® ProxyBlocker USER GUIDE Model: ProxyBlocker Release 2.1.00 • Manual Version 1.
ii 8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE
8E6 PROXYBLOCKER USER GUIDE © 2008 8e6 Technologies All rights reserved. Version 1.01, published July 2008 To be used with the ProxyBlocker Authentication User Guide version 1.01 for software release 2.1.00 Printed in the United States of America This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written consent from 8e6 Technologies.
iv 8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE
CONTENTS INTRODUCTORY SECTION ...............................................1 8e6 ProxyBlocker ........................................................................ 1 About this User Guide ................................................................ 1 How to Use this User Guide ....................................................... 3 Conventions ...................................................................................... 3 Terminology ......................................................
CONTENTS IM Blocking.......................................................................... 26 Setting up IM and P2P .............................................................. 27 Block IM, P2P for All Users ................................................. 28 Block IM for All Users ................................................... 28 Block Specified Entities from Using IM, P2P....................... 29 Block IM for a Specific Entity ........................................
CONTENTS Delete an Administrator Account......................................... 83 View Account Status..................................................... 90 View Locked IP Address, Unlock IP Address...................... 91 View Locked IPs ........................................................... 91 Unlock an IP Address ................................................... 91 Command Selections .......................................................... 96 Ping...........................................
CONTENTS Reset All Server Settings .................................................. 148 SNMP window ........................................................................ 149 Specify Monitoring Settings............................................... 150 Set up Community Token for Public Access............... 150 Create, Build the Access Control List ......................... 150 Maintain the Access Control List ................................ 150 Hardware Failure Detection window .....................
CONTENTS Remove a Segment from the Network .............................. 212 Add a Rule ........................................................................ 214 Modify a Rule .................................................................... 216 Copy a Rule ...................................................................... 216 Remove a Rule ................................................................. 217 Create, Edit a List of Selected Categories..................
CONTENTS NNTP Newsgroup window ...................................................... 272 Add a Newsgroup to the Library........................................ 272 View Library Details .......................................................... 276 Add a URL to the Library Category............................. 279 Reload the Library ...................................................... 281 View a List of URL Keywords............................................ 283 Add or Remove URL Keywords ..............
CONTENTS GROUP ADMINISTRATOR SECTION .............................311 Introduction ............................................................................. 311 Chapter 1: Group screen ........................................................ 312 IP ................................................................................................... 313 Refresh ................................................................................... 313 Refresh the Master IP Group, Member ......................
CONTENTS Exception URL window ........................................................... 365 Time Profile window ............................................................... 365 Delete Individual IP ................................................................. 366 Delete an Individual IP Member ........................................ 366 Chapter 2: Library screen ....................................................... 367 Library Lookup window .....................................................
CONTENTS APPENDICES SECTION ...............................................396 Appendix A .............................................................................. 396 Filtering Profile Format and Rules ................................................. 396 Appendix B .............................................................................. 400 Traveler Log Messages ................................................................. 400 Startup, Finish ..............................................
CONTENTS If Pop-up Blocking is Enabled ................................................. 426 Add Override Account to the White List .................................. 426 If Pop-up Blocking is Enabled ................................................. 427 Temporarily Disable Pop-up Blocking ..................................... 427 Add Override Account to the White List .................................. 428 Set up Pop-up Blocking ..........................................................
INTRODUCTORY SECTION 8E6 PROXYBLOCKER INTRODUCTORY SECTION 8e6 ProxyBlocker 8e6 Technologies’ 8e6 ProxyBlocker offers a solution for organizations using an Internet filtering product other than 8e6’s R3000 Enterprise Filter.
INTRODUCTORY SECTION ABOUT THIS USER GUIDE provides information on how to use this user guide to help you configure the ProxyBlocker. • Global Administrator Section - This section includes information for the global administrator—who has all rights and permissions on the ProxyBlocker box—to create group administrator accounts, and to configure the ProxyBlocker for use on the network.
INTRODUCTORY SECTION HOW TO USE THIS USER GUIDE How to Use this User Guide Conventions The following icons are used throughout this user guide: NOTE: The “note” icon is followed by italicized text providing additional information about the current subject. TIP: The “tip” icon is followed by italicized text giving you hints on how to execute a task more efficiently.
INTRODUCTORY SECTION HOW TO USE THIS USER GUIDE Terminology The following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box that opens in response to an entry you made in a dialog box, window, or screen. This box often contains a button (usually labeled “OK”) for you to click in order to confirm or execute a command. • button - an object in a dialog box, window, or screen that can be clicked with your mouse to execute a command.
INTRODUCTORY SECTION HOW TO USE THIS USER GUIDE entry, or displays pertinent information. A text box is a type of field. • frame - a boxed-in area in a dialog box, window, or screen that includes a group of objects such as fields, text boxes, list boxes, buttons, radio buttons, checkboxes, and/or tables. Objects within a frame belong to a specific function or group. A frame often is labeled to indicate its function or purpose.
INTRODUCTORY SECTION HOW TO USE THIS USER GUIDE • pop-up box or pop-up window - a box or window that opens after you click a button in a dialog box, window, or screen. This box or window may display information, or may require you to make one or more entries. Unlike a dialog box, you do not need to choose between options. • pull-down menu - a field in a dialog box, window, or screen that contains a down-arrow to the right. When you click the arrow, a menu of items displays from which you make a selection.
INTRODUCTORY SECTION HOW TO USE THIS USER GUIDE • sub-topic - a subset of a main topic that displays as a menu item for the topic. The menu of sub-topics opens when a pertinent topic link in the left panel—the navigation panel—of a screen is clicked. If a sub-topic is selected, the window for that sub-topic displays in the right panel of the screen, or a pop-up window or an alert box opens, as appropriate. • text box - an area in a dialog box, window, or screen that accommodates your data entry.
INTRODUCTORY SECTION HOW TO USE THIS USER GUIDE • tree - a tree displays in the navigation panel of a screen, and is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign when the branch is collapsed. By double-clicking the item, a minus (-) sign replaces the plus sign, and any entity within that branch of the tree displays. An item in the tree is selected by clicking it.
INTRODUCTORY SECTION OVERVIEW Overview The ProxyBlocker’s Administrator console is used by the global administrator—and group administrator, as required—to configure the ProxyBlocker server to perform the following basic functions: • filter URLs (Web addresses) on the Internet • log traffic on the Internet and, if applicable for your organization: • block instant messaging and peer-to-peer services • authenticate users via the existing authentication system on the network NOTE: See the 8e6 ProxyBlocker Aut
INTRODUCTORY SECTION ENVIRONMENT REQUIREMENTS Environment Requirements Workstation Requirements Minimum system requirements for the administrator include the following: • Windows 2000 or later operating system (not compatible with Windows server 2003) running Internet Explorer (IE) 6.0 or later (Windows Vista running IE7) • Macintosh OS X Version 10.5 running Safari 2.0, Firefox 2.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Chapter 1: Filtering Operations Invisible Mode The ProxyBlocker is set up in the invisible mode, indicating that the unit will filter all connections on the Ethernet between client PCs and the Internet, without stopping each IP packet on the same Ethernet segment. The unit will only intercept a session if an inappropriate request was submitted by a client.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Fig. 1:1-1 Pass-by filtering diagram When users (Client PCs) make Internet requests, the traffic flows (1) through the network path without interruption. The ProxyBlocker captures the request as the user’s request (2) leaves the network. The ProxyBlocker then determines the action (3) to either block or pass the request.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Group Types After the operational filtering mode is configured on the ProxyBlocker, the group type(s) that will be used on the ProxyBlocker must be set up so that filtering can take place. In the Group section of the Administrator console, group types are structured in a tree format in the navigation panel. The global administrator can access the Global Group and IP groups in the tree.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS IP Groups The IP group type is represented in the tree by the IP icon . A master IP group is comprised of sub-group members and/or individual IP members . The global administrator adds master IP groups, adds and maintains override accounts at the global level, and establishes and maintains the minimum filtering level.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Filtering Profile Types A filtering profile is used by all users who are set up to be filtered on the network. This profile consists of rules that dictate whether a user has access to a specified Web site or service on the Internet.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS • override account profile - set up in either the global group section or the master group section of the console. • lock profile - set up under X Strikes Blocking in the Filter Options section of the profile. Static Filtering Profiles Static filtering profiles are based on fixed IP addresses and include profiles for master IP groups and their members.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Active Filtering Profiles Active filtering profiles include the global group profile, override account profile, time profile, and lock profile. NOTE: For information about authentication filtering profiles, see the 8e6 ProxyBlocker Authentication User Guide. Global Filtering Profile The global filtering profile is created by the global administrator. This profile is used as the default filtering profile.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Filtering Profile Components Filtering profiles are comprised of the following components: • library categories - used when creating a rule, minimum filtering level, or filtering profile for the global group or any entity • service ports - used when setting up filter segments on the network, creating the global group (default) filtering profile, or establishing the minimum filtering level • rules - specify which library categories should be blocked, left
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Library Categories A library category contains a list of Web site addresses and keywords for search engines and URLs that have been set up to be blocked or white listed. Library categories are used when creating a rule, the minimum filtering level, or a filtering profile. 8e6 Supplied Categories 8e6 furnishes a collection of library categories, grouped under the heading “Category Groups” (excluding the “Custom Categories” group).
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Service Ports Service ports are used when setting up filter segments on the network (the range of IP addresses/netmasks to be detected by the ProxyBlocker), the global (default) filtering profile, and the minimum filtering level. When setting up the range of IP addresses/netmasks to be detected, service ports can be set up to be open (ignored).
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS NOTE: If the minimum filtering level is not set up, global (default) filtering settings will apply instead. If an override account is established at the IP group level for a member of a master IP group, filtering settings made for that end user will override the minimum filtering level if the global administrator sets the option to allow the minimum filtering level to be bypassed.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS • ignore - if the filter segment detected on the network has a service port set up to be ignored, that service port will be bypassed Filtering Rules Filtering Levels Applied 1. The global (default) filtering profile applies to any user who does not belong to a master IP group. 2. If the minimum filtering level is defined, it applies to all master IP groups and members assigned filtering profiles.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS 7. An override account profile takes precedence over an authentication profile. This account may override the minimum filtering level—if the override account was set up in the master IP group tree, and the global administrator allows override accounts to bypass the minimum filtering level, or if the override account was set up in the global group tree.
INTRODUCTORY SECTION CHAPTER 1: FILTERING OPERATIONS Fig.
INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING Chapter 2: Logging and Blocking Web Access Logging One of the primary functions of the ProxyBlocker is to log the activity of users on the Internet. Information captured in the log can be transferred to a reporting appliance, to be viewed on a PC monitor or output to a printer. 8e6 recommends using the Enterprise Reporter (ER) for generating reports.
INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING Instant Messaging, Peer-to-Peer Blocking The ProxyBlocker has options for blocking and/or logging the use of Instant Messaging and Peer-to-Peer services, and makes use of Intelligent Footprint Technology (IFT) for greatly increasing management and control of these popular—yet potentially harmful—applications. This section explains how to set up and use IM and P2P.
INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING P2P Blocking Peer-to-Peer (P2P) involves communication between computing devices—desktops, servers, and other smart devices—that are linked directly to each other. Using this feature of the ProxyBlocker, groups and/or individual client machines can be set up to block the use of P2P services specified in the library category.
INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING Using IM and P2P To solely log IM and/or P2P user activity, the Pattern Blocking setting needs to be enabled in the Filter window. To additionally block specified groups and/or users from using components and features of IM and/or P2P, settings need to be made in the Group section of the Administrator console.
INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING Block P2P for All Users To block P2P for all users on the network: • the Pattern Blocking option in the Filter window must be activated • the global filtering profile must have the PR2PR library category set up to be blocked • the minimum filtering level profile must have the PR2PR library category set up to be blocked.
INTRODUCTORY SECTION CHAPTER 2: LOGGING AND BLOCKING Block P2P for a Specific Entity To block P2P for a specified group or user: • the Pattern Blocking option in the Filter window must be activated • the PR2PR library category must be set up to be blocked for that entity • the global filtering profile should not have P2P blocked, unless blocking all P2P traffic with the Range to Detect feature is desired • the minimum filtering level profile should not have P2P blocked, unless blocking all P2P traffic with
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Chapter 3: Getting Started Initial Setup To initially set up your ProxyBlocker server, follow the instructions in the Quick Start Guide, the booklet packaged with your ProxyBlocker unit. This guide explains how to perform the initial configuration of the server so that it can be accessed via an IP address on your network. NOTE: If you do not have the ProxyBlocker Quick Start Guide, contact 8e6 Technologies immediately to have a copy sent to you.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Fig. 1:3-1 ProxyBlocker Introductory Window NOTE: The ProxyBlocker Introductory Window must be left open throughout your session. This window displays minimized when the Login dialog box opens. 4. When the Login dialog box opens, enter your Username and Password: Fig. 1:3-2 Login dialog box TIP: The default Username is admin and the Password is user3.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED NOTE: See Chapter 1: System screen in the Global Administrator Section for information on logging into the ProxyBlocker interface if your password has expired. 5. Click OK to close the login dialog box and to access the welcome screen of the Administrator console: Fig.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Last Library Update message If it has been more than seven days since the ProxyBlocker last received updates to library categories, upon logging into the Administrator console a pop-up dialog box opens and displays the following message: ”Libraries were last updated more than 7 days ago.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Fig. 1:3-4 Welcome screen, Last Library Update text Click the checkbox “Do not show “Old Library Warning” dialog box in future” to disable the Last Library Update message pop-up box. After the libraries are updated, the welcome screen will appear as in Fig. 1:3:3 with today’s date as the Last Library Update in black text.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Navigation Tips Access Main Sections The Administrator console is organized into six sections, each accessible by clicking the corresponding button in the navigational bar at the top of the screen: • Home - clicking this button displays the welcome screen of the Administrator console. • System - clicking this button displays the main screen for the System section.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED • Help - clicking this button displays the Help screen. This screen includes navigational tips and a link to the PDF copy of this User Guide: Fig.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Help Features Help features provide information about how to use windows in the Administrator console. Such features include help topics and tooltips. Access Help Topics Each of the main section screens contains a link beneath the banner. When that link is clicked, a separate browser window opens with Help Topics for that section: Fig. 1:3-6 Help Topics window 1. Click a link to go to a specified topic. 2.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Tooltips In any window that features the icon, additional information about that window can be obtained by hovering over that icon with your mouse, or by pressing the F1 key on your keyboard. • Hover Display The yellow tooltip box displays when you hover over the icon with your mouse: Fig. 1:3-7 Tooltip mouseover effect To close the tooltip box, move the mouse away from the icon.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED • Help pop-up box The Help pop-up box opens when you press the F1 key on your keyboard: Fig. 1:3-8 Help pop-up box Click OK to close the pop-up box. Screen and Window Navigation All screens are divided into two panels: a navigation panel to the left, and a window in the panel to the right. Windows display in response to a selection made in the navigation panel.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Topic Links In System, Library, and Reporting screens, the navigation panel contains topic links. By clicking a topic link, the window for that topic displays in the right panel: Fig.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Select Sub-topics Some topics in System and Library screens consist of more than one window. For these topics, clicking a topic link opens a menu of sub-topics: Fig. 1:3-10 Sub-topics menu When a sub-topic from this menu is selected, the window for that sub-topic displays in the right panel of the screen.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Navigate a Tree List Tree lists are included in the navigation panel of Group and Library screens. Fig. 1:3-11 Tree menu A tree is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign, when that branch of the tree is collapsed. By double-clicking the entity, a minus (-) sign replaces the plus sign, and all branches within that branch of the tree display.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Tree List Topics and Sub-topics Group and Library tree lists possess a menu of topics and sub-topics. Topics in the tree list display by default when the tree is opened. Examples of tree list topics are circled in Fig. 1:412. When a tree list topic is selected and clicked, a menu of subtopics opens: Fig.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Navigate a Window with Tabs In each section of the console, there are windows with tabs. When selecting a window with tabs from the navigation panel, the main tab for that window displays. Entries made in a tab must be saved on that tab, if the tab includes the Apply button. NOTE: In the Time Profile and Override Account pop-up windows, entries are saved at the bottom of the window. Fig.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Console Tips and Shortcuts The following list of tips and shortcuts is provided to help you use windows in the Administrator console with greater efficiency. Navigation Path The navigation path displays at the top of each window: Fig. 1:3-14 Navigation path This path reminds you of your location in the console. The entire path shows the screen name, followed by the topic name, and sub-topic name if applicable.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED Refresh the Console Press F5 on your keyboard to refresh the Administrator console. This feature is useful in the event that more than one browser window is open simultaneously for the same ProxyBlocker server. Select Multiple Items When moving several items from one list box to another, or when deleting several items, the Ctrl and Shift keys can be used to expedite this task.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED • To paste text into an empty field, place the cursor in the field and then press the Ctrl and V keys. • To copy over existing text, highlight text currently in the field and then press the Ctrl and V keys. Calculate IP Ranges without Overlaps The Calculator button displays on windows in which IP ranges are entered. These windows include: Block Page Route Table window from the System section, and Range to Detect and Members windows from the Group section.
INTRODUCTORY SECTION CHAPTER 3: GETTING STARTED • If the IP address field in the window on the console is empty, in this pop-up window enter the IP address, specify the Dotted Decimals Notation Netmask, and then click Calculate to display the Min Host and Max Host IP addresses. TIP: If necessary, make a different IP address entry and Netmask selection, and then click Calculate to display different Min Host and Max Host results. 2.
GLOBAL ADMINISTRATOR SECTION INTRODUCTION GLOBAL ADMINISTRATOR SECTION Introduction The Global Administrator Section of this user guide is comprised of four chapters, based on the layout of the Administrator console. This section is used by the authorized global administrator of the ProxyBlocker for configuring and maintaining the ProxyBlocker server.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Chapter 1: System screen The System screen is comprised of windows used for configuring and maintaining the server to authenticate users, and to filter, log, or block specified Internet content for each user based on an applied filtering profile. Fig. 2:1-1 System screen A list of main topics displays in the navigation panel at the left of the screen.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Click your selection to choose a main topic from this list, or to view a menu of sub-topics, if applicable. When a topic or sub-topic is selected, the designated window for that topic or sub-topic displays in the right panel.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Control Control includes options for controlling basic ProxyBlocker server functions. Click the Control link to view a menu of sub-topics: Filter, Block Page Authentication, ShutDown, and Reboot. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Filter window The Filter window displays when Filter is selected from the Control menu. This window is used for specifying network filtering preferences on this server. Fig. 2:1-3 Filter window Local Filtering is used for specifying whether this server being configured will filter traffic on the network.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN files/1system_proxy_block .html for a list of proxy pattern types set up to be blocked). TIP: See the Introductory Section for overviews on IM and P2P (Chapter 2: Logging and Blocking). Local Filtering In the Local Filtering frame, indicate the function of this server being configured, in regards to filtering the network. The default setting has Local Filtering “On” and VLAN Detection “Off”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN HTTP Filtering In the HTTP Filtering frame, enable or disable the feature that automatically detects a split HTTP packet. Enable HTTP Packet Splitting Detection By default, the feature that automatically detects a split HTTP packet is disabled. 1. Click “On” to enable HTTP Packet Splitting Detection; this action displays a field below the radio buttons. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN HTTPS Filtering Specify your preference for filtering HTTPS sites in the HTTPS Filtering frame.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN NOTE: After making all entries in this window, click Apply. Service Control In the Service Control frame, indicate whether or not Pattern Blocking with be enabled or disabled. Enable Pattern Blocking By default, Pattern Blocking is disabled.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Disable Pattern Blocking Click “Off” to disable Pattern Blocking. NOTE: After making all entries in this window, click Apply.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Block Page Authentication window The Block Page Authentication window displays when Block Page Authentication is selected from the Control menu. This feature is used for entering criteria the ProxyBlocker server will use when validating a user’s account. Information entered/selected in this window is used by the block page that displays when an end user attempts to access a site or service that is set up to be blocked. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Enter, Edit Block Page Options NOTE: If you are not using authentication, and/or if your users do not have override accounts set up, you do not need to select any option at the Re-authentication Options field. 1. In the Re-authentication Options field of the Details frame, all block page options are selected by default, except for Web-based Authentication.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 2. If the Re-authentication option was selected, in the Logon Script Path field, \\PDCSHARE\scripts displays by default. In this field, enter the path of the logon script that the ProxyBlocker will use when re-authenticating users on the network, in the event that a user's machine loses its connection with the server, or if the server is rebooted.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Block page When a user attempts to access Internet content set up to be blocked, the block page displays on the user’s screen: Fig. 2:1-5 Sample Block Page By default, the following data displays in the User/Machine frame of the block page: • User/Machine field - The username displays for the NT/ LDAP user. This field is blank for the IP group user. • IP field - The user’s IP address displays.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • Blocked URL field - The URL the user attempted to access displays. By default, the following standard links are included in the block page: • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Options page The Options page displays when the user clicks the following link in the block page: For further options, click here. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN NOTE: Information about Option 1 is included in the 8e6 ProxyBlocker Authentication User Guide. Option 2 The following phrase/link displays, based on options selected at the Re-authentication Options field: • Re-start your system and re-login - This phrase displays for Option 2, whether or not either of the other Re-authentication Options (Re-authentication, or Webbased Authentication) was selected.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Option 3 Option 3 is included in the Options page, if “Override Account” was selected at the Re-authentication Options field. This option is used by any user who has an override account set up for him/her by the global group administrator or the group administrator. An override account allows the user to access Internet content blocked at the global or IP group level.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN ShutDown window The ShutDown window displays when ShutDown is selected from the Control menu. This window is used for powering off the server. Fig. 2:1-9 ShutDown window Shut Down the Server In the ShutDown frame, click ShutDown to power off the server. To restart the server, the ProxyBlocker console needs to be re-accessed.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Reboot window The Reboot window displays when Reboot is selected from the Control menu. This window is used for reconnecting the server on the network. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Reboot the Server 1. In the Reboot frame, click Reboot to open the Reboot ProxyBlocker Enterprise Filter dialog box: Fig. 2:1-11 Reboot ProxyBlocker dialog box 2. Click Yes to close the dialog box and to launch the Server Status message box, informing you that the server is now disconnected: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN After the server is rebooted, the ProxyBlocker status message box closes, and the ProxyBlocker ready alert box opens: Fig. 2:1-14 ProxyBlocker ready alert box The Server connected alert box also opens, informing you that the server is connected, and that you must restart the server: Fig. 2:1-15 Server connected alert box 3. Click OK to close the ProxyBlocker ready alert box. 4. Click OK to close the Server connected alert box. 5.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Network Network includes options for configuring the ProxyBlocker server on the network. Click the Network link to view a menu of sub-topics: LAN Settings, NTP Servers, Regional Setting, and Block Page Route Table. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu. This window is used for configuring network connection settings for the ProxyBlocker. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Specify LAN Settings 1. In the Host Name field, enter up to 50 alphanumeric characters for the name of the host for this server, such as pba.LOGO.com. 2. Specify the following information, as necessary: • In the LAN1 IP field of the IP/Mask Setting frame, the default LAN 1 IP address is 1.2.3.3. Enter the IP address and select the corresponding subnet mask of the LAN1 network interface card to be used on the network.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN NTP Servers window The NTP Servers window displays when NTP Servers is selected from the Network menu. This window is used for specifying IP addresses of servers running Network Time Protocol (NTP) software. NTP is a time synchronization system for computer clocks throughout the Internet. The ProxyBlocker will use the actual time from a clock at a specified IP address.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Specify Network Time Protocol Servers In the Details frame, three NTP server IP addresses display by default in the Servers list box. These IP addresses are: 128.59.35.142, 142.3.100.15, and 129.132.98.11. NOTE: Any IP address following the first entry in the Servers list box is only used in the event that the ProxyBlocker cannot access the primary time NTP server specified. IP addresses are used in the order in which they display in the list box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Regional Setting window The Regional Setting window displays when Regional Setting is selected from the Network menu. This window is used for specifying the time zone to be used by the ProxyBlocker and the language set type, if necessary. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Specify the Time Zone, Language Set In the Details frame, the Region “US” and the Location “Pacific” display by default. To change these settings: 1. At the Region pull-down menu, select your country from the available choices. 2. At the Location pull-down menu, select the time zone for the specified region. If necessary, select a language set from the Language pull-down menu to specify that you wish to display that text in the console. 3.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Block Page Route Table window The Block Page Route Table window displays when Block Page Route Table is selected from the Network menu. This window is used for building and maintaining a list of destination based routers the server will use for communicating with other segments of the network.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Add a Router In the Route Table frame: 1. Enter the IP address. 2. Select the network subnet Mask from the pull-down menu. 3. In the Gateway field, enter the IP address of the portal to which packets will be transferred to and from the Internet. TIP: Click Calculator to open the IP Calculator pop-up window. Use this calculator to calculate IP ranges without any overlaps. 4. Click Add to include your entries in the IP/Mask list box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Administrator Administrator window The Administrator window displays when Administrator is selected from the navigation panel. This window is used for adding and maintaining global administrator (Admin) and group administrator (Sub Admin) accounts. A Sub Admin manages NT or LDAP entities and their filtering profiles.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN TIP: The default Username is admin and the Password is user3. 8e6 recommends that you retain this default account and password in the event that the ProxyBlocker unit cannot be accessed. An authorized 8e6 Technologies technical representative may need to use this username and password when troubleshooting the unit. WARNING: Always be sure that at least one account is listed in this window at all times.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Edit an Administrator Account To change an administrator’s password and/or account type: 1. Select the username from the Current User list box; this action populates the Account Details frame with data. 2. In the Password field, enter eight to 20 characters for a new password—including at least one alpha character, one numeric character, and one special character. The password is case sensitive. 3.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Secure Logon Secure Logon includes options for setting user passwords to expire after a designated number of days, and/or locking out users from the ProxyBlocker after unsuccessfully attempting to log in for the specified number of attempts within the defined timespan. Click the Secure Logon link to view a menu of sub-topics: Logon Settings, and Logon Management. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Logon Settings window The Logon Settings window displays when Logon Settings is selected from the Secure Logon menu. This window is used for enabling the password expiration feature that lets you define the number of days a password will be valid before a new password must be used.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Enable, Disable Password Expiration In the Logon Expiration frame, at the Number of days prior to expiration [1-365] field, specify the number of days logon passwords will be effective by doing one of the following: • select from available choices (1, 30, 90, 365, Never Expired) • make an entry for the number of days until passwords expire.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Enable, Disable Account Lockout 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • At the Failed Password Attempts Timespan (in minutes) [1-1440] field—with the Lockout by Username and/or Lockout by IP address option(s) enabled—enter the number of minutes that defines the interval in which a user can enter an incorrect password—as specified in the Allowable Number of Failed Password Attempts [1-10] field—before being locked out of the ProxyBlocker.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Logon Management The Logon Management window displays when Logon Management is selected from the Secure Logon menu. This window is used for viewing the status of user accounts— including the date passwords will expire, and which usernames/IP addresses are currently locked out of the ProxyBlocker interface—and for unlocking usernames and IPs currently locked out of the ProxyBlocker.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View User Account Status, Unlock Username View Account Status The All Accounts Status frame displays password statuses of current login accounts set up in this ProxyBlocker being configured, including: • Account Name - username • Type of account: • Admin - global administrator account set up in the Administrator window • Sub Admin - NT/LDAP group administrator account set up in the Administrator window • Group - IP group administrator account set up in
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Unlock a Username To unlock a username: 1. Select the Account Name from the All Accounts Status frame by clicking on it to highlight it. 2. Click Unlock to open the dialog box asking if you wish to proceed with this action. TIP: Click No to close the dialog box. 3. Click Yes to display the alert box indicating the account was unlocked. 4.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View Admin, Sub Admin Interface Access To view the areas of the interface accessible by a global or NT/LDAP group administrator: 1. Select the Admin or Sub Admin username from the list. 2. Click View Access to open the Assign Access View popup window: Fig. 2:1-26 Assign Access View 3. The View/Preview assign access frame displays the username in the greyed-out “Assign to user” field.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Diagnostics Diagnostics includes options for setting up or running processes for maintaining the server. Click the Diagnostics link to view a menu of sub-topics: System Command, View Log File, Troubleshooting Mode, Active Profile Lookup, and Admin Audit Trail. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN System Command window The System Command window displays when System Command is selected from the Diagnostics menu. This window is used for viewing server statistics and for performing diagnostic tests on the server. Fig. 2:1-28 System Command window WARNING: Diagnostics tools utilize system resources, impacting the ProxyBlocker’s performance.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Perform a Diagnostic Test, View Data 1. Select a diagnostic tool from the Command pull-down menu: ping(Ping), traceroute(Trace Route), ps(Process list), top(TOP CPU processes), ifconfig(NIC configuration), netstat(active connections), netstat(routing table), free(current memory usage), iostat(CPU usage), sar(system performance), recent logins, uptime(system uptime), df(disk usage), and dmesg(print kernel ring buffer).
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 3. Click the “X” in the upper right corner of the pop-up window to close it. Command Selections Ping The Ping diagnostic tool is used for verifying whether the ProxyBlocker can communicate with a machine at a given IP address within the network, and the speed of the network connection. Enter the IP address or host name of the specific Internet address to be contacted (pinged), and then click Execute to display results in the pop-up window.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN TOP CPU processes The TOP CPU processes diagnostic tool is used for analyzing how much memory and CPU power is being consumed by which processes. When Execute is clicked, the pop-up window displays the following information: the load average, number of processes that can run, current utilization by CPUs on the system, and memory and swap file space currently being used and currently available.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Current memory usage When Current Memory Usage is selected and Execute is clicked, the pop-up window shows the amount of memory being used, and the amount of memory available for three intervals of one second each. CPU usage The CPU Usage diagnostic tool shows information on disk usage. When Execute is clicked, the pop-up window shows the average CPU usage, as well as the usage by device and file system/partition.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN System uptime The System uptime diagnostic tool is used for showing the amount of time the ProxyBlocker has been "up" and running. When Execute is clicked, the pop-up window displays a row of data showing the current time, the amount of time the ProxyBlocker has been up, the number of users, and the load averages for the past 1, 5 and 15 minute intervals.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View Log File window The View Log File window displays when View Log File is selected from the Diagnostics menu. This window is used for viewing the most recent log file results of various activities and for troubleshooting. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View Log Results In the Log File Details frame: 1. Select the type of Log File to view: • “Realtime Traffic Log (shadow.log)” - used for viewing the Internet activity of all users on the network. • “User Name Log (usage.log)” - used for viewing the time and date a user logged on and off the network, along with the user's profile information. • “Patch Log (patch.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Fig. 2:1-31 View Log File, Results window 4. Click the “X” in the upper right corner of the pop-up window to close it.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Troubleshooting Mode window The Troubleshooting Mode window displays when Troubleshooting is selected from the Diagnostics menu. This window is used if the server is not sending or receiving packets as normal. Fig. 2:1-32 Troubleshooting Mode window WARNING: This tool utilizes system resources, impacting the ProxyBlocker’s performance. When you click Enable, the ProxyBlocker will stop filtering the network.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Use the Troubleshooting Mode 1. Click Enable to begin working in the troubleshooting mode. 2. In the Packet Logging frame, select the Packet Logging Time from the available selections (10 seconds, 30 seconds, 60 seconds). This time is the interval during which the server captures packets in real time, ranging from the moment the command is executed until the designated point of time in the future. 3.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 8. After performing the fixes on the ProxyBlocker server, return to this window and click Disable to resume filtering the network. Active Profile Lookup window The Active Profile Lookup window displays when Active Profile Lookup is selected from the Diagnostics menu. This window is used for verifying whether an entity has an active filtering profile. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Verify Whether a Profile is Active 1. In the User IP/MAC Address field, enter the IP address of the end user. 2. Click Lookup to verify whether or not a profile is active for that IP address. If the filtering profile is active, a pop-up box opens containing the Result frame that displays profile settings applied to the profile: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • Profile Type - type of profile: • Regular profiles - IP group, sub-group, or individual profile • Global profile - Global group profile • Override profiles - Override Account profile • Lock profiles - X Strikes Blocking lock out profile • Time profiles - Time Profile 3. Click the following tabs to view information in that tab: Rule Details, Blocked Ports, Redirect URL, Filter Options.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • Quota - If a number displays in this column, the corresponding category group/library category was set up as passed but with a time limit, as defined by the number of minutes in that column. After spending 75 percent of the allotted time visiting URLs in that group/category, the user receives a quota warning message; after spending100 percent of the allotted time visiting URLs in that group/category, he/she receives a quota block page.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 4. Click the “X” in the upper right corner of the pop-up box to close it. Admin Audit Trail window The Admin Audit Trail window displays when Admin Audit Trail is selected from the Diagnostics menu. This window is used for specifying FTP criteria so that a log of server changes made by an administrator will be sent to the FTP server. The log of changes made on the server can be viewed in this window.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Specify FTP Criteria 1. Enter the IP address of the FTP Server. 2. The log will be sent to the current default directory, unless a Remote Directory is specified. 3. At the Transfer Mode field, “Passive” is selected by default, indicating that transfers will be made via unrestricted outgoing network connections. Click “Active” if transfers will be initiated by the server. 4. Type in the Username to be used. 5.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View View the Log of Administrator Changes To view the log, click the View tab: Fig. 2:1-36 Admin Audit Trail window, View tab Click View Log to display data on recent activity. For each change made on the server, the log will contain the date and time the change was made (Time), IP address of the machine used by the administrator, administrator's Username, and a brief description of the Action performed on the server.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Alert Alert includes options for setting up alert emails that notify designated individuals of problems on the network. Click the Alert link to view a menu of sub-topics: Alert Settings, and SMTP Server Settings. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Alert Settings window The Alert Settings window displays when Alert Settings is selected from the Alert menu. This window is used for setting up and maintaining email addresses of contacts who will receive automated notifications if problems on the network are detected during the ProxyBlocker’s self-monitoring process. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN tion will be required. However, if the error is not fixed— such as if a misconfiguration was made that causes a process to be unable to load on the system—the ProxyBlocker repeats this procedure until an administrator fixes the error. • Hard Drive Utilization - If the ProxyBlocker detects that hard drive utilization exceeds 80 percent, an alert is sent to the administrator.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Enable the Alert Feature By default, the “Disable” radio button is selected. To enable the feature for sending automated email notifications: 1. Click the “Enable” radio button to activate all elements in the Emergency Email Notification frame. 2. Enter up to four email addresses of contacts. 3. Click in the checkbox of each email address that should receive notifications regarding network problems. 4.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN SMTP Server Settings window The SMTP Server Settings window displays when SMTP Server Settings is selected from the Alert menu. This window is used for entering settings for the Simple Mail Transfer Protocol that will be used for sending email alert messages to specified administrators. Fig. 2:1-39 SMTP Server Settings window Enter, Edit SMTP Server Settings 1. Enter the SMTP Server name, for example: mail.logo.com. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN that can be placed into the queue awaiting an available outbound connection. 4. By default, Authentication is disabled. Click “Enable” if a username and password are required for logging into the SMTP server. This action activates the fields below. Make the following entries: a. Enter the Username. b. Enter the Password and make the same entry in the Confirm Password field. 5. Click Apply to apply your settings.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Patch Patch includes options for uploading software updates. Click the Patch link to view a menu of sub-topics: Local Patch, and Patch Update Log. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Local Patch window The Local Patch window displays when Local Patch is selected from the Patch menu. This window is used for viewing information about software updates previously applied to the current server being configured, and for viewing information about software updates currently available. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Read Information about a Software Update In either the Available Patches frame or the History of Patches frame, the Date, Name, and Synopsis are included for each software update. To read information about a software update: 1. Select a software update from the list. 2. Click the README button to open the README pop-up box that contains information about the software update: Fig. 2:1-43 Software update Readme 3. Click Close to close the pop-up box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Select and Apply a Software Update To apply a software update: 1. Go to the Available Patches frame and select the software update to be applied. NOTES: Software updates must be applied to the server in sequential order. Be sure port 8082 is open on your network. 2. Click Apply to open the software update installation dialog box: Fig. 2:1-44 Software update installation dialog box 3. Click Yes to open the EULA dialog box: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 4. After reading the contents of the End User License Agreement, click Yes if you agree to its terms. This action closes the EULA dialog box and opens the alert box verifying the software update application process: Fig. 2:1-46 Software update verification message box NOTE: To verify whether or not a software update has been successfully applied, go to the View Log File window and select “Patch Log (patch.log)”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN NOTE: 8e6 recommends performing a backup of configuration files after applying a software update. (See the Backup/Restore window in this chapter for information on performing a backup.) Undo an Applied Software Update NOTE: Only the most recently applied software update can be uninstalled. WARNING: If a software update is uninstalled, configuration settings will revert to the previous settings, before the software update was applied.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Patch Update Log window The Patch Update Log window displays when Patch Update Log is selected from the Patch menu. This window is used for viewing the software update log that provides the status on the ProxyBlocker’s software update activity, including checks for new software updates, and downloaded and applied software updates. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Download Log, View, Print Contents Download the Log 1. Click Download Log to open the alert box containing a message on how to download the log file to your workstation, if using Windows XP. 2. Click OK to close the alert box. Two pop-up boxes open: • A second alert box asks you to confirm that the file was successfully saved to your machine. Click OK in this box after the download is completed. • In the File Download dialog box, click Save: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 3. Find the folder in which to save the file, and then enter the File name, retaining the “.zip” file extension. Click Save to begin downloading the zip file to your workstation. After the file has completely downloaded, the Download complete dialog box opens: Fig. 2:1-51 Download Complete box 4. You can now open this file, open the folder where the file was saved, or close this dialog box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View the Contents of the Log Once the software update log file has been downloaded to your workstation, you can view its contents. 1. Find the log file in the folder, and right-click on it to open the pop-up menu: Fig. 2:1-52 Folder containing downloaded file 2. Choose “Open With” and then select a zip file executable program such as “WinZip Executable” to launch that application: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 3. If using WinZip, click I Agree to open the window containing the zip file: Fig. 2:1-54 WinZip window 4. Right-click the zip file to open the pop-up menu, and choose “View” to open the View dialog box: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 5. Select “Internal ASCII text viewer”, and then click View to open the View window containing the log file contents: Fig. 2:1-56 View window Save, Print the Log File Contents With the log file displaying correctly formatted in WinZip’s View window, if you wish to save or print the contents of this file: 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Mode Mode includes options for configuring the ProxyBlocker to filter the network. Click the Mode link to view a menu of subtopics: Operation Mode and Proxy Environment Settings. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Operation Mode window The Operation Mode window displays when Operation Mode is selected from the Mode menu. This window is used for specifying criteria for the invisible operational mode the ProxyBlocker will use for filtering on the network, as well as the settings to be used for “listening to” traffic and sending traffic. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Specify the Block Page Device In the Block Page Device frame, “LAN2” displays as the default device for sending block pages to client PCs. TIP: The block page device should be a different device than the one selected in the Listening Device frame. If necessary, at the Device to send block page pull-down menu, choose the network card that will be used to send the block page to client PCs. NOTES: After making all selections in this window, click Apply.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • “Alternate IP Address” - this option should be used if block pages are not being served. Enter the IP address of the router or device that will serve block pages. NOTES: The Current MAC Address displays if there is a resolution between the IP address and the MAC address of the router or device used for serving block pages.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Proxy Environment Settings window The Proxy Environment Settings window displays when Proxy Environment Settings is selected from the Mode menu. This window is used for specifying whether the Proxy Blocker is in a proxy environment, and if the default Web server port number 80 will be enabled. Fig. 2:1-59 Proxy Environment Settings window NOTE: Basic Proxy Authentication must be used if using HTTPS in a proxy environment.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Use a Local Proxy Server In the Proxy Setting frame, the default setting is “Off”. To specify that a local proxy server is used in the environment: 1. Click the “On” radio button. This selection indicates that the ProxyBlocker will perform a reverse lookup on packets to detect the source address and origin of packets. 2. Click Apply to apply your setting. Use Proxy Port 80 In the Proxy Port 80 Setting frame, the default setting is “Disable”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Authentication Authentication includes options for configuring the ProxyBlocker to authenticate and re-authenticate users on the network. Click the Authentication link to view a menu of subtopics: Enable/Disable Authentication, Authentication Settings, and Authentication SSL Certificate. Fig. 2:1-60 System screen, Authentication menu NOTE: Information about these sub-topics can be found in the 8e6 ProxyBlocker Authentication User Guide.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN NIC Mode NIC Mode window The NIC Mode window displays when NIC Mode is selected from the navigation panel. This window lets you specify the speed for the ProxyBlocker’s Network Interface Card settings so that the ProxyBlocker can communicate with the network switch or hub. Fig. 2:1-61 NIC Mode window By default the NIC mode for LAN1 and LAN2 is set to “Auto”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View the NIC Negotiation To verify or correct the negotiation for a NIC, click View NIC Negotiation to open a window containing results from the mii-tool and the ethtool about the status of the NIC mode(s): Fig. 2:1-62 NIC Negotiation window Mii-tool checks or sets the status of a network interface's Media Independent Interface (MII) unit. Ethtool is a diagnostic and tuning tool that examines and tunes the NIC.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Modify the NIC Mode Setting WARNING: If changing the NIC mode, be sure the hub/switch to which the ProxyBlocker is connected will support the selected NIC mode. An incorrect setting may prevent you from accessing the ProxyBlocker console. To modify the NIC setting, in the LAN1 or LAN2 frame: 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Backup/Restore Backup/Restore window The Backup/Restore window displays when Backup/ Restore is selected from the navigation panel. This window is used for saving configuration settings and/or custom library additions/deletions on or off the server, and for restoring these settings/modifications later, if necessary. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN For each backup configuration created or uploaded via this window, a row is added to the Backup Configurations grid in the Restore frame. The newly added row includes the following information: Date the backup was executed, Filename of the backup file, general information about the Content of the file, and a Comment about the file.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Perform a Backup To back up configuration and/or library modifications: 1. In the Backup frame, click the Configuration and/or Library checkbox(es) as appropriate. 2. Click Backup to open the ProxyBlocker Backup dialog box: Fig. 2:1-64 ProxyBlocker Backup dialog box 3. Type in the Filename for the backup file. 4. Type in a descriptive Comment about that file. 5.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Download a File To download a file to your machine: 1. Select the file from the Backup Configurations grid. 2. Click Download to open the alert box containing a message on how to download the log file to your workstation, if using Windows XP. 3. Click OK to close the alert box. In the File Download dialog box that opens, click Save: Fig. 2:1-65 File Download box This action opens the Save As window: Fig. 2:1-66 Save As pop-up window 4.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN After the file has completely downloaded, the Download complete dialog box opens: Fig. 2:1-67 Download complete box You can now open this file, open the folder where the file was saved, or close this dialog box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Perform a Restoration To restore backup data to the server, the backup file must be listed in the Backup Configurations grid, and the restoration function must be executed. If the backup file is not included in the Backup Configurations grid, you must upload it to the server. WARNING: Be sure the file you are restoring uses the same version of the software currently used by the ProxyBlocker Administrator console.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 2. Click Browse to open the Choose file window: Fig. 2:1-69 Choose file window 3. Select the file to be uploaded. After the file is selected, the Choose file window closes. 4. In the pop-up window, type in a Comment about the file. 5. Select the Type of file to be uploaded (CONFIG_ONLY, LIBRARY_ONLY, or both CONFIG_AND_LIBRARY). 6. Click Upload File to upload this file to the server.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Remove a Backup File To remove a file from the Backup Configurations grid: 1. Select the file. 2. Click Delete. View Backup and Restoration Details To view details on backup and/or restoration activities: 1. Click Log to open the Backup/Restore Log pop-up box: Fig. 2:1-70 Backup/Restore pop-up box The pop-up box includes rows of data about backup and restore processes performed via the Backup/Restore window.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Reset Reset window The Reset window displays when Reset is selected from the navigation panel. This window is used for resetting the server back to the default settings when the box was first acquired. Fig. 2:1-71 Reset window WARNING: When Reset is clicked, all settings made on the ProxyBlocker server will be removed and the box will be restored to its original state.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN SNMP SNMP window The SNMP window displays when SNMP is selected from the navigation panel. This feature lets the global administrator use a third party Simple Network Management Protocol (SNMP) product for monitoring and managing the working status of the ProxyBlocker's filtering on a network. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Enable SNMP The Monitoring mode is “Off” by default. To enable SNMP, click Enable in the Monitoring Mode frame. As a result, all elements in this window become activated. Specify Monitoring Settings Set up Community Token for Public Access Enter the password to be used as the Community token for public access. This is the password that the management ProxyBlocker console would use when requesting access. Create, Build the Access Control List 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Hardware Failure Detection Hardware Failure Detection window If using a ProxyBlocker SL unit, the Hardware Failure Detection window displays when Hardware Failure Detection is selected from the navigation panel. This feature shows the status of each drive on the RAID server. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN View the Status of the Hard Drives The Hardware Failure Detection window displays the current RAID Array Status for the two hard drives (HD 1, HD 2). If both hard drives are functioning without failure, the text “OK” displays to the right of the hard drive number, and no other text displays on the screen.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN X Strikes Blocking X Strikes Blocking window The X Strikes Blocking window displays when X Strikes Blocking is selected from the navigation panel. This feature lets a global administrator set criteria for blocking a user's access to “unacceptable” Internet sites and locking a user’s workstation, after the user makes a specified (“X”) number of attempts to such sites.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Configuration Set up Blocking Criteria 1. At Reset the X-Strike count upon authentication, “Off” is selected by default. To have all strikes reset before an end user is authenticated, click “On”. 2. Enter the Maximum Strikes Before “Locking” the Workstation. This is the number of attempts a user can make to access an unacceptable site before that user is prevented from using the Internet. The default is 5, and the maximum limit is 1000. 3.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN To specify a different page, click “Custom URL” and enter the URL in the text box. 7. Click Save to save your configuration settings. Reset All Workstations The following buttons can be clicked to reset workstations: • Click Reset All Strikes to remove all strikes from all workstations, and to unlock all locked workstations. • Click Unlock All Locks to remove locks on all locked workstations.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN The following information might also display in the lock page: “You have been denied access according to your organization's Internet Usage Policy. As a result, your Internet privileges were temporarily suspended for a total of ‘X’ (amount of time),” in which ‘X’ represents the number of minutes/hours the user will be locked out from Internet usage on that workstation.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN her workstation for five minutes. However, since the tolerance timer is set at four seconds, a user could potentially receive five strikes within 16 seconds if he/she accesses a page with multiple, inappropriate images and/or links that load on each page within four seconds. In this scenario, the first strike would be delivered at 0 seconds, the second at 4 seconds, the third at 8 seconds, the fourth at 12 seconds, and the fifth at 16 seconds.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Email Alert Click the Email Alert tab to display Email Alert: Fig. 2:1-76 X Strikes Blocking window, Email Alert tab Set up Email Alert Criteria 1. In the Minutes Past Midnight Before Starting Time Interval (0-59) field, enter the number of minutes past midnight that a locked workstation email alert will first be sent to the specified recipient(s). 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN To check the time(s) the email alert is scheduled to occur, click the Display Sending Time button to open The Daily Schedule pop-up window that shows the alert time schedule in the (HH:MM:SS) format: Fig. 2:1-77 The Daily Schedule pop-up window Click Close to close the pop-up window. 3. Click Save to save the field entries. Set up Email Alert Recipients 1. Enter the Email Address of an individual who will receive locked workstation email alerts. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Remove Email Alert Recipients 1. Select the email address(es) from the Current Email Alerts list box. 2. Click Delete to remove the email address(es) from list. Logon Accounts Click the Logon Accounts tab to display Logon Accounts: Fig. 2:1-78 X Strikes Blocking window, Logon Accounts tab Set up Users Authorized to Unlock Workstations 1. Enter the Username of a staff member who is authorized to unlock workstations. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 3. Click Add to include the username in the Current Accessible Users list box. NOTE: When an authorized staff member is added to this list, that username is automatically added to the Current Un-Accessible Users list box in the Logon Accounts tab of the Real Time Probe window. Deactivate an Authorized Logon Account To deactivate an authorized user’s account: 1. Select the username from the Current Accessible Users list box. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Categories Click the Categories tab to display Categories: Fig. 2:1-79 X Strikes Blocking window, Categories tab Set up Categories to Receive Strikes or No Strikes 1. Select library categories from the “No Strike” Categories list box. 2. Click the right arrow (>) to move the selected library categories to the “Strike” Categories list box. TIP: Use the left arrow (<) to move selected “Strike” Categories to the “No Strike” Categories list box. 3.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Go to X Strikes Unlock Workstation GUI When the global administrator clicks Go to X Strikes Unlock Workstation GUI, either the Re-login window or the X Strikes Unlock Workstation pop-up window opens. Re-login window The Re-login window opens if the user’s session needs to be validated: Fig. 2:1-80 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the ProxyBlocker console.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN X Strikes Unlock Workstation The following information displays in the X Strikes Unlock Workstation pop-up window: IP Address, User Name, and Expire Date/Time of currently locked workstations. Fig. 2:1-81 X Strikes Unlock Workstation window NOTE: An authorized staff member can click a link in an email alert, or type in http://x.x.x.x:88/XStrike.html in the address field of a browser window—in which “x.x.x.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Set up an Email Address to Receive Alerts To send locked workstation information to a designated administrator: 1. Enter the email address in the Email Address to be Subscribed/Unsubscribed text box. 2. Click Subscribe. Remove an Email Address from the Alert List To remove an administrator's email address from the notification list: 1. Enter the email address in the Email Address to be Subscribed/Unsubscribed text box. 2. Click Unsubscribe.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Warn Option Setting Warn Option Setting window The Warn Option Setting window displays when Warn Option Setting is selected from the navigation panel. This feature lets a global administrator specify the number of minutes for the interval of time in which a warning page will redisplay for the end user who accesses a URL in a library category with a Warn setting for his/her profile.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Specify the Interval for Re-displaying the Warn page 1. In the Warn Life Time (minutes) field, by default 10 displays. Enter the number of minutes (1-480) to be used in the interval for re-displaying the warning page for the end user. 2. Click Apply to enable your setting.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Customization Customization includes options to customize settings for HTML pages that display for end users who execute a command that triggers the associated pop-up window to open. Click the Customization link to view a menu of subtopics: Common Customization, Authentication Form, Lock Page, Block Page, Warn Page, Profile Control, Quota Block Page, Quota Notice Page. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Common Customization window The Common Customization window displays when Common Customization is selected from the Customization menu. This window is used for specifying elements to be included in block, lock, profile, and warning pages, and/or the authentication request form the end user will see. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Enable, Disable Features 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • Help Link URL - By default, http://www.8e6.com/techsupport/deniedresponse.html displays as the help link URL. Enter the URL to be used when the end user clicks the help link text (specified in the Help Link Text field). • Submission Review Display - if enabled, displays in block pages the email address of the administrator to receive requests for a review on sites the end users feel are incorrectly blocked.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Lock Page Customization window The Lock Page Customization displays when Lock Page is selected from the Customization menu. This window is used with the X Strikes Blocking feature, and lets you customize text in the lock page end users will see when attempting to access Internet content blocked for their profiles, and their workstations are currently locked.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Edit Entries, Setting 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the lock page. • In the Description field, enter a static text message to be displayed beneath the lock page header. Any entries made in these fields will display centered in the customized lock page, using the Arial font type. 2. At the Explanation Display field, by default “On” is selected.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Preview Sample Lock Page 1. Click Preview to launch a separate browser window containing a sample customized lock page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-86 Sample Customized Lock Page By default, the following data displays in the User/ Machine frame: • User/Machine field - The username displays for the NT/LDAP user. This field is blank for the IP group user.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized lock page. TIP: If necessary, make edits in the Lock Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample lock page.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN NOTE: See Appendix C: Create a Custom Block Page for information on creating a customized block page using your own design. TIP: An entry in any of the fields in this window is optional, but if an entry is made in the Link Text field, a corresponding entry must also be made in the Link URL field. Add, Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the block page.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Preview Sample Block Page 1. Click Preview to launch a separate browser window containing a sample customized block page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-88 Sample Customized Block Page By default, the following data displays in the User/ Machine frame: • User/Machine field - The username displays for the NT/LDAP user. This field is blank for the IP group user.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN By default, the following standard links are included in the block page: • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. By default, these links are included in the block page under the following conditions: • For further options, click here.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Warn Page Customization window The Warn Page Customization window displays when Warn Page is selected from the Customization menu. This window is used with the Warn Option Setting feature, and lets you customize text in the pop-up window end users will see if attempting to access a URL in a library category set up with a Warn setting for his/her profile.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Add, Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the warning page. • In the Description field, enter a static text message to be displayed beneath the warning page header. • In the Link Text field, enter text for the link's URL, and in the Link URL field, enter the corresponding hyperlink in plain text using the http:// or https:// syntax.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Preview Sample Warning Page 1. Click Preview to launch a separate browser window containing a sample customized warning page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-90 Sample Customized Warning Page By default, the following data displays in the User/ Machine frame: • User/Machine field - The username displays for the NT/LDAP user. This field is blank for the IP group user.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN By default, the following standard links are included in the warning page: • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following buttons are included in the warning page: • Continue - Clicking this button closes the warning page and takes the user to the URL he/she requested.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN 2. Click the “X” in the upper right corner of the window to close the sample customized warning page. TIP: If necessary, make edits in the Warn Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample warning page.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Profile Control window The Profile Control window displays when Profile Control is selected from the Customization menu. This window is used with the Override Account feature, and lets you customize text in the pop-up window end users with override accounts will see when logging into their override accounts. Such accounts give authorized users access to Internet content blocked for other end users.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to be displayed at the top of the profile control pop-up window. • In the Warning Text field, enter a static text message to be displayed at the bottom of the pop-up window. 2. Click Apply. TIP: Click Restore Default and then click Apply to revert to the default settings in this window.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Quota Block Page Customization window The Quota Block Page Customization window displays when Quota Block Page is selected from the Customization menu. This window is used for making customizations to the quota block page the end user will see if he/she has a quota time limit set for a passed category in his/her profile and has attained or exceeded that limit. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Add, Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to display at the top of the quota block page. • In the Description field, enter a static text message to be displayed beneath the header. • In the Link Text field, enter text for the link's URL, and in the Link URL field, enter the corresponding hyperlink in plain text using the http:// or https:// syntax.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Preview Sample Quota Block Page 1. Click Preview to launch a separate browser window containing a sample customized quota block page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-93 Sample Customized Quota Block Page By default, the following data displays in the Category frame: • Category field - The name of the library category that blocked the user from accessing the URL displays.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. 2. Click the “X” in the upper right corner of the window to close the sample customized quota block page. TIP: If necessary, make edits in the Quota Block Page Customization window or the Common Customization window, and then click Preview in this window again to view a sample quota block page.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN TIP: An entry in any of the fields in this window is optional. NOTE: For more information about quotas, see the Quota Setting window in this chapter. Add, Edit Entries 1. Make an entry in any of the following fields: • In the Header field, enter a static header to display at the top of the quota notice page. • In the Description field, enter a static text message to be displayed beneath the header.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Preview Sample Quota Notice Page 1. Click Preview to launch a separate browser window containing a sample customized quota notice page, based on entries saved in this window and in the Common Customization window: Fig. 2:1-95 Sample Customized Quota Notice Page By default, the following data displays in the Category frame: • Category field - The name of the library category containing a URL the user accessed—that triggered the quota notice—displays.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site or service may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The following button is included in the quota notice page: • Continue - Clicking this button closes the quota notice page and takes the user to the URL he/she requested. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Quota Setting Quota Setting window The Quota Setting window displays when Quota Setting is selected from the navigation panel. This window lets a global administrator configure URL hits that—along with quotas specified in filtering profiles—determine when a user will be blocked from further accessing URLs in a library group/category.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Configure Quota Hit Settings Enter the number of Seconds Per Hit to indicate how much time will be applied towards a “hit” (URL access) in any category with a quota. The default is 10 seconds per hit. The entry in this field combines with the minutes entered in the quota from the filtering profile to determine the amount of time the end user can access URLs in the specified passed library group/category in that profile.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Set up a Schedule to Automatically Reset Quotas A schedule can be set up to reset all quotas at the appointed hour(s) / minute(s) each day. 1. At the New Reset Time (HH:MM) field: • Select the hour at which the quota will be reset (“00” “23”) • Select the minute at which the quota will be reset (“00” - “59”) 2. Click Add to include this reset time in the Current Reset Time(s) list box. TIP: Repeat steps 1 and 2 for each quota reset time to be scheduled.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN Quota Notice page When the end user has spent 75 percent of time in a quotarestricted library group/category, the quota notice page displays: Fig. 2:1-97 Sample Quota Notice Page By default, the following fields display: • Category field - Name of the library category with the most hits. • Requested URL field - The URL that triggered the Quota Notice page. • IP field - The end user’s IP address.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN • HELP - Clicking this link takes the user to 8e6’s Technical Support page that explains why access to the site may have been denied. • 8e6 Technologies - Clicking this link takes the user to 8e6’s Web site. The end user can decide whether or not to access the requested URL. By clicking Continue, the user is redirected to the original requested site.
GLOBAL ADMINISTRATOR SECTION CHAPTER 1: SYSTEM SCREEN By default, the following fields display: • Category field - The name of the library category that triggered the quota block page displays. • Requested URL field - The URL the user attempted to access displays. • IP field - The user’s IP address displays. • User/Machine field - The username displays for the NT/ LDAP user. This field may be blank for the IP group user.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Chapter 2: Group screen The Group screen is comprised of windows and dialog boxes used for adding IP groups and/or NT/LDAP domains, and for creating filtering profiles for IP/NT/LDAP groups and their members. Fig. 2:2-1 Group screen For the IP group branch, the global administrator creates master IP groups.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN The navigation panel at the left of the screen contains a hierarchical list of groups set up in a tree format. At the root of this tree is Group. The main branches of this tree include: Global Group and IP, followed by NT and LDAP if authentication is enabled. Double-click the branch of your selection to display the list of groups/domains previously added to that branch. Keep double-clicking items in the tree list to view additional items.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Global Group Global Group includes options for creating and maintaining groups. Click the Global Group link to view a menu of subtopics: Range to Detect, Rules, Global Group Profile, Override Account, Minimum Filtering Level, and Refresh All. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Range to Detect window The Range to Detect window displays when Range to Detect is selected from the Global Group menu. This window is used for defining segments of network traffic to be detected by the ProxyBlocker. Service ports that should be open—ignored by the ProxyBlocker—are also defined in this window. Fig. 2:2-3 Range to Detect Settings window, main window The main window (Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Add a Segment to the Network To add a segment to be detected on the network: 1. Click Add to go to the next page: Fig. 2:2-4 Range to Detect Settings, second window 2. Click one of the following buttons to select the procedure for adding the segment: • Start the Setup Wizard - clicking this button takes you to the Range to Detect Setup Wizard.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Range to Detect Setup Wizard Click the Start the Setup Wizard button to display Step 1 of the Range to Detect Setup Wizard. The Wizard is comprised of six steps. An entry is required in Step 1, but not in Steps 2 - 5. Settings made using the Wizard are saved in Step 6. Step 1 In this step you define the source IP address(es) to be filtered. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN • IP / Netmask - use these fields to specify a range of IP addresses • Individual IP - use this field to enter a single IP address 2. Click Add to include the segment in the list box above. NOTE: To modify the segment, select it from the list box and click Modify to move the segment to the field(s) below for editing. To remove the segment, select it from the list box and click Remove. 3. Click Next to go to the next page of the Wizard.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Step 2: Optional In this step you define the destination IP address(es) to be filtered. NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the ProxyBlocker, thus enabling it to handle more traffic. Fig. 2:2-6 Range to Detect Setup Wizard window, Step 2 NOTE: For Steps 2-6, click Back to return to the previous page of the Wizard.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Step 3: Optional In this step you define the source IP address(es) to be excluded from filtering. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Step 4: Optional In this step you define the destination IP address(es) to be excluded from filtering. Any entries from the list box in Step 1 automatically display in the list box above. NOTE: By making entries in Destination IP fields, traffic will be restricted to the range specified in the Source IP and Destination IP frames. This reduces the load on the ProxyBlocker, thus enabling it to handle more traffic. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Step 5: Optional In this step you enter destination port numbers to be excluded from filtering. Fig. 2:2-9 Range to Detect Setup Wizard window, Step 5 1. In the Individual Port field, enter the port number to be excluded from filtering. 2. Click Add to include the entry in the list box above. NOTE: To remove the port number, select it from the list box and click Remove. 3. Click Next to go to the last page of the Wizard.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Step 6 In this final step of the Wizard you review your entries and make modifications, if necessary. Fig. 2:2-10 Range to Detect Setup Wizard window, Step 6 1. Review the contents in all list boxes. 2. Perform one of the following actions: • click the Modify button to the right of the list box if you need to make changes. This action takes you to that page of the Wizard where you make your edits. Click Next until you return to Step 6.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Range to Detect Advanced Settings Click the Advanced Settings button to display the Range to Detect Advanced Settings window: Fig. 2:2-11 Range to Detect Advanced Settings window 1. Enter the settings in the list box, using the correct syntax. Refer to the examples above. TIP: Use the Calculator to calculate IP ranges without any overlaps.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Modify a Segment of the Network To modify a segment: 1. In the main Range to Detect Settings window (see Fig. 2:2-3), select the segment from the Current Ranges list box. 2. Click Modify to go to the second page (see Fig. 2:2-4). 3. Click one of the following buttons to select the procedure for modifying the segment: • Start the Setup Wizard - clicking this button takes you to Step 6 of the Range to Detect Setup Wizard (see Fig. 2:2-10).
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Rules window The Rules window displays when Rules is selected from the Global Group menu. This window is used for adding a filtering rule when creating a filtering profile for an entity. Fig. 2:2-12 Rules window By default, “Rule1 BYPASS” displays in the Current Rules pull-down menu.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN View Criteria for a Rule Select the rule from the Current Rules pull-down menu to populate the Rule Details frame with settings made for that rule. If this rule is not an 8e6 pre-defined rule it can be modified or deleted. A rule that does not yet exist can be added using any rule in this list as a template, if necessary. Add a Rule To create a new rule: 1. Click New Rule to populate the Rule # field with the next consecutive rule number available. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN • The Overall Quota field becomes enabled if a quota is entered for any library group/category. By default, the enabled Overall Quota is turned “Off”. If turned “On”, enter the number of minutes in the Min field to indicate when the end user’s access to passed library groups/ categories with quotas will be blocked.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN 5. Click Save Rule. Remove a Rule To delete a rule: 1. Select the rule from the Current Rules pull-down menu. 2. Click Delete Rule.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Global Group Profile window The Global Group Profile window displays when Global Group Profile is selected from the Global Group menu. This window is used for viewing/creating the global (default) filtering profile that will be used by all users on the network unless a unique filtering profile is created for an entity. Click the following tabs in this window: Category, Port, Default Redirect URL, and Filter Options.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Category Profile Category Profile displays by default when Global Group Profile is selected from the Global Group menu, or when the Category tab is clicked. This tab is used for assigning filter settings to category groups/library categories for the global group profile. By default, “Custom Profile” displays in the Available Filter Levels pull-down menu, and Uncategorized Sites are allowed to Pass.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN • Block - URLs in this category will be blocked. NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN NOTE: See the Quota Settings window in Chapter 1: System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas. • The Overall Quota field becomes enabled if a quota is entered for any library group/category. By default, the enabled Overall Quota is turned “Off”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports for the global filtering profile. Fig. 2:2-14 Global Group Profile window, Port tab Create, Edit a List of Service Ports All service ports are filtered by default. To block a service port from being accessed by global filtering profile users: 1. Enter the port number in the Port field. 2. Click Add.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN 2. Click Remove. 3. Click Apply to apply your settings at the global level. Default Redirect URL Default Redirect URL displays when the Default Redirect URL tab is clicked. This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked for the global filtering profile. Fig. 2:2-15 Global Group Profile window, Default Redirect URL tab Create, Edit the Redirect URL 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN 2. Click Apply to apply your settings. Filter Options Filter Options displays when the Filter Options tab is clicked. This tab is used for specifying which filter option(s) will be applied to the global group filtering profile. Fig. 2:2-16 Global Group Profile window, Filter Options tab Create, Edit the Filter Options 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN X Strikes Blocking With the X Strikes Blocking option enabled, an end user who attempts to access inappropriate sites on the Internet will be locked out from his/her workstation after a specified number of tries within a fixed time period. NOTE: See the X Strikes Blocking window in Chapter 1: System screen for information on setting up the X Strikes Blocking feature. Google/Yahoo!/Ask.com/AOL Safe Search Enforcement With the Google/Yahoo!/Ask.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Search Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled, search engine keywords can be set up to be blocked. When a user enters a keyword in the search engine, if that keyword has been set up to be blocked, the search will not be performed. Search engine keywords are entered in the Search Engine Keywords window of 8e6 supplied library categories and custom library categories.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN URL Keyword Filter Control With the URL Keyword Filter Control option enabled, URL keywords can be set up to be blocked. When a user enters a keyword in the address line of a browser window, if that keyword has been set up to be blocked, the user will be denied access to that site or service. URL keywords are entered in the URL Keywords window of 8e6 supplied library categories and custom library categories.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Override Account window The Override Account window displays when Override Account is selected from the Global Group menu. This window is used for creating an override account that allows an IP group user to bypass settings at the minimum filtering level. A user with an override account will be able to access categories and service ports blocked at the minimum filtering level. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN NOTES: A user can have only one override account. If an override account was previously created for a user in a master IP group, only that override account will be effective, unless that account is deleted from the IP group. See the Override Account window in Chapter 1 of the Group Administrator Section for information on setting up an override account for a user in an IP group.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the override account profile. Fig. 2:2-18 Override Account pop-up window, Rule tab To create the category profile: 1. Select a filtering rule from the available choices in the Available Filter Levels pull-down menu.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN • In the Quota column, enter the number of minutes the user will be able to access the library group/category. The minimum number of minutes is “1” and the maximum is “1439” (one day minus one minute).
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked. Fig. 2:2-19 Override Account pop-up window, Redirect tab 1. Specify the type of redirect URL to be used: “Default Block Page”, “Authentication Request Form”, or “Custom URL”. If “Custom URL” is selected, enter the redirect URL in the corresponding text box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN 3. Click the Filter Options tab to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window. Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig. 2:2-20 Override Account pop-up window, Filter Options tab 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN NOTE: See the X Strikes Blocking window in Chapter 1: System screen for information on setting up the X Strikes Blocking feature. • “Google/Yahoo!/Ask.com/AOL Safe Search Enforcement” - With the Google/Yahoo!/Ask.com/AOL Safe Search Enforcement option enabled, Google, Yahoo!, Ask.com, and AOL’s “strict” SafeSearch Filtering option will be used whenever the end user performs a Google, Yahoo!, Ask.com, or AOL Web search or Image search.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN NOTE: To set up search engine keywords in a Search Engine Keywords window, see the following sections of this user guide for the specified library type: • 8e6 Supplied Categories - see Chapter 3: Library screen, Search Engine Keywords window. • Custom Categories - see the Group Administrator Section, Chapter 2: Library screen, Search Engine Keywords window.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Edit an Override Account Change the Password To change an override account’s password: 1. In the Current Accounts frame, select the username from the list box. 2. In the Account Details frame, enter the username in the Name field. 3. Enter the new Password. 4. Make the same entry again in the Confirm Password field. 5. Click View/Modify to open the pop-up window. 6. Click Apply. 7. Click Close to close the pop-up window.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Delete an Override Account To delete an override account: 1. In the Current Accounts frame, select the username from the list box. 2. Click Remove. Minimum Filtering Level window The Minimum Filtering Level window displays when Minimum Filtering Level is selected from the Global Group menu.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Fig. 2:2-21 Minimum Filtering Level window, Min. Filtering Categories By default, “Child Pornography” and “Pornography/Adult Content” are assigned a Block filter setting, and all other active library categories are set to Pass. Filter settings are designated by the check mark inside a green circle in the Pass or Block column.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Create, Edit Minimum Filtering Categories To create the categories portion of the minimum filtering level profile: 1. Double-click the column (Pass, Block) in the row corresponding to that category group/library category to move the check mark to that column: • Pass - URLs in this category will pass to the end user. • Block - URLs in this category will be blocked.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Port Port displays when the Port tab is clicked. This tab is used for blocking access to specified ports at the minimum filtering level. Fig. 2:2-22 Minimum Filtering Level window, Port tab Create, Edit a List of Service Ports All service ports are filtered by default. To block a service port from being accessed at the minimum filtering level: 1. Enter the port number in the Port field. 2. Click Add.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN 1. Select the port number. 2. Click Remove. 3. Click Apply to apply your settings at the minimum filtering level. Minimum Filtering Bypass Options Minimum Filtering Bypass Options displays when the Min. Filter Bypass tab is clicked. This tab is used for specifying whether users in a master IP group will be allowed to bypass the minimum filtering level with an override account or an exception URL. Fig. 2:2-23 Minimum Filtering Level window, Min.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Specify Minimum Filtering Bypass Options To allow a user to override settings made at the minimum filtering level: 1. In the Override Account frame, click the “On” checkbox. Any user who has an override account will be able to access content blocked at the minimum filtering level. 2. Click Save to apply your settings. To allow users to bypass exception URLs set up to be blocked at the minimum filtering level: 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Refresh All Refresh All Main Branches From the Global Group menu, click Refresh All to refresh the main branches of the tree. This action should be performed whenever authentication has been enabled or disabled. If authentication is enabled, when Refresh All is clicked, the NT and LDAP branches of the tree display. When authentication is disabled, when Refresh All is clicked only the IP branch of the tree displays.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN IP IP includes options for adding a master IP group and to refresh the tree list. Click the IP link to view a menu of subtopics: Add Group, and Refresh. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN Add Group Add a Master IP Group From the IP group menu: 1. Choose Add Group to open the Create New Group dialog box: Fig. 2:2-25 Create New Group box 2. Enter up to 20 characters for the Group Name. NOTES: The name of the master IP group must be less than 20 characters; cannot be “IP”, “NT”, or LDAP”, and cannot contain spaces. The first character cannot be a digit. The following characters cannot be used in the name: “.
GLOBAL ADMINISTRATOR SECTION CHAPTER 2: GROUP SCREEN 4. Click OK to add the group to the tree. NOTE: Information on defining the group and its members and establishing their filtering profiles can be found in the Group Administrator Section of this user guide. Refresh Refresh IP Groups From the IP group menu, click Refresh whenever changes have been made in this branch of the tree.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Chapter 3: Library screen The Library screen is comprised of windows and dialog boxes used for adding and maintaining library categories. Library categories are used when creating or modifying filtering profiles. Fig. 2:3-1 Library screen A list of main topics displays in the navigation panel at the left of the screen: Updates, Library Lookup, Category Weight System, NNTP Newsgroup, and Category Groups.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN envelope—any envelope except Custom Categories—to view 8e6 supplied library categories for that group. Click a library category topic to view a menu of sub-topics for that library category item: Library Details, URLs, URL Keywords, and Search Engine Keywords.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Updates Updates includes options for making configurations for library category activities. Click the Updates link to view a menu of sub-topics: Configuration, Manual Update, Additional Language Support, Library Update Log, and Emergency Update Log. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Configuration window The Configuration window displays when Configuration is selected from the Updates menu. This window is used for making settings to allow the ProxyBlocker to receive 8e6 supplied library category updates on a daily basis. Fig. 2:3-3 Configuration window Set a Time for Updates to be Retrieved 1. In the Schedule Time frame, by default “1:00 am” displays for the Current automatic update time.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Optional: Specify a Proxy Server 1. In the FTP Proxy Setting frame, by default “Disable” is selected. Click “Enable” if the server is in a proxy server environment. This selection activates the fields in this frame. 2. By default, proxy.company.com displays as the host name of the Proxy Server. Enter the host name for the proxy server in this field. 3. By default, userid displays in the Username field. Enter the username for the FTP account. 4.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Manual Update window The Manual Update to 8e6 Supplied Categories window displays when Manual Update is selected from the Updates menu. This window is used for updating specified 8e6 supplied library categories on demand from the update server, if the ProxyBlocker has not received daily updates due to an occurrence such as a power outage. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Specify the Type of On Demand Update 1. Choose from the following service options by clicking the corresponding radio button: • Weekly Update - Select this option to update URL library categories with additions and deletions, and to update search engine keywords, newsgroup libraries, and IM/P2P pattern files. Choose this option to force a regular update.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Additional Language Support window The Additional Language Support window displays when Additional Language Support is selected from the Updates menu. This window is used for including additional 8e6supported languages in library downloads. Fig. 2:3-5 Additional Language Support window Select Additional Languages 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN To make an optional selection for a primary language, choose the language from the (Optional) Select Primary Language pull-down menu. TIP: To move a language selection back to the Unselected Languages list box, select the item and then click the left arrow. 3. Click Apply to have URLs from the selected language(s) included in the library categories.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Library Update Log window The Library Update Log window displays when Library Update Log is selected from the Updates menu. This window is used for viewing transfer activity of library updates from the update server to your ProxyBlocker, and for downloading the activity log. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Download Log, View, Print Contents Download the Log 1. Click Download Log to open the alert box containing a message on how to download the log file to your workstation, if using Windows XP. 2. Click OK to close the alert box. Two pop-up boxes open: • A second alert box asks you to confirm that the file was successfully saved to your machine. Click OK in this box after the download is completed. • In the File Download dialog box, click Save: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN 3. Find the folder in which to save the file, and then enter the File name, retaining the “.zip” file extension. Click Save to begin downloading the zip file to your workstation. After the file has completely downloaded, the Download complete dialog box opens: Fig. 2:3-9 Download Complete box 4. You can now open this file, open the folder where the file was saved, or close this dialog box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Fig. 2:3-10 Folder containing downloaded file 2. Choose “Open With” and then select a zip file executable program such as “WinZip Executable” to launch that application: Fig. 2:3-11 WinZip Executable program 3.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Fig. 2:3-12 WinZip window 4. Right-click the zip file to open the pop-up menu, and choose “View” to open the View dialog box: Fig. 2:2-13 View dialog box 5. Select “Internal ASCII text viewer”, and then click View to open the View window containing the log file contents: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Save, Print the Log File Contents With the log file displaying correctly formatted in WinZip’s View window, if you wish to save or print the contents of this file: 1. Click Clipboard Copy, wait for the dialog box to open and confirm that the text has been copied to the clipboard, and then click OK to close the dialog box. 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Emergency Update Log window The Emergency Update Log window displays when Emergency Update Log is selected from the Updates menu. This window is used for viewing transfer activity of emergency software updates from the update server to your ProxyBlocker, and for downloading the activity log. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Download the Software Update Log File NOTE: See Library Update Log window for screen shots pertaining to downloading the software update log file. 1. Click Download Log to open the alert box containing a message on how to download the log file to your workstation, if using Windows XP. 2. Click OK to close the alert box. Two pop-up boxes open: • A second alert box asks you to confirm that the file was successfully saved to your machine.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Library Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel. This window is used for verifying whether a URL or search engine keyword or keyword phrase exists in a library category, and to remove it, if necessary. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN URL Lookup, Removal Perform a URL Check To see if a URL has been included in the library: 1. In the URL Lookup frame, enter the URL. For example, enter http://www.playboy.com, playboy.com, or use a wildcard by entering *.playboy.com. A wildcard entry finds all URLs containing text that follows the period (.) after the asterisk (*). The following types of URL formats also can be entered in this field: • IP address - e.g. "209.247.228.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Remove a URL To remove the URL: 1. Select the item from the Result Category list box. 2. Click Remove. Submit an Email to the Administrator If using a non-Web based email client such as Outlook, you can send an email to the administrator at your organization regarding a URL or search engine keyword that appears to be incorrectly categorized. 1. Select the item(s) from the Result Category list box. 2. Click Email Result.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Search Engine Keyword Lookup, Removal Perform a Search Engine Keyword Check To see if a search engine keyword or keyword phrase has been included in any library category: 1. In the Search Engine Keyword Lookup frame, enter the Search Engine Keyword or keyword phrase, up to 75 alphanumeric characters. 2. Click Lookup to display results in the Result Category list box, showing the long name of all categories that contain the search engine keyword/phrase.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Category Weight System Category Weight System window The Category Weight System window displays when Category Weight System is selected from the navigation panel. This feature lets you choose which category will be logged and reported for a URL request that exists in multiple categories (possibly both 8e6 supplied and custom library categories) with the same operational precedence. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN View the Current Selections This window contains two list boxes: • “No Weight” Categories - Populated with 8e6 supplied categories • “Weight” Categories - Pre-populated by default with categories 8e6 suggests you might want to use for this feature. The contents in each list box, combined with the end user’s profile, help to determine what will appear in the log for the end user’s Internet activity.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Weighting Library Categories 1. Select the category from the "No Weight" Categories list box. TIP: Multiple categories can be selected by clicking each category while pressing the Ctrl key on your keyboard. Blocks of categories can be selected by clicking the first category, and then pressing the Shift key on your keyboard while clicking the last category. 2. Use the right arrow to move the selection to the "Weight" Categories list box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN NNTP Newsgroup NNTP Newsgroup window The NNTP Newsgroup window displays when NNTP Newsgroup is selected from the navigation panel. This window is used for adding or removing a newsgroup from the libraries. Fig. 2:3-19 NNTP Newsgroup window Add a Newsgroup to the Library To add a newsgroup to the library: 1. In the Newsgroup frame, enter the Newsgroup address. 2. Click Add.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Remove a Newsgroup from the Library To remove a newsgroup from the library: 1. In the Newsgroup frame, enter the Newsgroup address. 2. Click Remove. After all changes have been made to library windows, click Reload Library to refresh. NOTE: Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker, 8e6 recommends clicking Reload Library only after modifications to all library windows have been made.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Category Groups Category Groups is represented by a tree of library category groups, with each group comprised of 8e6 supplied library categories. 8e6 supplied library categories are updated regularly with new URLs via Traveler, 8e6’s executable program that supplies updates to the ProxyBlocker. Category Groups also contains the Custom Categories category group.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Click the 8e6 supplied category link or the ALLOW or BLOCK link in Custom Categories to view a menu of subtopics: Library Details, URLs, URL Keywords, and Search Engine Keywords. (Menus for Instant Messaging library categories only include the sub-topics Library Details, and URLs).
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Library Details window The Library Details window displays when Library Details is selected from the library category’s menu of sub-topics. This window is a view only window. Fig. 2:3-21 Library Details window View Library Details This window displays the Group Name, Description, and Short Name of the 8e6 supplied library category.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN URLs window The URLs window displays when URLs is selected from the library category’s menu of sub-topics. This window is used for viewing, or adding and/or removing a URL from a library category. A URL can contain a domain name—such as “playboy” in http://www.playboy.com—or an IP address— such as “209.247.228.221” in http://209.247.228.221. A wildcard asterisk (*) symbol followed by a period (.) can be entered in a format such as *.playboy.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN View a List of URLs in the Library Category To view a list of all URLs that either have been added or deleted: 1. Click the View tab. 2. Make a selection from the pull-down menu for “Addition List”, “Deletion List”, “Wildcard Addition List”, or “Wildcard Deletion List”. 3. Click View List to display the specified items in the Select List list box: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Add or Remove URLs, Reload the Library The Action tab is used for making entries in the URLs window for adding or removing a URL, or reloading the library. Add a URL to the Library Category To add a URL to the library category: 1. In the Edit URL List frame, enter the URL in a format such as http://www.playboy.com, www.playboy.com, or playboy.com. The following types of URL formats also can be entered in this field: • IP address - e.g. "209.247.228.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Add a Wildcard URL to the Library Category NOTE: Wildcards are to be used for blocking only. They are not designed to be used for the exceptions function or the always allowed white listing function. To add a URL containing a wildcard to the library category: 1. In the Edit WildCard URL List frame, enter the asterisk (*) wildcard symbol, a period (.), and the URL. TIP: The minimum number of levels that can be entered is three (e.g. *.yahoo.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Remove a URL from the Library Category To remove a URL or wildcard URL from the library category: 1. Click the Action tab. 2. Enter the URL in the Edit URL List frame or Edit WildCard URL List frame, as pertinent. 3. Click Remove to display the associated URLs in the list box below. 4. Select the URL(s) that you wish to remove from the category. 5. Click Apply Action.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN URL Keywords window The URL Keywords window displays when URL Keywords is selected from the library category’s menu of sub-topics. This window is used for adding and removing URL keywords from a library category. A library category uses URL keywords to block a user’s access to Internet addresses containing keywords included in its list. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive characters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked categories. For example, if all URL keywords containing “sex” are blocked, users will not be able to access a non-pornographic site such as http:// www.essex.com.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Upload a List of URL Keywords to the Library Before uploading a text file with URL keyword additions or deletions, in the Upload URL Keyword File frame, specify whether the contents of this file will add to the current file, or overwrite the current file on the server, by clicking the “Append” or “Overwrite” radio button. Upload a List of URL Keyword Additions To upload a text file with URL keyword additions: 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Upload a List of URL Keyword Deletions To upload a text file with URL keyword deletions: 1. Click Upload To Deletion File to open the Upload Library Keyword pop-up window (see Fig. 2:3-25). 2. Click Browse to open the Choose file window. 3. Select the file to be uploaded. 4. Click Upload File to upload this file to the server. Reload the Library After all changes have been made to library windows, click Reload to refresh.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Search Engine Keywords window The Search Engine Keywords window displays when Search Engine Keywords is selected from the library category’s menu of sub-topics. This window is used for adding and removing search engine keywords/phrases to and from a library category. A library category uses search engine keywords to block searches on subjects containing keywords included in its list. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN NOTE: If the feature for search engine keyword filtering is not enabled in a filtering profile, search engine keywords can be added in this window but search engine keyword filtering will not be in effect for the user(s). (See the Filter Options tab in the Group screen section for information about enabling search engine keyword filtering.) WARNING: Use extreme caution when setting up search engine keywords for filtering.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Remove a Search Engine Keyword from the Library To remove a search engine keyword/phrase from the library category: 1. In the Edit Search Keyword List frame, enter up to 75 alphanumeric characters in the Keyword field. 2. Click Remove.
GLOBAL ADMINISTRATOR SECTION CHAPTER 3: LIBRARY SCREEN Upload a List of Search Engine Keyword Deletions To upload a text file with search engine keyword/phrase deletions: 1. Click Upload To Deletion to open the Upload Library Keyword pop-up window (see Fig. 2:3-25). 2. Click Browse to open the Choose file window. Select the file to be uploaded. 3. Click Upload File to upload this file to the server. Reload the Library After all changes have been made to library windows, click Reload to refresh.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Chapter 4: Reporting screen The Reporting screen contains options for transferring and/ or reviewing Internet usage data collected by the ProxyBlocker. Fig. 2:4-1 Reporting screen From the navigation panel at the left of the screen, click Report Configuration to display the Report Configuration window, used if the ProxyBlocker's log files will be transferred to a reporting application.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Report Configuration Report Configuration window The Report Configuration window displays when Report Configuration is selected from the navigation panel. This window is used if a reporting application needs to be set up to receive logs from the ProxyBlocker. Fig. 2:4-2 Report Configuration window Specify the Reporting Device By default, no option is selected at the Export field. If ProxyBlocker logs will be exported to a reporting application: 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN 2. Click Save. 8e6 Enterprise Reporter If “8e6 Enterprise Reporter” was selected, the 8e6 Enterprise Reporter tab displays by default. On this tab, you need to specify criteria for the ER server that will receive logs from the ProxyBlocker. Fig. 2:4-3 Report Configuration window, 8e6 ER option, ER tab Edit ER Server Information In the Log File Transfer Configuration frame, by default the IP address 1.2.3.6 displays in the Remote Server list box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN To remove an IP address from the list box: 1. Select the IP address. 2. Click Remove. Execute Log Transfer Now In the Initiating Log Transfer frame, click Initiate to transfer the log on demand. View Transfer Activity to the ER After the ER has been configured and logs have been transferred from the ProxyBlocker to the ER, you can view transfer activity. Fig. 2:4-4 Report Configuration window, 8e6 ER option, Log tab 1. Click the Log tab.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN 2. Click View Log to view up to the last 300 lines of transfer activity in the View Log frame. Other Device If “Other Device” was selected, the Other Device tab displays by default. On this tab, you need to specify criteria for the reporter that will receive logs from the ProxyBlocker. Fig. 2:4-5 Report Configuration window, Other Device option and tab Enter or Edit Server Information In the Server Configuration frame: 1.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN 3. At the User Authentication field, “User” is selected by default, indicating that a username and password will be required for FTP transfers. Click the “Anonymous” radio button if no user authentication will be required for FTP transfers. 4. By default, the Username field is activated. For this option, userid displays by default. Change the username by entering a valid one for FTP transfers. 5.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN View Transfer Activity to the Reporting Device After logs have been transferred from the ProxyBlocker to the reporting device, the Log tab can be clicked to view transfer activity. On this tab, click View Log to view up to the last 300 lines of transfer activity in the View Log frame.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Real Time Probe Real Time Probe window The Real Time Probe window displays when Real Time Probe is selected from the navigation panel. This feature lets the probe administrator monitor a user's Internet usage in real time to see if that user is using the Internet appropriately. Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Configuration Enable Real Time Probes 1. On the Configuration tab, click “On”. 2. Click Save to enable the Real Time Probes feature. As a result, all elements in this window become activated. Set up Real Time Probes 1. Enter the Maximum Probes to Run/Schedule Simultaneously, up to 99 probes. The default setting is 10 probes. 2. Enter the Maximum Probes that can be Scheduled, equal to or less than the maximum probes that can run at the same time.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Remove IPs from the White List 1. Select the IP address(es) from the Current White list of IPs list box. 2. Click Delete to remove the IP address(es) from the white list. Report Recipients Click the Report Recipients tab to display Email Report: Fig. 2:4-7 Real Time Probe window, Report Recipients tab Specify Email File Criteria 1. Click the radio button corresponding the to the Email Format to be used for the file: “Plain Text” or “HTML”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN 2. Select the Maximum File Size of an Email Report (MB) that can be sent, from 1MB increments up to 20MB. The default is 5 MB. 3. Click Save. Set up Email Addresses to Receive Reports 1. Enter the Email Address of an individual who will receive completed probe reports. 2. Click Add to include the email address in the Current List of Completed Reports to be Emailed list box. NOTE: The maximum number of report recipients is 50.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Logon Accounts Click the Logon Accounts tab to display Logon Accounts: Fig. 2:4-8 Real Time Probe window, Logon Accounts tab Set up Users Authorized to Create Probes 1. Enter the Username of a staff member who is authorized to create real time probes. 2. Enter the user's password in the Password and Confirm Password fields, using eight to 20 characters and at least one alpha character, one numeric character, and one special character.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN NOTE: When an authorized staff member is added to this list, that username is automatically added to the Current Un-Accessible Users list box in the Logon Accounts tab of the X Strikes Blocking window. Deactivate an Authorized Logon Account To deactivate an authorized user’s account: 1. Select the username from the Current Accessible Users list box. 2. Click Disable to move the username to the Current UnAccessible Users list box.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Go to Real Time Probe Reports GUI When the global administrator clicks Go to Real Time Probe Reports GUI, either the Re-login window or the Real Time Probe Reports pop-up window opens. Re-login window The Re-login window opens if the user’s session needs to be validated: Fig. 2:4-9 Re-login window 1. Enter your Username. 2. Enter your Password. 3. Click OK to close the Re-login window and to re-access the ProxyBlocker console.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Real Time Probe Reports The Real Time Probe Reports window is comprised of the View and Create tabs. The View tab displays by default (see Fig. 2:4-11), showing the global administrator information on all active probes. NOTE: An authorized staff member can click a link in an email alert or type in http://x.x.x.x:88/RtProbe.jsp in the address field of a browser window—in which “x.x.x.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN The Current Probe Count displays the Total number of active probes, and the number of probes Created Under This Account. The Maximum Probes to Run/Schedule Simultaneously entered on the Configuration tab displays. 1. Enter up to 40 characters for the Display Name. This label will be used for the probe in the View tab and in the email report to be sent to the designated recipient(s). 2.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN • “Category”: Select the library category to be probed. This selection generates a report with data for the specified library category. NOTE: Up to 250 characters will be accepted for the IP Address, User Name, or URL. 4. If you wish to send the completed report to a specified email address, enter the Email Address to Mail the Completed Report. 5.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN View Real Time Probe Details Click the View tab to view details about active probes: Fig. 2:4-11 Real Time Probe Reports, View tab The Display Name shows the name assigned to the probe on the Create tab. The Start Date & Time displays in the YYYY/MM/DD HH:MM:SS format. “Daily” displays in the Recurrence column if the probe is scheduled to run on a daily basis. The Status of the probe displays: “Completed”, “In Progress”, or “Scheduled”.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN By selecting a probe, buttons for the probe become activated, based on the state of the probe. The following options are available for each of the probe statuses: • Completed: View, Properties, Delete, Email • In Progress: View, Properties, Stop • Scheduled: Properties, Delete View option If a probe is Completed or In Progress, clicking View opens the Real Time Information box: Fig.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN keyword if the method is an SE Keyword or a URL Keyword); URL in Libraries, and Requested URL. The following actions can be performed in this box: • Click a URL to open a window that accesses the designated site. • If the probe is currently in progress, clicking Stop halts the real time probe and changes this button to “Email”. • After the probe is completed, the Email button is available instead of the Stop button.
GLOBAL ADMINISTRATOR SECTION CHAPTER 4: REPORTING SCREEN Stop, Delete options Clicking Stop halts the probe and gives it a Completed status. This option is also available in the Real Time Information box via the “Stop” button. Clicking Delete opens the following dialog box, asking if you want to delete the probe: Fig. 2:4-14 Probe Properties deletion box Click Yes to delete the probe and remove it from the View tab. Email option Clicking Email opens the Email Address box: Fig.
GROUP ADMINISTRATOR SECTION INTRODUCTION GROUP ADMINISTRATOR SECTION Introduction The Group Administrator Section of this user guide is comprised of two chapters that include information on functions performed by the group administrator. Chapter 1 includes information on setting up and maintaining master IP groups and group members. Chapter 2 includes information on maintaining exception URLs.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Chapter 1: Group screen Group administrators use group screen windows to add members to a master IP group, create sub-groups and/or individual IP members, and define and maintain members’ filtering profiles. A member is associated with an IP address and may contain a netmask within a valid IP address range. Fig. 3:1-1 Group screen The navigation panel at the left of the screen contains the IP branch of the Group tree.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN IP Refresh Refresh the Master IP Group, Member Click Refresh whenever a change has been made to the master IP group or member level of the tree. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Master IP Group Master IP group includes options for defining and maintaining group accounts, setting up an override account and/ or exception URLs to bypass global settings, and uploading or downloading IP profiles.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Group Details window The Group Details window displays when Group Details is selected from the menu. This window is used for viewing the Group Name and for changing the password of the group administrator. Fig. 3:1-4 Group window Change the Group Administrator Password In the Group Administrator frame, the Group Name displays. To change the password for this group: 1.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Members window The Members window displays when Members is selected from the menu. This window is used for adding and managing members of a master IP group. A member is comprised of an associated IP address, and a sub-group may also contain a netmask. Fig. 3:1-5 Members window Add the IP Address of the Member 1. Specify whether to add an IP address range with or without a netmask by selecting either “Source IP” or “Source IP Start / End”.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN 2. Click Add to include the IP address entry in the Current Members list box. TIP: Click Calculator to open the IP Calculator, and calculate IP ranges without any overlaps. Enter the IP address, specify the Netmask, and then click Calculate to display results in the Min Host and Max Host fields. Click Close to exit. Remove a Member from the Group To remove an entry from the Current Members list box: 1. Select the member from the list box. 2.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Override Account window The Override Account window displays when Override Account is selected from the menu. This window is used for creating an override account that allows an end user from a master IP group to bypass settings at the minimum filtering level. A user with an override account will be able to access categories and service ports blocked at the minimum filtering level, if the option to bypass the minimum filtering level is activated. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN NOTES: Override accounts can be created for any authorized user. In order for a user with an override account to access categories and ports set up to be blocked at the master IP group level, the global administrator must first activate the option to allow an override account to bypass minimum filtering level settings. A user can have only one override account.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the override account profile. Fig. 3:1-7 Override Account pop-up window, Rule tab To create the category profile: 1. Select a filtering rule from the available choices in the Available Filter Levels pull-down menu.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN NOTE: If a category group does not display any filter setting (i.e. the check mark does not display in any column for the category group), one or more library categories within that group has a filter setting in a column other than the filter setting designated for all collective library categories within that group.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN • In the Quota column, enter the number of minutes the user will be able to access the library group/category. The minimum number of minutes is “1” and the maximum is “1439” (one day minus one minute). The number of minutes entered here combines with the seconds per hit (minimum one second to maximum 3600 seconds) defined in the Quota Settings window to determine when the end user will be blocked from further access to URLs in that library group/category.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting the user if he/she attempts to access a site or service set up to be blocked. Fig. 3:1-8 Override Account pop-up window, Redirect tab Specify the type of redirect URL to be used: “Default Block Page”, “Authentication Request Form”, or “Custom URL”. If “Custom URL” is selected, enter the redirect URL in the corresponding text box.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the override account profile. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN • “Google/Yahoo!/Ask.com/AOL Safe Search Enforcement” - With the Google/Yahoo!/Ask.com/AOL Safe Search Enforcement option enabled, Google, Yahoo!, Ask.com, and AOL’s “strict” SafeSearch Filtering option will be used whenever the end user performs a Google, Yahoo!, Ask.com, or AOL Web search or Image search. WARNING: If this option is used in conjunction with the X Strikes Blocking feature and the user is performing an inappropriate Google, Yahoo!, Ask.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN NOTE: To set up URL keywords in a URL Keywords window, see the URL Keywords window in Chapter 2. Edit an Override Account Change the Password To change an override account’s password: 1. In the Current Accounts frame, select the username from the list box. 2. In the Account Details frame, enter the username in the Name field. 3. Enter the new Password. 4. Make the same entry again in the Confirm Password field. 5.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Delete an Override Account To delete an override account: 1. In the Current Accounts frame, select the username from the list box. 2. Click Remove.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Group Profile window The Group Profile window displays when Group Profile is selected from the group menu. This window is used for viewing/creating the group’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options. Entries in these tabs comprise the profile string for the group.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN By default, “Rule0 Minimum Filtering Level” displays in the Available Filter Levels pull-down menu, and the Minimum Filtering Level box displays “Child Pornography” and “Pornography/Adult Content”. By default, Uncategorized Sites are allowed to Pass. NOTE: By default, the Available Filter Levels pull-down menu also includes these five rule choices: Rule1 BYPASS”, “Rule2 BLOCK Porn”, “Rule3 Block IM and Porn”, “Rule4 8e6 CIPA Compliance”, and “Block All”.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN • Allow - URLs in this category will be added to the end user’s white list. • Warn - URLs in this category will warn the end user that the URL he/she requested can be accessed, but may be against the organization’s policies. The end user can view the URL after seeing a warning message and agreeing to its terms. • Block - URLs in this category will be blocked.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN 5. Click Apply to apply your settings to the override account profile. 6. Click another tab (Redirect or Filter Options) to continue creating the override account profile, or click Close to close the pop-up window and to return to the Override Account window. Redirect URL Redirect URL displays when the Redirect URL tab is clicked.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN If “Custom URL” is selected, enter the redirect URL in the corresponding text box. Users will be redirected to the designated page at this URL instead of the block page. 2. Click Apply to apply your settings. Filter Options Filter Options displays when the Filter Options tab is clicked. This tab is used for specifying which filter option(s) will be applied to the group’s filtering profile. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN 2. Click Apply to apply your settings. X Strikes Blocking With the X Strikes Blocking option enabled, an end user who attempts to access inappropriate sites on the Internet will be locked out from his/her workstation after a specified number of tries within a fixed time period. NOTE: See the X Strikes Blocking window in Chapter 1: System screen of the Global Group Section for information on setting up the X Strikes Blocking feature. Google/Yahoo!/Ask.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN engine, if that keyword has been set up to be blocked, the search will not be performed. Search engine keywords are entered in the Search Engine Keywords window of custom library categories. NOTES: Search engine keyword filtering relies on an exact keyword match. For example, if the word “sex” is set up to be blocked, but “sexes” is not set up to be blocked, a search will be allowed on “sexes” but not “sex”.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Exception URL window The Exception URL window displays when Exception URL is selected from the group menu. This window is used for blocking group members’ access to specified URLs and/or for letting group members access specified URLs blocked at the minimum filtering level. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Block URL frame To block the group’s access to a URL: 1. In the Block URL field, enter the URL. 2. Click Add to include the URL in the Block URLs list box. To allow the URL to be accessed by the group again: 1. Select the URL from the Block URLs list box. 2. Click Remove. ByPass URL frame To allow a URL that is blocked at the minimum filtering level to be accessed by the group: 1. In the ByPass URL field, enter the URL. 2.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Time Profile window The Time Profile window displays when Time Profile is selected from the group menu. This window is used for setting up or modifying a filtering profile to be activated at a specified time. Fig. 3:1-14 Time Profile window The Current Time Profiles list box displays the Name and Description of any time profiles previously set up for the entity that are currently active. Add a Time Profile To create a time profile: 1.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Fig. 3:1-15 Adding Time Profile 2. Type in three to 20 alphanumeric characters—the underscore ( _ ) character can be used—for the profile name. 3. Click OK to close the pop-up box and to open the Adding Time Profile pop-up window that displays the name of this profile at the top of the Time Profile frame: Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN 4. In the Recurrence duration time frame, specify Start and End time range criteria: a. Select from a list of time slots incremented by 15 minutes: “12:00” to “11:45”. By default, the Start field displays the closest 15-minute future time, and the End field displays a time that is one hour ahead of that time. For example, if the time is currently 11:12, “11:15” displays in the Start field, and “12:15” displays in the End field. b.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN • Daily - If this selection is made, enter the interval for the number of days this time profile will be used. By default, “1” displays, indicating this profile will be used each day during the specified time period. If 5 is entered, this profile will be used every five days at the specified time.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN • Yearly - If this selection is made, the year(s), month, and day for this time profile’s interval must be specified: First enter the year(s) for the interval. By default “1” displays, indicating this time profile will be used each year. Next, choose from one of two options to specify the day of the month for the interval: • The first option lets you choose a specific month (“January” - “December”) and day (“1” - “31”).
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN • End by - If this selection is made, by default today’s date displays using the MM/DD/YY format. To choose another date, click the arrow in the date drop-down menu to open the calendar pop-up box. (See the information on the previous pages on how to use the calendar box.) 7. Click each of the tabs (Rule, Redirect, Filter Options, Exception) and specify criteria to complete the time profile.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Category Profile The Rule tab is used for creating the categories portion of the time profile. Fig. 3:1-17 Time Profile pop-up window, Rule tab NOTE: See the Override Account window, Category Profile subsection in this chapter for information about entries that can be made for this component of the filtering profile.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Redirect URL The Redirect tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked. Fig. 3:1-18 Time Profile pop-up window, Redirect URL tab NOTE: See the Override Account window, Redirect URL subsection in this chapter for information about entries that can be made for this component of the filtering profile.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Filter Options The Filter Options tab is used for specifying which filter option(s) will be applied to the time profile. Fig. 3:1-19 Time Profile pop-up window, Filter Options tab NOTE: See the Override Account window, Filter Options subsection in this chapter for information about entries that can be made for this component of the filtering profile.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Exception URL The Exception tab is used for allowing users to be blocked from accessing specified URLs and/or to be allowed to access specified URLs blocked at the minimum filtering level. Fig. 3:1-20 Time Profile pop-up window, Exception tab NOTE: Settings in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN To block the group’s access to a URL: 1. In the Block URL field, enter the URL. 2. Click Add to include the URL in the Block URLs list box. To allow the URL to be accessed by the group again: 1. Select the URL from the Block URLs list box. 2. Click Remove. To allow a URL that is blocked at the minimum filtering level to be accessed by the group: 1. In the ByPass URL field, enter the URL. 2. Click Add to include the URL in the ByPass URLs list box.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Modify a Time Profile To modify an existing time profile: 1. Select the time profile from the Current Time Profiles list box. 2. Click View/Modify to open the Modify Time Profiles popup window. 3. Make modifications in the default Recurrence tab and/or click the tab in which to make modifications (Rule, Redirect, Filter Options, Exception). 4. Make edits in this tab and in any other tab, if necessary. 5. Click Apply. 6.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Upload/Download IP Profile window The Upload/Download IP Profile window displays when Upload/Download IP Profile is selected from the group menu. This window is used for uploading or downloading a text file containing filtering profiles of multiple users or subgroups. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Upload IP Profiles 1. Click Upload File to open both the refresh message dialog box and the Upload IP Profiles pop-up window: Fig. 3:1-22 Upload IP Profiles pop-up window NOTE: Leave the message dialog box open until the file containing the profile has been uploaded. 2. Click Browse to open the Choose file window in which you find and select the file containing the IP profiles to be uploaded.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Download Profile If profiles have been created and/or uploaded to the server: 1. Click Download Profile to open a browser window containing the profiles: Fig. 3:1-23 Download IP Profiles window The contents of this window can viewed, printed, and/or saved. 2. Click the “X” in the upper right corner of the window to close it.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Add Sub Group Add an IP Sub Group From the group menu: 1. Click Add Sub Group to open the Create Sub Group dialog box: Fig. 3:1-24 Create Sub Group box 2. Enter the Group Name for the sub-group. NOTES: The name of the sub-group must be less than 20 characters; cannot be “IP”, “NT”, or LDAP”, and cannot contain spaces. The first character cannot be a digit. The following characters cannot be used in the name: “.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN WARNING: When adding a sub-group to the tree list, sub-group users will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window. The minimum filtering level is established by the global administrator. Add Individual IP Add an Individual IP Member From the group menu: 1. Click Add Individual IP to open the Create Individual IP dialog box: Fig. 3:1-25 Create Individual IP box 2.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN 3. Click OK to close the dialog box and to add the individual IP member to the master IP group tree. WARNING: When adding an Individual IP member to the tree list, the user will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window. The minimum filtering level is established by the global administrator.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Paste Sub Group The Paste Sub Group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists. A sub-group can be “pasted”—or copied—to a group if the Copy Sub Group function was first performed at the subgroup level. Paste a Copied IP Sub Group From the group menu: 1. Select Paste Sub Group to open the Paste Sub Group dialog box: Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Sub Group Sub Group includes options for creating and maintaining the filtering profile for the sub-group. Click the sub-group’s link to view a menu of sub-topics: Sub Group Details, Members, Sub Group Profile, Exception URL, Time Profile, Delete Sub Group, and Copy Sub Group. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Sub Group (IP Group) window The Sub Group (IP Group) window displays when Sub Group Details is selected from the menu. This window is used for viewing and adding or editing details on an IP group member. Fig. 3:1-28 Sub Group (IP Group) window, view only View IP Sub-Group Details If the sub-group was previously defined, the fields in the Sub Group Details frame cannot be edited.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Add IP Sub-Group Details If the sub-group was not previously defined, the fields in the IP Address frame and the Apply button remain activated. Fig. 3:1-29 Sub Group (IP Group) window, fields activated 1. In the IP Address frame, click the appropriate radio button corresponding to the type of Member IP address range to be entered: IP address with netmask, or IP address range.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN 3. Click Apply to save your entries. Once applied, the Member fields become greyed-out and the Apply button becomes deactivated (see Fig. 3:1-28). Members window The Members window displays when Members is selected from the menu. This window is used for modifying the subgroup’s Member IP address. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Modify Sub-Group Members The Modify Sub Group Member frame is comprised of the IP Address and MAC Address frames. 1. In the IP Address frame, specify whether to add or edit an IP address range with or without a netmask by selecting either “Member IP” or “Member IP Start / End”. • If “Member IP” was selected, enter the IP address and specify the netmask in the Member IP fields.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Exception URL window The Exception URL window displays when Exception URL is selected from the sub-group menu. This window is used for blocking sub-group members’ access to specified URLs and/or for letting sub-group members access specified URLs blocked at the minimum filtering level. NOTE: See the Exception URL window in the group tree section of this chapter for information on entries that can be made in this window.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Copy Sub Group The Copy Sub Group function is used for expediting the process of creating sub-groups, if the sub-group to be added has the same configuration settings as one that already exists. Copy an IP Sub-Group To copy configurations made for a specified sub-group: 1. Choose Copy Sub Group from the sub-group menu. 2. Select the group from the tree and choose Paste Sub Group from the group menu to paste the sub-group to the group.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Individual IP Individual IP includes options for creating and maintaining the filtering profile for the Individual IP member. Click the individual IP member’s link to view a menu of sub-topics: Members, Individual IP Profile, Exception URL, Time Profile, Delete Individual IP. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Member window The member window displays when Members is selected from the menu. This window is used for modifying the individual IP member’s IP address. Fig. 3:1-32 Member window Enter the IP Address of the Member In the Modify Individual Group Member frame: 1. Enter the IP address in the Member field. 2. Click Modify to apply your changes.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Individual IP Profile window The Individual IP Profile window displays when Individual IP Profile is selected from the individual IP member menu. This window is used for viewing/creating the member’s filtering profile. Click the following tabs in this window: Category, Redirect URL, and Filter Options. Entries in these tabs comprise the profile string for the member.
GROUP ADMINISTRATOR SECTION CHAPTER 1: GROUP SCREEN Delete Individual IP Delete an Individual IP Member To delete an individual IP member, choose Delete Individual IP from the individual IP member menu. This action removes the member from the tree.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Chapter 2: Library screen Group administrators use windows and dialog boxes in the Library screen to look up URLs in library categories. Library categories are used when creating or modifying filtering profiles. Fig. 3:2-1 Library screen A list of main topics displays in the navigation panel at the left of the screen.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Library Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel. This window is used for verifying whether or not a URL or search engine keyword or keyword phrase exists in a library category. Fig. 3:2-2 Library Lookup window NOTE: This window is also used by global administrators, except their permissions let them remove URLs and search engine keywords/phrases.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Look up a URL 1. In the URL Lookup frame, enter the URL. For example, enter http://www.playboy.com, playboy.com, or use a wildcard by entering *.playboy.com. A wildcard entry finds all URLs containing text that follows the period (.) after the asterisk (*). The following types of URL formats also can be entered in this field: • IP address - e.g. "209.247.228.221" in http:// 209.247.228.221 • octal format - e.g. http\://0106.0125.0226.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Look up a Search Engine Keyword To see if a search engine keyword or keyword phrase has been included in any library category: 1. In the Search Engine Keyword Lookup frame, enter the Search Engine Keyword or keyword phrase, up to 75 alphanumeric characters. 2. Click Lookup to display results in the Result Category list box, showing the long name of all categories that contain the search engine keyword/phrase.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Custom Categories Custom Categories includes the ALLOW and BLOCK library categories. Click either ALLOW or BLOCK to view a menu of sub-topics: Library Details, URLs, URL Keywords, and Search Engine Keywords. Fig. 3:2-3 Library screen, custom library category menu NOTE: Maintaining the list of custom category URLs and keywords is the responsibility of the global administrator.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Library Details window The Library Details window displays when Library Details is selected from the ALLOW or BLOCK library category’s menu of sub-topics. This window is used for editing the long name of the custom library category, and for viewing name criteria previously entered. Fig. 3:2-4 Library Details window View, Edit Library Details The following display and cannot be edited: Custom Categories Group Name and library category Short Name. 1.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN URLs window The URLs window displays when URLs is selected from the custom library category’s menu of sub-topics. This window is used for viewing, adding and/or removing a URL from a custom library category’s master URL list or master wildcard URL list. A URL can contain a domain name—such as “playboy” in http://www.playboy.com—or an IP address— such as “209.247.228.221” in http://209.247.228.221. A wildcard asterisk (*) symbol followed by a period (.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN View a List of URLs in the Library Category To view a list of all URLs that either have been added or deleted from the master URL list or master wildcard URL list: 1. Click the View tab. 2. Make a selection from the pull-down menu for “Master List”, or “Wild Card Master List”. 3. Click View List to display the specified items in the Select List list box: Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Add or Remove URLs or Wildcard URLs The Action tab is used for making entries in the URLs window for adding or removing a URL or wildcard URL, uploading a master URL list or master wildcard URL list, or reloading the library. Add a URL to the Library Category To add a URL to the library category: 1. In the Edit URL List frame, enter the URL in a format such as http://www.playboy.com, www.playboy.com, or playboy.com.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Add a Wildcard URL to the Library Category NOTE: Wildcards are to be used for blocking only. They are not designed to be used for the exceptions function or the always allowed white listing function. To add a URL containing a wildcard to the library category: 1. In the Edit WildCard URL List frame, enter the asterisk (*) wildcard symbol, a period (.), and the URL. TIP: The minimum number of levels that can be entered is three (e.g. *.hustler.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Remove a URL from the Library Category To remove a URL or wildcard URL from the library category: 1. Click the Action tab. 2. Enter the URL in the Edit URL List frame or Edit WildCard URL List frame, as pertinent. 3. Click Remove to display the associated URLs in the list box below. 4. Select the URL(s) that you wish to remove from the category. 5. Click Apply Action.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Upload a Master List to the Library Upload a Master List of URLs To upload a master file with URL additions: 1. Click Upload Master to open the Upload Custom Library URL pop-up window: Fig. 3:2-7 Upload Custom Library URL window 2. Click Browse to open the Choose file pop-up window. 3. Select the file to be uploaded. TIP: A URL text file must contain one URL per line. WARNING: The text file uploaded to the server will overwrite the current file.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN 4. Click Upload File to display the results of the library file content validation in the Library File Content/IP Lookup Options pop-up window: Fig. 3:2-8 Library File Content/IP Lookup Options URLs contained in the file are listed under the column for either Valid URL or Invalid URL. 5. If the file contains invalid URLs, click Back to return to the Upload URL window.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN selected, IP addresses that correspond to URLs in the uploaded file will be blocked along with the URLs. • “Upload the file without IP Lookup” - If this option is selected, an IP lookup for IP addresses that correspond to URLs in the uploaded file will not be performed. b. Click Upload to open the Upload Successful pop-up window. NOTE: In order for the URLs to take effect, library categories must be reloaded.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN 3. Select the file to be uploaded. TIP: A wildcard URL text file must contain one wildcard URL per line. WARNING: The text file uploaded to the server will overwrite the current file. NOTE: Before the file is uploaded to the server, it will first be validated. 4. Click Upload File to display the results of the library file content validation in the Library File Content/IP Lookup Options pop-up window: Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN If the file contains valid wildcard URLs, click Upload to open the Upload Successful pop-up window. NOTE: In order for the URLs to take effect, library categories must be reloaded. Reload the Library After all changes have been made to library windows, click Reload Library to refresh.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN URL Keywords window The URL Keywords window displays when URL Keywords is selected from the ALLOW or BLOCK library category’s menu of sub-topics. This window is used for adding or removing a URL keyword from a custom library category’s master list. A library category uses URL keywords to block a user’s access to Internet addresses containing keywords included in its list. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN WARNING: Use extreme caution when setting up URL keywords for filtering. If a keyword contains the same consecutive characters as a keyword set up to be blocked, users will be denied access to URLs that are not even within blocked categories. For example, if all URL keywords containing “sex” are blocked, users will not be able to access a non-pornographic site such as http:// www.essex.com.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Upload a List of URL Keywords to the Library To upload a text file containing URL keyword additions: 1. In the Upload Master URL Keyword File frame, click Upload Master to open the Upload Library Keyword pop-up window: Fig. 3:2-12 Upload Library Keyword pop-up window 2. Click Browse to open the Choose file window. 3. Select the file to be uploaded. 4. Click Upload File to upload this file to the server.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Search Engine Keywords window The Search Engine Keywords window displays when Search Engine Keywords is selected from the ALLOW or BLOCK library category’s menu of sub-topics. This window is used for adding and removing search engine keywords and phrases to and from a custom library category’s master list. A library category uses search engine keywords to block searches on subjects containing keywords included in its list. Fig.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN WARNING: Use extreme caution when setting up search engine keywords for filtering. If a non-offending keyword contains the same consecutive characters as a keyword set up to be blocked, users will be denied the ability to perform a search using keywords that are not even in blocked categories. For example, if all searches on “gin” are set up to be blocked, users will not be able to run a search on a subject such as “cotton gin”.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Remove a Search Engine Keyword To remove a search engine keyword or keyword phrase from a library category: 1. In the Edit Search Keyword List frame, enter up to 75 alphanumeric characters in the Keyword field. 2. Click Remove. Upload a Master List of Search Engine Keywords To upload a master list containing search engine keyword/ phrase additions: 1.
GROUP ADMINISTRATOR SECTION CHAPTER 2: LIBRARY SCREEN Delete Category Delete a Custom Category To delete a custom library category, choose Delete Category from the menu. This action removes the library category from the Custom Categories list.
TECHNICAL SUPPORT / PRODUCT WARRANTIES TECHNICAL SUPPORT TECHNICAL SUPPORT / PRODUCT WARRANTIES Technical Support For technical support, visit 8e6 Technologies’s Technical Support Web page at http://www.8e6.com/support.html, or contact us by phone, by email, or in writing. Hours Regular office hours are from Monday through Friday, 8 a.m. to 5 p.m. PST. After hours support is available for emergency issues only. Requests for assistance are routed to a senior-level technician through our forwarding service.
TECHNICAL SUPPORT / PRODUCT WARRANTIES TECHNICAL SUPPORT Office Locations and Phone Numbers 8e6 Corporate Headquarters (USA) 828 West Taft Avenue Orange, CA 92865-4232 USA Local Fax Domestic US International : : : : 714.282.6111 714.282.6116 1.888.786.7999 +1.714.282.6111 8e6 Taiwan 7 Fl., No. 1, Sec. 2, Ren-Ai Rd. Taipei 10055 Taiwan, R.O.C.
TECHNICAL SUPPORT / PRODUCT WARRANTIES TECHNICAL SUPPORT Support Procedures When you contact our technical support department: • You will be greeted by a technical professional who will request the details of the problem and attempt to resolve the issue directly. • If your issue needs to be escalated, you will be given a ticket number for reference, and a senior-level technician will contact you to resolve the issue.
TECHNICAL SUPPORT / PRODUCT WARRANTIES PRODUCT WARRANTIES Product Warranties Standard Warranty 8e6 Technologies warrants the medium on which the 8e6 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “Warranty Period”) from the date of delivery. This standard Warranty Period applies to both new and refurbished equipment for a period of one year from the delivery date.
TECHNICAL SUPPORT / PRODUCT WARRANTIES PRODUCT WARRANTIES Technical Support and Service 8e6 Technologies will provide initial installation support and technical support for up to 90 days following installation. 8e6 Technologies provides after-hour emergency support to 8e6 server customers. An after hours technician can be reached by voice line. Technical support information: Online: http://www.8e6.com/support.html Toll Free: 888-786-7999, press 3 Telephone: 1+714-282-6111, press 3 E-mail: support@8e6.
TECHNICAL SUPPORT / PRODUCT WARRANTIES PRODUCT WARRANTIES Extended Warranty (optional) The extended warranty applies to hardware and software of the product(s) except any misuse or modification of the product(s), or product(s) located outside of the United States. The extended warranty does not include new product upgrades. Hardware parts will be furnished as necessary to maintain the proper operational condition of the product(s).
APPENDICES SECTION APPENDIX A APPENDICES SECTION Appendix A Filtering Profile Format and Rules A filtering profile must be set up in a specified format, containing the following items: 1. The username or group name 2. IP address 3. Filtering profile criteria: • Rule number (Rule0, Rule1, etc.), or • rule criteria: a. Ports to Block or Filter b. Categories to Block or Open c. Filter Mode 4. Redirect URL (optional) 5. Filter Options (optional).
APPENDICES SECTION APPENDIX A Rule Criteria Rule criteria consists of selections made from the following lists of codes that are used in profile strings: • Port command codes: A = Filter all ports B = Filter the defined port number(s) I = Open all ports J = Open the defined port number(s) M = Set the defined port number(s) to trigger a warn message Q = Block all ports R = Block the defined port number(s) • Port Numbers: 21 = 80 = 119 = 443 = Other FTP (File Transfer Protocol) HTTP (Hyper Text Transfer Pro
APPENDICES SECTION APPENDIX A • Category command codes: Category command codes must be entered in the following order: J, R, M, I. “PASSED” should either be entered after J, R, or M, or after a string of category codes following J, R, or M. J = Positioned before the category/categories defined as "always allowed." R = Positioned before the category/categories defined as "blocked.
APPENDICES SECTION APPENDIX A • Filter Option codes: • 0x1 = Exception URL Query (always enabled) • 0x2 = X Strikes Blocking • 0x4 = Google/Yahoo!/Ask.com/AOL Safe Search Enforcement • 0x100 = Search Engine Keyword • 0x200 = URL Keyword • 0x1000= Extend URL Keyword Filter Control NOTE: To enable multiple filter codes, add the codes together.
APPENDICES SECTION APPENDIX B Appendix B Traveler Log Messages Your ProxyBlocker receives 8e6 supplied library category updates and software updates via Traveler, 8e6’s executable program for updating the ProxyBlocker server. You can run Traveler on demand via the Manual Update to 8e6 Supplied Categories window, or schedule Traveler to launch at a specified time via the Configuration window.
APPENDICES SECTION APPENDIX B General Activity Startup, Finish • Logging to: • Start running Traveler • Traveler has finished running. Command Executed More than Once • Traveler is running, cannot start another traveler. • Installscript is running, cannot start another traveler. • Traveler_Full_Download is running, cannot start another traveler. System Command Execution • Run system command: • Failed in executing : Temp Files • Create tmp file. • getpid().
APPENDICES SECTION APPENDIX B Library Download Process • needs to be updated. • does not need to be updated. • Preparing for download • Prepare for download -- Fail • Downloading files • Processing downloaded files • Processing downloaded files -- Fail • Decrypting file... • Decryption success. • A problem occurred while deleting: • HTTPS download complete: downloads <--For HTTPS • File does not exist on the update server. • Login error.
APPENDICES SECTION APPENDIX B Customer Feedback Module Option • To start CFM • To run CFM • Starting usage feedback/reporting upload • Running usage feedback/reporting upload Library Update Process • Wrong Argument! • Error occurred during the Traveler process! • Connection is lost.
APPENDICES SECTION APPENDIX B Error Messages • Running Traveler encounters an exception. • Alert emails could not be read. "" does not exist. • Reloading library encounters an exception • Send alert encountered an exception • Traveler exits after reaching time limit:
APPENDICES SECTION APPENDIX B Weekly Update (7 Days Library) • Download library update: • Download thread interrupted during retries. • Successfully downloaded • Failed to download • Failed to download library • Successfully downloaded library • Fail to unzip • Weekly Update has completed. Summary Messages • Failed to download. • File does not exist. • Failed to unzip. • Was not a primary language deletion file.
APPENDICES SECTION APPENDIX B Full URL Library Update (URLs, URL Keywords) • Download full library: • Failed to download library • Successfully download library! • Failed to unzip • Full URL Library Update has completed. All Library Updates (includes all other msgs.
APPENDICES SECTION APPENDIX B Search Engine Keywords Library Update • Download keyword library: • Fail to download keyword library due to connection fail! • Successfully downloaded • Fail to download • Search Engine Keyword Library Update has successfully completed. Patch Update • Download patch: • Downloading patch - Dated: • The patch has been downloaded already! • Successfully processed • Failed to download • Patch Update has completed.
APPENDICES SECTION APPENDIX C Appendix C Create a Custom Block Page 8e6 offers ways for you to customize the block page so that the page can have a different look while retaining the information/functionality provided in 8e6’s default block page. NOTE: The solutions provided in this appendix will only let you customize the Block page, not the Options page. Part I: Modify the ProxyBlocker 1. Enable block page redirection Select either of the following options to modify the ProxyBlocker.
APPENDICES SECTION APPENDIX C Option 2: Modify the ProxyBlocker console • PROS: Can be done from the ProxyBlocker console. • CONS: Must be set up for each sub-group. 1. Make modifications in one of the redirect URL tabs: • Go to: Group > IP > “Group Name” > “Sub-Group Name” > Sub Group Profile > Redirect URL • Go to: Group > Global Group > Global Group Profile > Default Redirect URL 2.
APPENDICES SECTION APPENDIX C Part II: Customize the Block Page 1. Set up a Web server A Web server must be set up to hold the customized block page. 2.
APPENDICES SECTION APPENDIX C Implement the “further option” (optional) The “further option” is included in 8e6’s default block page.
APPENDICES SECTION APPENDIX C Reference HTML Revision: 1 --> Date: 03/08/2004 -->