computers deployment to a group the modified 8e6client.Msi file is distributed to multiple windows workstations by creating a group policy object (gpo) which assigns this software to the required computers on th...

  • Page 514

    A ppendices s ection a ppendix d 492 m86 s ecurity u ser g uide 3. Link the new policy: a. In the gpmc, select the domain or organizational unit for which the policy should be applied. B. Right-click, choose "link an existing gpo", and then select the new policy you created in step 2. Click ok. C. R...

  • Page 515

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 493 5. Enable the policy link: return to the new policy link in the gpmc for the target domain or organizational unit, right-click, and then choose "link enabled". 6. Test the deployment: a. Select one of the workstations within the scope o...

  • Page 516

    A ppendices s ection a ppendix d 494 m86 s ecurity u ser g uide installation on a single computer the mobile client is manually installed on a single windows workstation by following these procedures: 1. Go to the folder in which the modified 8e6client.Msi file was downloaded, and click the .Msi fil...

  • Page 517

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 495 mobile client removal from computers uninstallation from a windows group if the group policy that was used for installing the mobile client on workstations is removed, the mobile client will still remain installed on target workstations...

  • Page 518

    A ppendices s ection a ppendix d 496 m86 s ecurity u ser g uide • windows xp: start > control panel > add or remove programs 2. Find the mobile client program and click remove to open the m86 mobile client - uninstall dialog box: fig. D-27 mobile client uninstall dialog box 3. Copy the eight-digit n...

  • Page 519

    A ppendices s ection a ppendix d m86 s ecurity u ser g uide 497 fig. D-29 generate a key copy this uninstall key. In this example: f0d34d note: click close to close the create uninstall key pop-up window. 6. Access the m86 mobile client - uninstall dialog box again, and enter the generated password ...

  • Page 520: Appendix E

    A ppendices s ection a ppendix e 498 m86 s ecurity u ser g uide appendix e configure the web filter for er reporting when configuring the web filter to be used with an er unit, the following procedures must be completed in order for the er to receive logs from the web filter. Entries in the web filt...

  • Page 521

    A ppendices s ection a ppendix e m86 s ecurity u ser g uide 499 4. After the er has been configured, and logs have been transferred from the web filter to the er, click the log tab to view transfer activity. 5. On the log tab, click view log to view up to the last 300 lines of transfer activity in t...

  • Page 522

    A ppendices s ection a ppendix e 500 m86 s ecurity u ser g uide entries in the er administrator console to see if log files have transferred: 1. Access the er’s administrator console. 2. From the database pull-down menu, choose tools to display the tools screen. 3. From the database status menu, cho...

  • Page 523: Appendix F

    A ppendices s ection a ppendix f m86 s ecurity u ser g uide 501 appendix f raid and hardware maintenance this appendix is divided into three parts: hardware compo- nents, server interface, and troubleshooting—in the event of a failure in one of the drives, power supplies, or fans. Note: as part of t...

  • Page 524

    A ppendices s ection a ppendix f 502 m86 s ecurity u ser g uide • libr = library update status • raid = hard drive status • updt = software update status led indicator chart below is a chart of led indicators in the “sl” and “hl” unit: led indicator color condition description fltr green on filterin...

  • Page 525

    A ppendices s ection a ppendix f m86 s ecurity u ser g uide 503 front control panels on h, sl, and hl units control panel buttons, icons, and led indicators display on the right side of the front panel. The buttons let you perform a function on the unit, while an led indicator corresponding to an ic...

  • Page 526

    A ppendices s ection a ppendix f 504 m86 s ecurity u ser g uide overheat/fan fail (icon) – this led is unlit unless the chassis is overheated. A flashing red led indicates a fan failure. A steady red led (on and not flashing) indicates an overheating condi- tion, which may be caused by cables obstru...

  • Page 527

    A ppendices s ection a ppendix f m86 s ecurity u ser g uide 505 rear panels on h and hl units uid (led indicator) – on the rear of the “h” or “hl” chassis, to the left of the power supplies, a steady blue uid led indi- cator displays when the uid button on the control panel is pressed. This led rema...

  • Page 528: Part 3: Troubleshooting

    A ppendices s ection a ppendix f 506 m86 s ecurity u ser g uide part 3: troubleshooting the text in this section explains how the server alerts the administrator to a failed component, and what to do in the event of a failure. Hard drive failure step 1: review the notification email if a hard drive ...

  • Page 529

    A ppendices s ection a ppendix f m86 s ecurity u ser g uide 507 step 2: verify the failed drive in the admin console the hardware failure detection window in the adminis- trator console is accessible via the system > hardware failure detection menu selection: fig. F-1 hardware failure detection wind...

  • Page 530

    A ppendices s ection a ppendix f 508 m86 s ecurity u ser g uide step 3: replace the failed hard drive after verifying the failed hard drive in the administrator console, go to the server to replace the drive. Press the red release button to release the handle on the carrier, and then extend the hand...

  • Page 531: Power Supply Failure

    A ppendices s ection a ppendix f m86 s ecurity u ser g uide 509 step 4: rebuild the hard drive once the failed hard drive has been replaced, return to the hardware failure detection window in the administrator console, and click rebuild to proceed with the rebuild process. Warning: when the raid arr...

  • Page 532

    A ppendices s ection a ppendix f 510 m86 s ecurity u ser g uide step 3: replace the failed power supply remove the failed power supply by locating the red release tab (1) and pushing it to the right (2), then lifting the curved metal handle and pulling the power supply module towards you (3). Note t...

  • Page 533: Fan Failure

    A ppendices s ection a ppendix f m86 s ecurity u ser g uide 511 fan failure identify a fan failure a flashing red led indicates a fan failure. If this displays on your unit, contact technical support for an rma (return merchandise authorization) number and for instructions on returning the unit to m...

  • Page 534: Appendix G

    A ppendices s ection a ppendix g 512 m86 s ecurity u ser g uide appendix g glossary this glossary includes definitions for terminology used in this user guide. M86 supplied category - a library category that was created by m86, and includes a list of urls, url keywords, and search engine keywords to...

  • Page 535

    A ppendices s ection a ppendix g m86 s ecurity u ser g uide 513 global administrator - an authorized administrator of the network who maintains all aspects of the web filter, except for managing master ip groups and their members, and their associated filtering profiles. The global administrator con...

  • Page 536

    A ppendices s ection a ppendix g 514 m86 s ecurity u ser g uide (ldap) is a directory service protocol based on entries (distinguished names). Machine name - pertains to the name of the user’s work- station machine (computer). Master ip group - an ip group set up in the tree menu in the policy secti...

  • Page 537

    A ppendices s ection a ppendix g m86 s ecurity u ser g uide 515 tions. The command also controls persistent net connec- tions. Netbios - network basic input output system is an appli- cation programming interface (api) that augments the dos bios by adding special functions to local-area networks (la...

  • Page 538

    A ppendices s ection a ppendix g 516 m86 s ecurity u ser g uide proxy server - an appliance or software that accesses the internet for the user’s client pc. When a client pc submits a request for a web page, the proxy server accesses the page from the internet and sends it to the client. A proxy ser...

  • Page 539

    A ppendices s ection a ppendix g m86 s ecurity u ser g uide 517 service port - service ports can be set up to blocked. Examples of these ports include file transfer protocol (ftp), hyper text transfer protocol (http), network news transfer protocol (nntp), secured http transmission (https), and othe...

  • Page 540

    A ppendices s ection a ppendix g 518 m86 s ecurity u ser g uide vlan - virtual local area network is a network of computers that may be located on different segments of a lan but communicate as if they were on the same physical lan segment. Warn setting - a setting assigned to a library category or ...

  • Page 541: Ndex

    M86 s ecurity u ser g uide 519 i ndex a account password security 98 setup 95 active connections diagnostic tool 109 active filtering profiles 23 active profile lookup window 116 additional language support window 278 admin audit trail window 120 administrator menu 95 administrator window 95 alert b...

  • Page 542

    I ndex 520 m86 s ecurity u ser g uide c calculator 66 category codes 423 custom categories 395 custom category 25 library 25 m86 supplied category 300 category codes 423 category groups menu 299 category profile global 246 ip group 352 minimum filtering level 265 category weight system menu 293 cate...

  • Page 543

    I ndex m86 s ecurity u ser g uide 521 disk usage diagnostic tool 111 dmz 456 e emergency update log window 284 enterprise reporter 316 , 498 environment requirements 10 mobile client 453 eula 218 exception url 81 , 268 , 374 , 424 exception url window 360 , 386 , 389 f field, terminology 4 filter op...

  • Page 544

    I ndex 522 m86 s ecurity u ser g uide report configuration 319 g global administrator 1 , 2 add account 95 definition 513 global filtering profile 23 global group 18 category profile 246 default redirect url 249 filter options 250 menu 231 override account 254 port profile 248 , 267 global group pro...

  • Page 545

    I ndex m86 s ecurity u ser g uide 523 customize pages 193 set up a custom category 395 set up a time profile 365 set up an override account global group 254 group profile 343 set up exception urls 360 set up pattern detection whitelisting 297 set up profile options global group profile 250 group or ...

  • Page 546

    I ndex 524 m86 s ecurity u ser g uide add to group 380 definition 513 delete 390 profile type 22 individual ip profile window 389 installation guide 50 instant messaging 31 , 300 definition 513 internet explorer 10 , 453 invisible mode 13 definition 513 diagram 13 diagram with port monitoring 14 ip ...

  • Page 547

    I ndex m86 s ecurity u ser g uide 525 full url update 277 lookup 286 , 392 manual updates 276 search engine keywords, custom category 412 search engine keywords, m86 supplied category 310 software update 277 update categories 276 update logs 279 url keywords, custom category 409 url keywords, m86 su...

  • Page 548

    I ndex 526 m86 s ecurity u ser g uide administrator gui 68 log on administrator gui 50 logon management window 102 logon script path block page authentication 80 logon settings window 98 lookup library 286 , 392 m m86 supplied category 25 , 300 definition 512 machine name, definition 514 macintosh 1...

  • Page 549

    I ndex m86 s ecurity u ser g uide 527 mode menu 150 n name resolution, definition 514 nat 38 , 139 , 143 definition 515 navigation panel 59 terminology 5 navigation tips 54 net use definition 514 netbios definition 515 network address translation (nat), definition 515 network menu 88 network require...

  • Page 550

    I ndex 528 m86 s ecurity u ser g uide override account window 254 , 343 p p2p definition 515 password expiration 51 , 99 override account 343 unlock ip address 104 unlock username 103 pattern detection whitelist menu 297 pattern detection whitelist window 297 peer-to-peer 31 definition 515 ping 108 ...

  • Page 551

    I ndex m86 s ecurity u ser g uide 529 q quota definition 516 format 424 quota block page customization window 210 quota notice page customization window 213 quota setting menu 221 quota setting window 221 r radio button, terminology 6 radius definition 516 radius authentication settings menu 171 rad...

  • Page 552

    I ndex 530 m86 s ecurity u ser g uide settings 158 router mode 15 definition 516 diagram 15 routing table diagnostic tool 109 rule 26 definition 516 rules window 241 s safari 10 , 453 screen, terminology 6 search engine definition 516 search engine keyword custom category 412 m86 supplied category 3...

  • Page 553

    I ndex m86 s ecurity u ser g uide 531 software update log window 132 software update management window 216 software update menu 128 software updates 128 source mode 37 , 72 , 139 ssl certificate menu 227 ssl certificate window 227 stand alone mode 37 , 72 , 137 static filtering profiles 22 status wi...

  • Page 554

    I ndex 532 m86 s ecurity u ser g uide t tar profile 21 target mode 37 , 143 technical support 415 text box, terminology 7 threat analysis reporter 29 time profile add 366 definition 517 delete 375 modify 375 profile type 23 time profile window 365 , 386 , 389 time-based profile 79 tolerance timer 18...

  • Page 555

    I ndex m86 s ecurity u ser g uide 533 global group filter option 253 url keyword filtering 253 url keywords window 306 custom category 409 m86 supplied category 306 url, definition 517 urls window 301 custom category 400 m86 supplied category 301 usage logs 112 v view log file window 112 virtual ip ...

  • Page 556

    I ndex 534 m86 s ecurity u ser g uide.