background image

G

LOBAL

 A

DMINISTRATOR

 S

ECTION

    

C

HAPTER

 1: S

YSTEM

 

SCREEN

186

8

E

6 T

ECHNOLOGIES

, P

ROXY

B

LOCKER

 U

SER

 G

UIDE

Quota Block Page Customization window

The Quota Block Page Customization window displays 
when Quota Block Page is selected from the Customization 
menu. This window is used for making customizations to the 
quota block page the end user will see if he/she has a quota 
time limit set for a passed category in his/her profile and has 
attained or exceeded that limit.

Fig. 2:1-92  Quota Block Page Customization window

TIP

: An entry in any of the fields in this window is optional.

NOTE

: For more information about quotas, see the Quota Setting 

window in this chapter.

Summary of Contents for ProxyBlocker

Page 1: ... ProxyBlocker USER GUIDE Model ProxyBlocker Release 2 1 00 Manual Version 1 01 ...

Page 2: ...ii 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE ...

Page 3: ...akes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular pur pose 8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing performance or use of this manual or the exam ples herein Due to future enhancements and modifications of this product the i...

Page 4: ...iv 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE ...

Page 5: ...Invisible Mode 11 Global Group 13 Static Filtering Profiles 16 Master IP Group Filtering Profile 16 IP Sub Group Filtering Profile 16 Individual IP Member Filtering Profile 16 Global Filtering Profile 17 Override Account Profile 17 Time Profile 17 Lock Profile 17 8e6 Supplied Categories 19 Custom Categories 19 Rules 20 Minimum Filtering Level 20 Filter Settings 21 Filtering Rules 22 Filtering Leve...

Page 6: ...th 46 Select Multiple Items 47 Copy and Paste Text 47 Calculate IP Ranges without Overlaps 48 Log Off 49 GLOBAL ADMINISTRATOR SECTION 50 Introduction 50 Chapter 1 System screen 51 Local Filtering 55 Disable Local Filtering Options 55 Enable Local Filtering Options 55 Enable HTTP Packet Splitting Detection 56 Disable HTTP Packet Splitting Detection 56 Service Control 58 Enable Pattern Blocking 58 D...

Page 7: ...dmin Audit Trail window 109 Admin Audit Trail 109 FTP the Log on Demand 110 View the Log of Administrator Changes 111 Modify Alert Settings 115 Disable the Alert Feature 115 Enter Edit SMTP Server Settings 116 Verify SMTP Settings 117 Undo an Applied Software Update 123 View Log Contents 124 Download the Log 125 Save Print the Log File Contents 129 Specify the Listening Device 131 Specify the Bloc...

Page 8: ...lock Workstations 160 Deactivate an Authorized Logon Account 161 Delete a Logon Account 161 Categories 162 Set up Categories to Receive Strikes or No Strikes 162 Go to X Strikes Unlock Workstation GUI 163 Re login window 163 Unlock a Workstation 164 Remove an Email Address from the Alert List 165 Close the Pop up Window 165 Warn Option Setting window 166 Specify the Interval for Re displaying the ...

Page 9: ...e Edit a List of Service Ports 241 Minimum Filtering Bypass Options 242 Refresh All Main Branches 244 Add a Master IP Group 246 Refresh 247 Refresh IP Groups 247 Chapter 3 Library screen 248 Set a Time for Updates to be Retrieved 251 Select the Log Level 252 Select Additional Languages 255 View the Library Update Process 257 Download the Log 258 View the Contents of the Log 259 Save Print the Log ...

Page 10: ... Search Engine Keyword Additions 288 Reload the Library 289 Chapter 4 Reporting screen 290 Report Configuration window 291 Specify the Reporting Device 291 8e6 Enterprise Reporter 292 Edit ER Server Information 292 Execute Log Transfer Now 293 View Transfer Activity to the ER 293 Other Device 294 Enter or Edit Server Information 294 View Transfer Activity to the Reporting Device 296 Real Time Prob...

Page 11: ...ide Account 327 Category Profile 328 Create Edit a List of Selected Categories 329 Redirect URL 331 Create Edit the Redirect URL 331 Filter Options 332 Create Edit the Filter Options 332 ByPass URL frame 336 Apply Settings 336 Add a Time Profile 337 Delete a Time Profile 348 Add an IP Sub Group 352 Add Individual IP 353 Add an Individual IP Member 353 Delete Group 354 Delete a Master IP Group Prof...

Page 12: ...a URL Keyword to the Library Category 384 Remove a URL Keyword from the Library 384 Reload the Library 385 View a List of Search Engine Keywords 387 Add or Remove Search Engine Keywords 387 Add a Search Engine Keyword to the Library 387 Upload a Master List of Search Engine Keywords 388 Reload the Library 388 Delete a Custom Category 389 TECHNICAL SUPPORT PRODUCT WARRANTIES 390 Technical Support 3...

Page 13: ...mergency Update 407 Appendix C 408 Create a Custom Block Page 408 Part I Modify the ProxyBlocker 408 1 Enable block page redirection 408 Option 1 Modify the back end 408 2 Exclude filtering server for block page IP 409 Part II Customize the Block Page 410 1 Set up a Web server 410 2 Create a customized block page 410 Show 8e6 s information in the block page optional 410 Customized block page examp...

Page 14: ... Information Bar 432 Access your Override Account 432 Appendix E 434 Configure ProxyBlocker for ER Reporting 434 Entries in the ProxyBlocker Admin console 434 Appendix F 437 RAID Maintenance 437 Part 1 Hardware Components 437 Part 2 Server Interface 438 LED indicators in SL units 438 Hard drive failure 442 Step 1 Review the notification email 442 Step 5 Contact Technical Support 445 Power supply f...

Page 15: ...etwork administrator designated to configure and manage the 8e6 ProxyBlocker server on the network This adminis trator is referred to as the global administrator throughout this user guide In part this user guide also addresses administrators who manage user groups on the network These administrators are referred to as group administra tors throughout this user guide Additional information is prov...

Page 16: ...t Product Warranties Section This section contains information on technical support and product warranties Appendices Appendix A includes formats and rules used in the filtering profile file Appendix B provides a list of messages that display when 8e6 s executable program Traveler is launched and attempts to down load updates to the ProxyBlocker server Appendix C includes information on creating a...

Page 17: ... note icon is followed by italicized text providing additional information about the current subject TIP The tip icon is followed by italicized text giving you hints on how to execute a task more efficiently WARNING The warning icon is followed by italicized text cautioning you about making entries in the application executing certain processes or procedures or the outcome of specified actions ...

Page 18: ...checkbox a small square in a dialog box window or screen used for indi cating whether or not you wish to select an option This object allows you to toggle between two choices By clicking in this box a check mark or an X is placed indi cating that you selected the option When this box is not checked the option is not selected dialog box a box that opens in response to a command made in a window or ...

Page 19: ...urpose grid an area in a frame that displays rows and columns of data as a result of various processes This data can be reorganized in the Administrator console by changing the order of the columns list box an area in a dialog box window or screen that accommo dates and or displays entries of items that can be added or removed navigation panel the panel that displays at the left of a screen This p...

Page 20: ...en that contains a down arrow to the right When you click the arrow a menu of items displays from which you make a selection radio button a small circular object in a dialog box window or screen used for selecting an option This object allows you to toggle between two choices By clicking a radio button a dot is placed in the circle indicating that you selected the option When the circle is empty t...

Page 21: ... a sub topic is selected the window for that sub topic displays in the right panel of the screen or a pop up window or an alert box opens as appro priate text box an area in a dialog box window or screen that accommodates your data entry A text box is a type of field See field topic a topic displays as a link in the left panel the navigation panel of a screen By clicking the link for a topic the w...

Page 22: ...sed By double clicking the item a minus sign replaces the plus sign and any entity within that branch of the tree displays An item in the tree is selected by clicking it window a window displays on a screen and can contain frames fields text boxes list boxes buttons checkboxes and radio buttons A window for a topic or sub topic displays in the right panel of the screen Other types of windows inclu...

Page 23: ...ces authenticate users via the existing authentication system on the network NOTE See the 8e6 ProxyBlocker Authentication User Guide at http www 8e6 com docs pba_auth_ug pdf for information on setting up and using authentication To help you become familiar with the ProxyBlocker and how it functions on the network Chapter 1 of this section of the User Guide provides an overview on filtering Chapter...

Page 24: ...7 Macintosh OS X Version 10 5 running Safari 2 0 Firefox 2 0 JavaScript enabled Java Virtual Machine Java Plug in use the version specified for the Proxy Blocker software version NOTE 8e6 ProxyBlocker administrators must be set up with soft ware installation privileges in order to install Java used for accessing the interface Network Requirements High speed connection from the ProxyBlocker server ...

Page 25: ...ient PCs and the Internet without stopping each IP packet on the same Ethernet segment The unit will only intercept a session if an inappropriate request was submitted by a client In this scenario the ProxyBlocker returns a message to the client and server to deny the request and a block page displays to deny the client access to the site or service Figure 1 1 1 depicts the invisible mode that rem...

Page 26: ...n The ProxyBlocker captures the request as the user s request 2 leaves the network The ProxyBlocker then determines the action 3 to either block or pass the request If the Proxy Blocker determines to block the user s request a block message 4 is sent to the user plus a terminate message 4 is sent to the Internet server In the invisible mode the ProxyBlocker performs as a stan dalone server that ca...

Page 27: ...tion panel The global administrator can access the Global Group and IP groups in the tree The group administrator can only access the designated IP group to be maintained NOTE If authentication is enabled the global administrator can also access the NT and LDAP branches of the tree Global Group The first group that must be set up is the global group represented in the tree structure by the global ...

Page 28: ...mbers The global administrator adds master IP groups adds and maintains override accounts at the global level and estab lishes and maintains the minimum filtering level The group administrator of a master IP group adds sub group and individual IP members override account time profiles and exception URLs and maintains filtering profiles of all members in the master IP group Fig 1 1 2 IP diagram wit...

Page 29: ... filtering profile posi tioned at the base of the hierarchical tree structure used by end users who do not belong to a group IP group master group master group filtering profile used by end users who belong to the master group master time profile used by master group users at a specified time IP group member sub group filtering profile used by a sub group member individual filtering profile used b...

Page 30: ...tained by the group administrator This filtering profile is used by members of the group including sub group and individual IP group members and is customized to allow deny users access to URLs or warn users about accessing specified URLs to redirect users to another URL instead of having a block page display and to specify usage of appropriate filter options IP Sub Group Filtering Profile An IP s...

Page 31: ... ports that are configured to be blocked A URL can be specified for use instead of the standard block page when users attempt to access material set up to be blocked Various filter options can be enabled Override Account Profile If any user needs access to a specified URL that is set up to be blocked the global administrator or group administrator can create an override account for that user This ...

Page 32: ...h library categories should be blocked left open a set number of minutes in which that category remains open can be defined assigned a warn setting or white listed filter options specify which features will be enabled X Strikes Blocking Google Yahoo Ask com AOL Safe Search Enforcement Search Engine Keyword Filter Control URL Keyword Filter Control minimum filtering level takes precedence over filt...

Page 33: ...r the heading Category Groups excluding the Custom Categories group Updates to these categories are provided by 8e6 on an ongoing basis and administra tors also can add or delete individual URLs within a speci fied library category Custom Categories Custom library categories can be added by either global or group administrators As with 8e6 supplied categories addi tions and deletions can be made w...

Page 34: ...ocol NNTP Secured HTTP Transmission HTTPS and Secure Shell SSH Rules A rule is comprised of library categories to block leave open assign a warn setting or include in a white list Access to an open library category can be restricted to a set number of minutes Each rule that is created by the global administrator is assigned a number A rule is selected when creating a filtering profile for an entit...

Page 35: ...ervice port is given a block setting users will be denied access to the URL set up as blocked open if a category or the filter segment detected on the network is given an open pass setting users will be allowed access to the URL set up as opened NOTE Using the quota feature access to an open category can be restricted to a defined number of minutes always allowed if a category is given an always a...

Page 36: ...ocked in the minimum filtering level are blocked in the user s profile 3 For master IP group members a A master IP group filtering profile takes precedence over the global profile b A master IP group time profile takes precedence over the master IP group profile 4 For IP sub group members a An IP sub group filtering profile takes precedence over the master IP group s time profile b An IP sub group...

Page 37: ...group tree and the global adminis trator allows override accounts to bypass the minimum filtering level or if the override account was set up in the global group tree NOTE An override account set up in the master group section of the console takes precedence over an override account set up in the global group section of the console 8 A lock profile takes precedence over all filtering profiles This...

Page 38: ...INTRODUCTORY SECTION CHAPTER 1 FILTERING OPERATIONS 24 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE Fig 1 1 3 Sample filtering hierarchy diagram ...

Page 39: ... be viewed on a PC monitor or output to a printer 8e6 recommends using the Enterprise Reporter ER for generating reports When the ER server is connected to the ProxyBlocker server log files from the ProxyBlocker are transferred to the ER server where they are normalized and then inserted into a MySQL database The ER client reporting application accesses that database to generate queries and report...

Page 40: ...t up to block the use of IM services specified in the library category When the IM module is loaded on the server the Proxy Blocker compares packets on the network with IM libraries stored on the ProxyBlocker server If a match is found the ProxyBlocker checks the user s profile to see whether the user s connection to the IM service should be blocked and then performs the appropriate action WARNING...

Page 41: ...ProxyBlocker checks the user s profile to see whether the user s connection to the P2P service should be blocked and then performs the appropriate action Setting up IM and P2P IM and P2P are set up in the System and Library sections of the Administrator console 1 In the System section activate Pattern Blocking in the Filter window 2 In the Library section note the services set up to be blocked as ...

Page 42: ...hat category will be blocked NOTE If IM and or P2P was set up to be blocked while a user s IM and or P2P session was in progress the user will not be blocked from using that service until he she logs off the server and back on again Block IM P2P for All Users Block IM for All Users To block IM for all users on the network the Pattern Blocking option in the Filter window must be activated the globa...

Page 43: ...et up to be blocked Block Specified Entities from Using IM P2P Block IM for a Specific Entity To block IM for a specified group or user the Pattern Blocking option in the Filter window must be activated the CHAT and specified individual Instant Messaging library categories must both be set up to be blocked for that entity the global filtering profile should not have IM blocked unless blocking all ...

Page 44: ...g option in the Filter window must be activated the PR2PR library category must be set up to be blocked for that entity the global filtering profile should not have P2P blocked unless blocking all P2P traffic with the Range to Detect feature is desired the minimum filtering level profile should not have P2P blocked unless blocking all P2P traffic with the Range to Detect feature is desired ...

Page 45: ... IP address on your network NOTE If you do not have the ProxyBlocker Quick Start Guide contact 8e6 Technologies immediately to have a copy sent to you Using the Administrator Console Log On 1 Launch a browser window supported by the Proxy Blocker 2 In the address line of the browser window type in the ProxyBlocker server s IP address appended by the following port number 88 for an HTTP address 144...

Page 46: ...on This window displays minimized when the Login dialog box opens 4 When the Login dialog box opens enter your Username and Password Fig 1 3 2 Login dialog box TIP The default Username is admin and the Password is user3 To change this username and password go to the Administrator window see the Administrator window of the System screen in the Global Administrator Section and create a global admini...

Page 47: ...OK to close the login dialog box and to access the welcome screen of the Administrator console Fig 1 3 3 Welcome screen On this screen the ProxyBlocker Version Number displays in the Product frame and dates for the Last Patch Update and Last Library Update display in the ProxyBlocker Status frame The following information displays at the bottom of the Administrator console Host Name LAN IP address...

Page 48: ...the dialog box and opens an alert box indicating that it will take a few minutes to perform the library update Click OK to close the alert box and to execute the command to update the libraries After the libraries are updated today s date will appear as the Last Library Update on the welcome screen NOTE Refer to the Library screen s Manual Update to 8e6 Supplied Categories window in the Global Gro...

Page 49: ...Welcome screen Last Library Update text Click the checkbox Do not show Old Library Warning dialog box in future to disable the Last Library Update message pop up box After the libraries are updated the welcome screen will appear as in Fig 1 3 3 with today s date as the Last Library Update in black text ...

Page 50: ... or block specified Internet content for each user based on the applied filtering profile Group clicking this button displays the main screen for the Group section Windows in the Group section are used for creating and managing master IP groups sub groups and individual IP filtering profiles or for setting up NT LDAP domains groups and individual users and their filtering profiles Library clicking...

Page 51: ...APTER 3 GETTING STARTED 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 37 Help clicking this button displays the Help screen This screen includes navigational tips and a link to the PDF copy of this User Guide Fig 1 3 5 Help screen ...

Page 52: ... and tooltips Access Help Topics Each of the main section screens contains a link beneath the banner When that link is clicked a separate browser window opens with Help Topics for that section Fig 1 3 6 Help Topics window 1 Click a link to go to a specified topic 2 To view Help Topics for another section click the tab for that section System Group Library Reporting or Help 3 Click Close Window to ...

Page 53: ... icon additional information about that window can be obtained by hovering over that icon with your mouse or by pressing the F1 key on your keyboard Hover Display The yellow tooltip box displays when you hover over the icon with your mouse Fig 1 3 7 Tooltip mouseover effect To close the tooltip box move the mouse away from the icon ...

Page 54: ...l screens are divided into two panels a navigation panel to the left and a window in the panel to the right Windows display in response to a selection made in the navigation panel In the Administrator console screens and windows use different navigation formats based on the contents of a given screen or window Screens can contain topic links and sub topic menus and or tree lists with topics and su...

Page 55: ...OGIES PROXYBLOCKER USER GUIDE 41 Topic Links In System Library and Reporting screens the navigation panel contains topic links By clicking a topic link the window for that topic displays in the right panel Fig 1 3 9 Selected topic and its corresponding window ...

Page 56: ...ct Sub topics Some topics in System and Library screens consist of more than one window For these topics clicking a topic link opens a menu of sub topics Fig 1 3 10 Sub topics menu When a sub topic from this menu is selected the window for that sub topic displays in the right panel of the screen ...

Page 57: ... Library screens Fig 1 3 11 Tree menu A tree is comprised of a hierarchical list of items An entity associated with a branch of the tree is preceded by a plus sign when that branch of the tree is collapsed By double clicking the entity a minus sign replaces the plus sign and all branches within that branch of the tree display An item in the tree is selected by clicking it ...

Page 58: ...nd sub topics Topics in the tree list display by default when the tree is opened Examples of tree list topics are circled in Fig 1 4 12 When a tree list topic is selected and clicked a menu of sub topics opens Fig 1 3 12 Tree list topics and sub topics Clicking a sub topic displays the corresponding window in the right panel or opens a pop up window or alert box as appropriate ...

Page 59: ...le there are windows with tabs When selecting a window with tabs from the navigation panel the main tab for that window displays Entries made in a tab must be saved on that tab if the tab includes the Apply button NOTE In the Time Profile and Override Account pop up windows entries are saved at the bottom of the window Fig 1 3 13 Window with tabs ...

Page 60: ... shortcuts is provided to help you use windows in the Administrator console with greater efficiency Navigation Path The navigation path displays at the top of each window Fig 1 3 14 Navigation path This path reminds you of your location in the console The entire path shows the screen name followed by the topic name and sub topic name if applicable ...

Page 61: ... while pressing the Ctrl key on your keyboard Shift Key To select a block of items from a list box click the first item and then press the Shift key on your keyboard while clicking the last item Once the group of items is selected click the appropriate button to perform the action on the items Copy and Paste Text To save time when making duplicate data entries text previ ously keyed into the GUI c...

Page 62: ...hese windows include Block Page Route Table window from the System section and Range to Detect and Members windows from the Group section Fig 1 3 15 IP Calculator pop up window This window is used to view and or calculate the minimum and maximum range for an IP address 1 Click Calculator to open the IP Calculator pop up window If the IP address field in the window on the console is already populat...

Page 63: ...lculate to display different Min Host and Max Host results 2 After making a note of the information in this pop up window click Close to close the IP Calculator Log Off To log off the Administrator console 1 Click the Quit button in the navigational panel at the top of the screen This action opens the Quit dialog box Fig 1 3 16 Quit dialog box 2 Click Yes to close the Administrator console 3 Click...

Page 64: ...rting application if pertinent To attain this objective the global administrator performs the following tasks provides a suitable environment for the server including Hypertext Transfer Protocol over Secure Socket Layer HTTPS link to the current logging device power connection protected by an Uninterruptible Power Supply UPS high speed access to the server by authorized client workstations adds gr...

Page 65: ... 2 1 1 System screen A list of main topics displays in the navigation panel at the left of the screen Main topics in this section include the following Control settings Network settings Administrator account information Secure Logon Diagnostics Alert contacts Patch operation Mode Authentication settings see the 8e6 ProxyBlocker Authentication User Guide for information about this topic NIC Mode Ba...

Page 66: ...6 TECHNOLOGIES PROXYBLOCKER USER GUIDE Click your selection to choose a main topic from this list or to view a menu of sub topics if applicable When a topic or sub topic is selected the designated window for that topic or sub topic displays in the right panel ...

Page 67: ...NOLOGIES PROXYBLOCKER USER GUIDE 53 Control Control includes options for controlling basic ProxyBlocker server functions Click the Control link to view a menu of sub topics Filter Block Page Authentication ShutDown and Reboot Fig 2 1 2 System screen Control menu ...

Page 68: ...red will filter traffic on the network If enabling the HTTP Filtering feature that automatically detects a split packet HTTP headers less than or equal to the number of bytes specified will be inspected HTTPS Filtering lets you set the level of filtering for HTTPS sites on ProxyBlockers set up in the Stand Alone or Source mode In the Service Control frame enabling Pattern Blocking will log IM and ...

Page 69: ...ring On and VLAN Detection Off Disable Local Filtering Options If you have multiple ProxyBlocker servers on the network you may wish to disable local filtering on the source server and use the server primarily for authenticating users who log on the network This frees up resources on the server To disable Local Filtering and or VLAN Detection click the Off radio button s Enable Local Filtering Opt...

Page 70: ... 1 Click On to enable HTTP Packet Splitting Detection this action displays a field below the radio buttons 2 In the Inspect HTTP headers that are less than or equal to ___ Bytes field by default 48 displays for the number of bytes This entry can be modified to specify a different number of bytes for HTTP header inspection Disable HTTP Packet Splitting Detection To disable automatic detection of a ...

Page 71: ...ificate High if you want the ProxyBlocker to communicate with HTTPS servers to obtain the certificate with a very strict validation of the return URL If High is selected by default the option is enabled for a library lookup to overrule the DNS validation of the host name in the certificate WARNING If using the High setting end users may be blocked from accessing acceptable Web sites if the host na...

Page 72: ...pplied PROXY library category Web based Proxies Anonymizers must be applied to the group or user s filtering profile Or to block all users from accessing these proxy patterns the global filtering profile and minimum filtering level must have the PROXY library category set up to be blocked To block specified users from accessing IM services specified Instant Messaging 8e6 supplied library categorie...

Page 73: ...ADMINISTRATOR SECTION CHAPTER 1 SYSTEM SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 59 Disable Pattern Blocking Click Off to disable Pattern Blocking NOTE After making all entries in this window click Apply ...

Page 74: ...ill use when validating a user s account Information entered selected in this window is used by the block page that displays when an end user attempts to access a site or service that is set up to be blocked Fig 2 1 4 Block Page Authentication window NOTE See the Block Page Customization window and Common Customization window in this chapter for information on custom izing the 8e6 block page See A...

Page 75: ...hentication select this option for the re authentication option The user can restore his her profile and NET USE connection by clicking an icon in a window to run a NET USE script Override Account select this option if any user has an Override Account allowing him her to access URLs set up to be blocked at the global or IP group level NOTE Details about the Web based Authentication option can be f...

Page 76: ...ld enter the path of the logon script that the ProxyBlocker will use when re authenticating users on the network in the event that a user s machine loses its connection with the server or if the server is rebooted This format requires the entry of two back slashes the authentication server s computer name or computer IP address in capital letters a backslash and name of the share path 3 Click Appl...

Page 77: ... default the following data displays in the User Machine frame of the block page User Machine field The username displays for the NT LDAP user This field is blank for the IP group user IP field The user s IP address displays Category field The name of the library category that blocked the user s access to the URL displays If the content the user attempted to access is blocked by an Exception URL E...

Page 78: ...age under the following conditions For further options click here This phrase and link is included if any option was selected at the Re authentica tion Options field Clicking this link takes the user to the Options window described in the Options page sub section that follows To submit this blocked site for review click here This phrase and link is included if an email address was entered in the S...

Page 79: ...in the block page For further options click here Fig 2 1 6 Options page The following items previously described for the Block page display in the upper half of the Options page HELP link User Machine frame contents The frame beneath the User Machine frame includes infor mation for options 1 2 and or 3 based on settings made in this window and the Common Customization window ...

Page 80: ... Re authentication Options Re authentication or Web based Authentication was selected If the user believes he she was incorrectly blocked from a specified site or service he she should re start his her machine and log back in Try re authenticating your user profile This link displays if Re authentication was selected at the Re authentication Options field and an entry was made in the Logon Script ...

Page 81: ...tent blocked at the global or IP group level The user should enter his her Username and Password and then click Override to open the Profile Control pop up window Fig 2 1 8 Profile Control pop up window This pop up window must be left open throughout the user s session in order for the user to be able to access blocked Internet content NOTES See Profile Control window for information on custom izi...

Page 82: ...indow The ShutDown window displays when ShutDown is selected from the Control menu This window is used for powering off the server Fig 2 1 9 ShutDown window Shut Down the Server In the ShutDown frame click ShutDown to power off the server To restart the server the ProxyBlocker console needs to be re accessed ...

Page 83: ...R 1 SYSTEM SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 69 Reboot window The Reboot window displays when Reboot is selected from the Control menu This window is used for reconnecting the server on the network Fig 2 1 10 Reboot window ...

Page 84: ...oot ProxyBlocker dialog box 2 Click Yes to close the dialog box and to launch the Server Status message box informing you that the server is now disconnected Fig 2 1 12 Server Status disconnect message When the Server Status box closes the ProxyBlocker status message box opens and informs you that the server is rebooting itself and how much time has elapsed since this process began Fig 2 1 13 Prox...

Page 85: ...Blocker ready alert box opens Fig 2 1 14 ProxyBlocker ready alert box The Server connected alert box also opens informing you that the server is connected and that you must restart the server Fig 2 1 15 Server connected alert box 3 Click OK to close the ProxyBlocker ready alert box 4 Click OK to close the Server connected alert box 5 You must now re access the ProxyBlocker console ...

Page 86: ...S PROXYBLOCKER USER GUIDE Network Network includes options for configuring the ProxyBlocker server on the network Click the Network link to view a menu of sub topics LAN Settings NTP Servers Regional Setting and Block Page Route Table Fig 2 1 16 System screen Network menu ...

Page 87: ...ECHNOLOGIES PROXYBLOCKER USER GUIDE 73 LAN Settings window The LAN Settings window displays when LAN Settings is selected from the Network menu This window is used for configuring network connection settings for the Proxy Blocker Fig 2 1 17 LAN Settings window ...

Page 88: ...e used on the network TIP Be sure to place the LAN1 and LAN2 IP addresses in different subnets In the Primary IP field of the DNS frame the default IP address is 4 2 2 1 Enter the IP address of the first DNS server to be used for resolving the IP address of the authentication server with the machine name of that server In the Secondary IP field of the DNS frame the default IP address is 4 2 2 2 En...

Page 89: ...r specifying IP addresses of servers running Network Time Protocol NTP software NTP is a time synchronization system for computer clocks throughout the Internet The ProxyBlocker will use the actual time from a clock at a spec ified IP address NOTE The System Time displays beneath the Details frame using the YYYY MM DD HH MM SS Coordinated Universal Time UTC format for the current time zone Fig 2 1...

Page 90: ...annot access the primary time NTP server specified IP addresses are used in the order in which they display in the list box Add an NTP Server To add an NTP server 1 Enter the IP address in the NTP Server field 2 Click Add to include this IP address in the Servers list box 3 Click Apply to apply your settings Remove an NTP Server To remove an NTP server 1 Select the IP address from the Servers list...

Page 91: ...USER GUIDE 77 Regional Setting window The Regional Setting window displays when Regional Setting is selected from the Network menu This window is used for specifying the time zone to be used by the Proxy Blocker and the language set type if necessary Fig 2 1 19 Regional Setting window ...

Page 92: ...tion pull down menu select the time zone for the specified region If necessary select a language set from the Language pull down menu to specify that you wish to display that text in the console 3 Click Apply to apply your settings and to reboot the ProxyBlocker WARNING If using the ProxyBlocker with an 8e6 Technologies Enterprise Reporter unit be sure each ProxyBlocker used by the ER is set up in...

Page 93: ...sed for building and maintaining a list of destina tion based routers the server will use for communicating with other segments of the network You need to set up a route table only if your local network is interconnected with another network and if users client machines are not being served block pages when appropriate Fig 2 1 20 Block Page Route Table window NOTE See the Block Page Authentication...

Page 94: ...the portal to which packets will be transferred to and from the Internet TIP Click Calculator to open the IP Calculator pop up window Use this calculator to calculate IP ranges without any overlaps 4 Click Add to include your entries in the IP Mask list box NOTE Follow steps 1 4 for each router you wish to include in the routing table Remove a Router To remove one or more routers from the IP Mask ...

Page 95: ...rator Admin and group administrator Sub Admin accounts A Sub Admin manages NT or LDAP entities and their filtering profiles NOTE See the Group Details window in Chapter 1 Group screen of the Group Administrator Section for information on setting up and maintaining accounts for IP group administrators See the 8e6 ProxyBlocker Authentication User Guide for more information on setting up and maintain...

Page 96: ...The Current User list box includes the Account Name and corresponding account Type Admin or Sub Admin for each active global administrator or NT LDAP group admin istrator previously set up in this window Add an Administrator Account To add a global or NT LDAP group administrator account 1 In the Account Details frame enter the username in the Username field 2 In the Password field enter eight to 2...

Page 97: ... one numeric character and one special character The password is case sensitive 3 Enter the same new password again in the Confirm Password field If the administrator s account type needs to be changed select the appropriate account type from the Type pull down menu Admin for global administrator or Sub Admin for NT LDAP group administrator 4 Click Modify to apply your settings NOTE A username can...

Page 98: ...g user passwords to expire after a designated number of days and or locking out users from the ProxyBlocker after unsuccessfully attempting to log in for the specified number of attempts within the defined timespan Click the Secure Logon link to view a menu of sub topics Logon Settings and Logon Management Fig 2 1 22 System screen Secure Logon window ...

Page 99: ...ssword expiration feature that lets you define the number of days a password will be valid before a new password must be used This window also lets you enable the feature for locking out a user from the inter face by username and or IP address if an incorrect pass word is entered for a specified number of times within a defined timespan NOTE This window displays only on servers set up in the Stan ...

Page 100: ...e following select from available choices 1 30 90 365 Never Expired make an entry for the number of days until passwords expire NOTE If a user s password has expired when he she enters his her username and password in the Login dialog box and clicks OK a different login dialog box opens Fig 2 1 24 New password entry This dialog box displays his her Username and prompts him her to enter a new passw...

Page 101: ...g the incorrect password At the Lockout by IP address field click the radio button corresponding to either of the following options On Choose this option to lock out the user by IP address if the incorrect password is entered for the number of times specified in the Allowable Number of Failed Password Attempts 1 10 field within the interval defined in the Failed Password Attempts Timespan in minut...

Page 102: ...ne or more enters an incorrect password for that same username within the 10 minute timespan a lockout would be made for that username on the third unsuccessful attempt However if the third failed login attempt is made outside of the 10 minute timespan there would be no lock out for that username In a similar scenario for an IP address using the same timespan and designated number of failed login ...

Page 103: ...er interface and for unlocking usernames and IPs currently locked out of the ProxyBlocker If the user account is a global Admin or NT LDAP group administrator Sub Admin account the areas of interface accessible to that administrator can be viewed Fig 2 1 25 Logon Management window NOTE An account IP address becomes locked if the Lockout by Username IP address feature is enabled in the Logon Settin...

Page 104: ...NT LDAP group administrator account set up in the Administrator window Group IP group administrator account set up in the IP branch of the Group tree Probe Real Time Probe account set up in the Real Time Probes Logon Accounts window XStrike X Strikes Blocking account set up in the X Strikes Blocking Logon Accounts window Expired Date either Never Expired or a date using the YYYY MM DD format based...

Page 105: ...lert box and to remove the locked symbol from the Locked column for the row corre sponding to the username View Locked IP Address Unlock IP Address View Locked IPs The Current Locked IP Addresses frame displays any IP address currently locked Unlock an IP Address To unlock the IP address of a machine 1 In the Current Locked IP Addresses frame click the IP address to highlight it 2 Click Unlock to ...

Page 106: ...r Sub Admin username from the list 2 Click View Access to open the Assign Access View pop up window Fig 2 1 26 Assign Access View 3 The View Preview assign access frame displays the username in the greyed out Assign to user field Click any of the available tabs System Group Library Report Help to view menu topics sub topics and branches of trees available to that administrator 4 Click the X in the...

Page 107: ...3 Diagnostics Diagnostics includes options for setting up or running processes for maintaining the server Click the Diagnostics link to view a menu of sub topics System Command View Log File Troubleshooting Mode Active Profile Lookup and Admin Audit Trail Fig 2 1 27 System screen Diagnostics menu ...

Page 108: ...w The System Command window displays when System Command is selected from the Diagnostics menu This window is used for viewing server statistics and for performing diagnostic tests on the server Fig 2 1 28 System Command window WARNING Diagnostics tools utilize system resources impacting the ProxyBlocker s performance ...

Page 109: ...tstat active connections netstat routing table free current memory usage iostat CPU usage sar system performance recent logins uptime system uptime df disk usage and dmesg print kernel ring buffer NOTE See Command Selections for a list of commands and their functions If Ping or Trace Route was selected from the pull down menu a blank field displays to the right and must be populated 2 Click Execut...

Page 110: ...le to help you diagnose the problem with your network configuration This diagnostic tool records each hop the data packet made identifying the IP addresses of gateway computers where the packet stopped en route to its final destination and the length of time of each hop Enter the IP address or host name of the specific Internet address to be validated and then click Execute to display results in t...

Page 111: ...on NIC Configuration is used for verifying the server s network interface configuration at bootup When Execute is clicked information about the NIC mode and RX packets and TX packets displays in the pop up window Active connections When Active Connections is selected and Execute is clicked information about opened connections displays in the pop up window The first half of the results includes pac...

Page 112: ...tool shows information on resources being used When Execute is clicked the pop up window shows averages on various statistics These results can be stored in a compact binary format and then viewed at later date so that if you discover a system or application problem occurred you can analyze system activity during that time period With this data you can specify start and end times for reporting on ...

Page 113: ... for viewing disk usage information by file system When Execute is clicked rows of disk information display in the Result pop up window including the following information for each disk Filesystem name 1K blocks on the disk number of Used blocks number of Available blocks Use locations where the disk is Mounted on dmesg print kernel ring buffer The Print Kernel Ring Buffer diagnostic tool is used ...

Page 114: ...OXYBLOCKER USER GUIDE View Log File window The View Log File window displays when View Log File is selected from the Diagnostics menu This window is used for viewing the most recent log file results of various activi ties and for troubleshooting Fig 2 1 30 View Log File window ...

Page 115: ...only if an Alternate IP Address is being used in the Block Page Route frame of the Operation Mode window This log only displays information if the IP address used for sending block pages is not being reconciled with the MAC address of the NIC card Admin GUI Server Log AdminGUIServer log used for viewing information on entries made by the admin istrator in the ProxyBlocker console NOTE For informat...

Page 116: ...AL ADMINISTRATOR SECTION CHAPTER 1 SYSTEM SCREEN 102 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE Fig 2 1 31 View Log File Results window 4 Click the X in the upper right corner of the pop up window to close it ...

Page 117: ...ormal Fig 2 1 32 Troubleshooting Mode window WARNING This tool utilizes system resources impacting the ProxyBlocker s performance When you click Enable the Proxy Blocker will stop filtering the network After you finish making the necessary changes to the server be sure to click Disable to terminate your Troubleshooting Mode session Once Disable is clicked the ProxyBlocker will resume filtering the...

Page 118: ...cuous Mode field the default choice on or off displays based on the operation mode that was selected The promiscuous mode is a mode of operation in which each data packet that is sent will be received and read by the Network Interface Card NIC 5 If necessary click the appropriate radio button to indicate whether to turn the promiscuous mode on or off If on is selected the ProxyBlocker will watch a...

Page 119: ...ofile Lookup window The Active Profile Lookup window displays when Active Profile Lookup is selected from the Diagnostics menu This window is used for verifying whether an entity has an active filtering profile Fig 2 1 33 Active Profile Lookup window NOTE In order to use this diagnostic tool IP groups and or members must be set up in the Group section of the Proxy Blocker and each IP group and or ...

Page 120: ...tive for that IP address If the filtering profile is active a pop up box opens containing the Result frame that displays profile settings applied to the profile Fig 2 1 34 Active Profile Lookup results The default Login Summary tab displays the following information Domain name IP group domain name Profile name name of the profile Time profile name name of the time profile if this is a time profil...

Page 121: ... access URLs set up for that category group library category TIP In the Category Groups tree double click the group enve lope to open that segment of the tree and to view library catego ries belonging to that group A check mark inside a green circle displays in the Pass Allow Warn Block column for the filter setting assigned to the category group library category for the end user These filter sett...

Page 122: ...Adult Content category group some of the library catego ries have a block setting and other library categories have a warn setting there would be no category group filter setting since all library categories do not have the same filter setting At the bottom of the Rule Details frame Uncategorized Sites are set to Pass Warn or Block indicating that the selected setting applies to any non classified...

Page 123: ... Admin Audit Trail window displays when Admin Audit Trail is selected from the Diagnostics menu This window is used for specifying FTP criteria so that a log of server changes made by an administrator will be sent to the FTP server The log of changes made on the server can be viewed in this window Admin Audit Trail The Admin Audit Trail tab displays by default Fig 2 1 35 Admin Audit Trail window ...

Page 124: ...ve is selected by default indicating that transfers will be made via unre stricted outgoing network connections Click Active if transfers will be initiated by the server 4 Type in the Username to be used 5 Type in the Password to be used and type it again in the Confirm Password field 6 Specify whether or not to Send Daily Log to FTP Server by clicking either the on or off radio button 7 Click App...

Page 125: ...og click the View tab Fig 2 1 36 Admin Audit Trail window View tab Click View Log to display data on recent activity For each change made on the server the log will contain the date and time the change was made Time IP address of the machine used by the administrator administrator s User name and a brief description of the Action performed on the server ...

Page 126: ...IES PROXYBLOCKER USER GUIDE Alert Alert includes options for setting up alert emails that notify designated individuals of problems on the network Click the Alert link to view a menu of sub topics Alert Settings and SMTP Server Settings Fig 2 1 37 System screen Alert menu ...

Page 127: ... the network are detected during the ProxyBlocker s self moni toring process Fig 2 1 38 Alert window The following processes are monitored by the Proxy Blocker CPU Processes If any CPU process fails to run the ProxyBlocker alerts the administrator about the failed process and that an attempt will be made to reload the necessary process The last few lines of any pertinent logs are included in the m...

Page 128: ...roxyBlocker is unable to transfer log files to the reporting application an 8e6 Enterprise Reporter ER server or a designated third party FTP server Action should be taken to prevent the hard drive from reaching 100 percent utilization Log File Transmission If the ProxyBlocker is unable to send log files as scheduled to an ER server or a third party FTP server the log files are placed in a queue s...

Page 129: ...lert email messages to designated administrators enter the email address of the ProxyBlocker in the From Email Address field 5 Click Apply to apply your settings Modify Alert Settings 1 Make any of the following edits in the Emergency Email Notification frame change an email address by typing the new one over the existing one deactivate a contact by removing the check mark from the checkbox corres...

Page 130: ... the Simple Mail Transfer Protocol that will be used for sending email alert messages to specified administrators Fig 2 1 39 SMTP Server Settings window Enter Edit SMTP Server Settings 1 Enter the SMTP Server name for example mail logo com 2 By default the SMTP Server Port number used for sending email is 25 This should be changed if the sending mail connection fails 3 By default the Email queue s...

Page 131: ...elow Make the following entries a Enter the Username b Enter the Password and make the same entry in the Confirm Password field 5 Click Apply to apply your settings Verify SMTP Settings To verify that email messages can be sent to a specified address 1 Click Test Settings to open the pop up box Fig 2 1 40 SMTP Test Settings box 2 Enter the email address in the pop up box 3 Click OK to close the po...

Page 132: ...1 SYSTEM SCREEN 118 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE Patch Patch includes options for uploading software updates Click the Patch link to view a menu of sub topics Local Patch and Patch Update Log Fig 2 1 41 System screen Patch menu ...

Page 133: ...gured and for viewing information about software updates currently avail able Fig 2 1 42 Local Patch window NOTE Available software updates for the ProxyBlocker come from downloads made to the server via Traveler 8e6 s execut able program that can run on demand or be set to run at a scheduled time TIP Click the link here at the bottom of the window to go to the Web page at 8e6 Technologies public ...

Page 134: ...es frame or the History of Patches frame the Date Name and Synopsis are included for each software update To read information about a software update 1 Select a software update from the list 2 Click the README button to open the README pop up box that contains information about the software update Fig 2 1 43 Software update Readme 3 Click Close to close the pop up box ...

Page 135: ...he Available Patches frame and select the soft ware update to be applied NOTES Software updates must be applied to the server in sequential order Be sure port 8082 is open on your network 2 Click Apply to open the software update installation dialog box Fig 2 1 44 Software update installation dialog box 3 Click Yes to open the EULA dialog box Fig 2 1 45 EULA dialog box ...

Page 136: ...been successfully applied go to the View Log File window and select Patch Log patch log See View Log File window for more infor mation 5 Click OK to close the alert box and to proceed This action opens the connection failure alert box indicating that the connection to the ProxyBlocker server has been lost due to the software update application Fig 2 1 47 Connection failure alert box 6 Click OK to ...

Page 137: ...n this chapter for information on performing a backup Undo an Applied Software Update NOTE Only the most recently applied software update can be uninstalled WARNING If a software update is uninstalled configuration settings will revert to the previous settings before the software update was applied To unapply a software update 1 Go to the History of Patches frame and select the soft ware update to...

Page 138: ...d from the Patch menu This window is used for viewing the software update log that provides the status on the ProxyBlocker s software update activity including checks for new software updates and downloaded and applied software updates Fig 2 1 48 Patch Update Log window View Log Contents Click View Log to display contents of the log in the frame below with the status of the software update ...

Page 139: ...ow to download the log file to your worksta tion if using Windows XP 2 Click OK to close the alert box Two pop up boxes open A second alert box asks you to confirm that the file was successfully saved to your machine Click OK in this box after the download is completed In the File Download dialog box click Save Fig 2 1 49 Download Log dialog box This action opens the Save As window Fig 2 1 50 Save...

Page 140: ...orksta tion After the file has completely downloaded the Download complete dialog box opens Fig 2 1 51 Download Complete box 4 You can now open this file open the folder where the file was saved or close this dialog box NOTE Proceed to View the Contents of the Log for information on viewing or printing the contents of the log file 5 Click OK to close the alert box asking you to verify that the sof...

Page 141: ...log file has been downloaded to your workstation you can view its contents 1 Find the log file in the folder and right click on it to open the pop up menu Fig 2 1 52 Folder containing downloaded file 2 Choose Open With and then select a zip file executable program such as WinZip Executable to launch that application Fig 2 1 53 WinZip Executable program ...

Page 142: ...6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 3 If using WinZip click I Agree to open the window containing the zip file Fig 2 1 54 WinZip window 4 Right click the zip file to open the pop up menu and choose View to open the View dialog box Fig 2 1 55 View dialog box ...

Page 143: ...ectly formatted in WinZip s View window if you wish to save or print the contents of this file 1 Click Clipboard Copy wait for the dialog box to open and confirm that the text has been copied to the clip board and then click OK to close the dialog box 2 Open Notepad in Windows XP Start All Programs Accessories Notepad in Windows 2000 Start Programs Accessories Notepad 3 Paste the contents from the...

Page 144: ...30 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE Mode Mode includes options for configuring the ProxyBlocker to filter the network Click the Mode link to view a menu of sub topics Operation Mode and Proxy Environment Settings Fig 2 1 57 System screen Mode menu ...

Page 145: ...nu This window is used for specifying criteria for the invisible operational mode the ProxyBlocker will use for filtering on the network as well as the settings to be used for listening to traffic and sending traffic Fig 2 1 58 Operation Mode window Specify the Listening Device In the Listening Device frame select the default listening Device for the selected mode LAN1 or LAN2 LAN1 displays by def...

Page 146: ...nsole Specify the Block Page Delivery In the Block Page Delivery Method frame specify the block page delivery method by making the following selection s Choose from either of the two Protocol Methods Send Block Page via ARP Table this option uses the Address Resolution Protocol method to find the best possible destination MAC address of a specified host usually the ProxyBlocker gateway Send Block ...

Page 147: ...s of the router or device that will serve block pages NOTES The Current MAC Address displays if there is a resolu tion between the IP address and the MAC address of the router or device used for serving block pages If an Alternate IP Address is used that address must be resolved with the MAC address in order for block pages to be served to client PCs Apply Settings Click Apply to apply your settin...

Page 148: ...ironment Settings is selected from the Mode menu This window is used for specifying whether the Proxy Blocker is in a proxy environment and if the default Web server port number 80 will be enabled Fig 2 1 59 Proxy Environment Settings window NOTE Basic Proxy Authentication must be used if using HTTPS in a proxy environment The ProxyBlocker has been tested with ISA Blue Coat and Squid proxies ...

Page 149: ...k the On radio button This selection indicates that the ProxyBlocker will perform a reverse lookup on packets to detect the source address and origin of packets 2 Click Apply to apply your setting Use Proxy Port 80 In the Proxy Port 80 Setting frame the default setting is Disable To specify that the public proxy server will channel https traffic through Port 80 1 Click the radio button correspondi...

Page 150: ...Proxy Blocker to authenticate and re authenticate users on the network Click the Authentication link to view a menu of sub topics Enable Disable Authentication Authentication Settings and Authentication SSL Certificate Fig 2 1 60 System screen Authentication menu NOTE Information about these sub topics can be found in the 8e6 ProxyBlocker Authentication User Guide ...

Page 151: ...r the ProxyBlocker s Network Interface Card settings so that the ProxyBlocker can communicate with the network switch or hub Fig 2 1 61 NIC Mode window By default the NIC mode for LAN1 and LAN2 is set to Auto The auto negotiation setting indicates that both connected devices will negotiate the fastest possible commonly shared speed NOTE The options available in this window depend on the hard ware ...

Page 152: ...tiation for a NIC click View NIC Negotiation to open a window containing results from the mii tool and the ethtool about the status of the NIC mode s Fig 2 1 62 NIC Negotiation window Mii tool checks or sets the status of a network interface s Media Independent Interface MII unit Ethtool is a diag nostic and tuning tool that examines and tunes the NIC ...

Page 153: ...ify the NIC setting in the LAN1 or LAN2 frame 1 Click the radio button for the available option you wish to select 10baseT Full Duplex 10baseT Half Duplex 100baseT Full Duplex 100baseT Half Duplex or 1000baseT Full Duplex if available on your Proxy Blocker model see NIC Mode Speeds Chart 2 Click Apply to activate the new NIC mode setting NOTE The status Up or Down of the Interface displays to the ...

Page 154: ...cted from the navigation panel This window is used for saving configuration settings and or custom library additions deletions on or off the server and for restoring these settings modifications later if necessary Fig 2 1 63 Backup Restore window WARNING A backup should be created and downloaded off the ProxyBlocker server whenever a change is made to filtering settings on the ProxyBlocker server ...

Page 155: ... followed by ellipses place the cursor over the beginning or ending of the column header When the character displays in place of the cursor you can expand the width of the column You also can use the scrollbar beneath the grid to view information to the right of the last column Backup Procedures 8e6 recommends performing backup procedures whenever changes are made to system configurations or to li...

Page 156: ...kup file 4 Type in a descriptive Comment about that file 5 Click OK to close the dialog box and to open the Wait alert box that informs you it may take some time to back up configurations based on the amount of data to be saved 6 Click OK to close the Wait alert box After configurations have been successfully saved the Message alert box opens to display a confirmation message 7 Click OK to close t...

Page 157: ... to open the alert box containing a message on how to download the log file to your worksta tion if using Windows XP 3 Click OK to close the alert box In the File Download dialog box that opens click Save Fig 2 1 65 File Download box This action opens the Save As window Fig 2 1 66 Save As pop up window 4 Find the folder in which to save the file and then click Save to begin downloading the gz file...

Page 158: ...N 144 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE After the file has completely downloaded the Download complete dialog box opens Fig 2 1 67 Download complete box You can now open this file open the folder where the file was saved or close this dialog box ...

Page 159: ...up Configurations grid you must upload it to the server WARNING Be sure the file you are restoring uses the same version of the software currently used by the ProxyBlocker Administrator console Refer to the Local Patch window for avail able updates to the ProxyBlocker s software See the Patch window for more information about software updates Upload a File to the Server To upload a gzip file to th...

Page 160: ...oaded CONFIG_ONLY LIBRARY_ONLY or both CONFIG_AND_LIBRARY 6 Click Upload File to upload this file to the server If the file is successfully uploaded the pop up window s banner name says Upload Successful After a few seconds the pop up window closes 7 Click Refresh to display a new row for the uploaded file in the Backup Configurations grid Restore Configurations to the Server To restore configurat...

Page 161: ...ails on backup and or restoration activities 1 Click Log to open the Backup Restore Log pop up box Fig 2 1 70 Backup Restore pop up box The pop up box includes rows of data about backup and restore processes performed via the Backup Restore window The following information displays for each row the date and time a process was attempted to be executed and a Message indicating whether that process s...

Page 162: ...the server back to the default settings when the box was first acquired Fig 2 1 71 Reset window WARNING When Reset is clicked all settings made on the ProxyBlocker server will be removed and the box will be restored to its original state Any software updates applied to the server subsequent to receiving this box will need to be reapplied Reset All Server Settings Click Reset to reset the box to th...

Page 163: ...arty Simple Network Management Protocol SNMP product for monitoring and managing the working status of the ProxyBlocker s filtering on a network Fig 2 1 72 SNMP window The following aspects of the ProxyBlocker are monitored by SNMP data traffic sent received by a NIC CPU load average at a given time interval amount of free disk space for each disk partition time elapse since the box was last reboo...

Page 164: ...hat the manage ment ProxyBlocker console would use when requesting access Create Build the Access Control List 1 In the Enter new IP to add field enter the IP address of an interface from to which the SNMP should receive send data 2 Click Add to include the entry in the Access control list box Repeat steps 1 and 2 for each IP address to be included in the list 3 After all entries are made click Sa...

Page 165: ...Failure Detection Hardware Failure Detection window If using a ProxyBlocker SL unit the Hardware Failure Detection window displays when Hardware Failure Detec tion is selected from the navigation panel This feature shows the status of each drive on the RAID server Fig 2 1 73 Hardware Failure Detection window ...

Page 166: ... other text displays on the screen If any of the hard drives has failed the message FAIL displays to the right of the hard drive number and instruc tions for replacing the hard drive display below 1 Identify the failed drive based on the information provided on the GUI 2 Replace the failed drive with your spare replacement drive 3 Click on the Rebuild button on the GUI 4 To return a failed drive t...

Page 167: ...o unacceptable Internet sites and locking a user s workstation after the user makes a specified X number of attempts to such sites Unacceptable Internet sites pertain to sites included in categories that are blocked in a user s profile Fig 2 1 74 X Strikes Blocking window Configuration tab NOTE X Strikes Blocking settings are effective only for filtering profiles with the X Strikes Blocking filter...

Page 168: ...ike and the strike that will lock out that user from his her Internet access The default setting is 5 and the maximum limit is 1440 minutes 24 hours 4 Enter the number of seconds for the Flood Tolerance Delay which is the maximum amount of time that will elapse before a user who accesses the same inappro priate URL will receive another strike The default setting and the maximum limit is 4 seconds ...

Page 169: ...to reset workstations Click Reset All Strikes to remove all strikes from all workstations and to unlock all locked workstations Click Unlock All Locks to remove locks on all locked workstations Lock Page A user who receives the final strike that locks him her out the workstation will see the following lock page display on the screen Fig 2 1 75 Sample lock page The text informs the user Your Intern...

Page 170: ...the Locked Life Time field passes or unless an authorized staff member manually unlocks that user s workstation see Go to X Strikes Unlock Workstation GUI in this section Overblocking or Underblocking NOTES In order to prevent overblocking unacceptable Internet images links are allowed to pass by if they display within the four second tolerance time range of a given strike Thus only one strike wil...

Page 171: ...s In this scenario the first strike would be delivered at 0 seconds the second at 4 seconds the third at 8 seconds the fourth at 12 seconds and the fifth at 16 seconds If the configuration settings for this example overblock too many users too frequently the time span for the maximum number of strikes may need to be increased the maximum number of strikes may need to be increased If these configur...

Page 172: ...ld enter the number of minutes past midnight that a locked workstation email alert will first be sent to the specified recipient s 2 In the Interval Minutes to Wait Before Sending Alerts 24 hours field enter the number of minutes within the 24 hour period that should elapse between email alerts For example by entering 300 in this field and 30 in the previous field if there are any email alerts the...

Page 173: ... Fig 2 1 77 The Daily Schedule pop up window Click Close to close the pop up window 3 Click Save to save the field entries Set up Email Alert Recipients 1 Enter the Email Address of an individual who will receive locked workstation email alerts 2 Click Add to include the email address in the Current Email Alerts list box NOTE The maximum number of email alert recipients is 50 If more than 50 recip...

Page 174: ... Accounts Click the Logon Accounts tab to display Logon Accounts Fig 2 1 78 X Strikes Blocking window Logon Accounts tab Set up Users Authorized to Unlock Workstations 1 Enter the Username of a staff member who is authorized to unlock workstations 2 Enter the user s password in the Password and Confirm Password fields using eight to 20 characters and at least one alpha character one numeric charac...

Page 175: ...ount To deactivate an authorized user s account 1 Select the username from the Current Accessible Users list box 2 Click Disable to move the username to the Current Un Accessible Users list box Delete a Logon Account To delete a user s account 1 Select the username from the Current Accessible Users list box 2 Click Delete WARNING By deleting a logon account in addition to not being able to unlock ...

Page 176: ...ikes 1 Select library categories from the No Strike Categories list box 2 Click the right arrow to move the selected library cate gories to the Strike Categories list box TIP Use the left arrow to move selected Strike Categories to the No Strike Categories list box 3 Click Apply to apply your settings NOTE Library categories in the Strike Categories list box will only be effective for filtering pr...

Page 177: ... clicks Go to X Strikes Unlock Workstation GUI either the Re login window or the X Strikes Unlock Workstation pop up window opens Re login window The Re login window opens if the user s session needs to be validated Fig 2 1 80 Re login window 1 Enter your Username 2 Enter your Password 3 Click OK to close the Re login window and to re access the ProxyBlocker console ...

Page 178: ...ire Date Time of currently locked workstations Fig 2 1 81 X Strikes Unlock Workstation window NOTE An authorized staff member can click a link in an email alert or type in http x x x x 88 XStrike html in the address field of a browser window in which x x x x is the IP address of the ProxyBlocker to view locked workstation criteria Unlock a Workstation To unlock a specified workstation 1 Select tha...

Page 179: ...the email address in the Email Address to be Subscribed Unsubscribed text box 2 Click Subscribe Remove an Email Address from the Alert List To remove an administrator s email address from the notifi cation list 1 Enter the email address in the Email Address to be Subscribed Unsubscribed text box 2 Click Unsubscribe Close the Pop up Window Click the X in the upper right corner of the pop up window ...

Page 180: ...h a warning page will redisplay for the end user who accesses a URL in a library category with a Warn setting for his her profile If the end user accesses another URL in a category with a Warn setting the warning page displays again and will continue to redisplay for the interval of time specified as long as the end user s browser is open to any URL with a Warn setting Fig 2 1 82 Warn Option Setti...

Page 181: ...ER USER GUIDE 167 Specify the Interval for Re displaying the Warn page 1 In the Warn Life Time minutes field by default 10 displays Enter the number of minutes 1 480 to be used in the interval for re displaying the warning page for the end user 2 Click Apply to enable your setting ...

Page 182: ...e a command that triggers the associated pop up window to open Click the Customization link to view a menu of sub topics Common Customization Authentication Form Lock Page Block Page Warn Page Profile Control Quota Block Page Quota Notice Page Fig 2 1 83 System screen Customization menu NOTE Refer to the 8e6 ProxyBlocker Authentication User Guide for information on using the Authentication Form Cu...

Page 183: ...g elements to be included in block lock profile and warning pages and or the authentication request form the end user will see Fig 2 1 84 Common Customization window By default in the Details frame all elements are selected to display in the HTML pages the Help link points to the FAQs page on 8e6 s public site that explains why access was denied and a sample email address is included for adminis t...

Page 184: ...led displays Blocked URL followed by the blocked URL in block pages Copyright Display if enabled displays 8e6 Proxy Blocker copyright information at the footer of block and lock pages and the authentication request form Title Display if enabled displays the title of the page in the title bar of the block and lock pages and the authentication request form Help Display if enabled displays the specif...

Page 185: ...iated email address specified in the Submission Email Address field described below is accessible to the end user by clicking the click here link NOTE If enabling the Submission Review Display feature an email address entry of the designated administrator in your orga nization must be made in the Submission Email Address field Submission Email Address By default admin company com displays in block...

Page 186: ...end users will see when attempting to access Internet content blocked for their profiles and their workstations are currently locked Entries saved in this window display in the customized lock page if these features are also enabled in the Common Customization window and the X Strikes Blocking feature is enabled NOTE See X Strikes Blocking window in this chapter for informa tion on using the X Str...

Page 187: ...ssage to be displayed beneath the lock page header Any entries made in these fields will display centered in the customized lock page using the Arial font type 2 At the Explanation Display field by default On is selected This setting displays the reason the workstation is locked beneath the text from the Description field Click Off to not have the explanatory text display in the lock page 3 Click ...

Page 188: ...tomization window Fig 2 1 86 Sample Customized Lock Page By default the following data displays in the User Machine frame User Machine field The username displays for the NT LDAP user This field is blank for the IP group user IP field The user s IP address displays By default the following standard links are included in the lock page HELP Clicking this link takes the user to 8e6 s Tech nical Suppo...

Page 189: ... Preview in this window again to view a sample lock page Block Page Customization window The Block Page Customization window displays when Block Page Customization is selected from the Customization menu This feature is used if you want to display customized text and include a customized link in the block page end users will see when attempting to access Internet content blocked for their profiles...

Page 190: ... Make an entry in any of the following fields In the Header field enter a static header to be displayed at the top of the block page In the Description field enter a static text message to be displayed beneath the block page header In the Link Text field enter text for the link s URL and in the Link URL field enter the corresponding hyper link in plain text using the http or https syntax Any entri...

Page 191: ...mized Block Page By default the following data displays in the User Machine frame User Machine field The username displays for the NT LDAP user This field is blank for the IP group user IP field The user s IP address displays Category field The name of the library category that blocked the user s access to the URL displays If the content the user attempted to access is blocked by an Exception URL ...

Page 192: ...es the user to the Options window NOTE See the Options page in the Block Page Authentication window sub section for information on options that display in the Options window To submit this blocked site for review click here This phrase and link is included if an email address was entered in the Submission Email Address field in the Common Customization window Clicking this link launches the user s...

Page 193: ... up window end users will see if attempting to access a URL in a library category set up with a Warn setting for his her profile Entries saved in this window display in the warning page if these features are also enabled in the Common Customization window and the Warn setting is applied to any library category or category group NOTE See Warn Option Setting window in this chapter for more informati...

Page 194: ...tion field enter a static text message to be displayed beneath the warning page header In the Link Text field enter text for the link s URL and in the Link URL field enter the corresponding hyper link in plain text using the http or https syntax Any entries made in these fields will display centered in the customized warning page using the Arial font type 2 Click Apply TIP Click Restore Default an...

Page 195: ...ow and in the Common Customization window Fig 2 1 90 Sample Customized Warning Page By default the following data displays in the User Machine frame User Machine field The username displays for the NT LDAP user This field is blank for the IP group user IP field The user s IP address displays Category field The name of the library category that warned the user about accessing the URL displays Block...

Page 196: ...terval this warning page will redisplay and the user must click this button once more in order to continue accessing the URL NOTE If using the Real Time Probe feature in the Real Time Information box the Filter Action column displays Warn for the first time the user saw the warning window and clicked Continue and Warned for each subsequent time the warning window opened for the user and he she cli...

Page 197: ...SER GUIDE 183 2 Click the X in the upper right corner of the window to close the sample customized warning page TIP If necessary make edits in the Warn Page Customization window or the Common Customization window and then click Preview in this window again to view a sample warning page ...

Page 198: ...de accounts will see when logging into their override accounts Such accounts give authorized users access to Internet content blocked for other end users Entries saved in this window display in the profile control pop up window if these features are also enabled in the Common Customization window and override accounts are set up for designated end users NOTE See Override Account window in the Grou...

Page 199: ...e displayed at the top of the profile control pop up window In the Warning Text field enter a static text message to be displayed at the bottom of the pop up window 2 Click Apply TIP Click Restore Default and then click Apply to revert to the default settings in this window NOTE For a sample profile control pop up window see Option 3 from the Options page section of the Block Page Authentication w...

Page 200: ... the Customization menu This window is used for making customizations to the quota block page the end user will see if he she has a quota time limit set for a passed category in his her profile and has attained or exceeded that limit Fig 2 1 92 Quota Block Page Customization window TIP An entry in any of the fields in this window is optional NOTE For more information about quotas see the Quota Set...

Page 201: ...cription field enter a static text message to be displayed beneath the header In the Link Text field enter text for the link s URL and in the Link URL field enter the corresponding hyper link in plain text using the http or https syntax Any entries made in these fields will display centered in the customized quota block page using the Arial font type 2 Click Apply TIP Click Restore Default and the...

Page 202: ...lowing data displays in the Category frame Category field The name of the library category that blocked the user from accessing the URL displays Requested URL field The URL the user attempted to access displays IP field The user s IP address displays User Machine field The username displays for the NT LDAP user This field is blank for the IP group user By default the following standard links are i...

Page 203: ...the Common Customization window and then click Preview in this window again to view a sample quota block page Quota Notice Page Customization window The Quota Notice Page Customization window displays when Quota Notice Page is selected from the Customiza tion menu This window is used for making customizations to the quota notice page the end user will see if he she has a quota time limit set for a...

Page 204: ...essage to be displayed beneath the header In the Link Text field enter text for the link s URL and in the Link URL field enter the corresponding hyper link in plain text using the http or https syntax Any entries made in these fields will display centered in the customized quota notice page using the Arial font type 2 By default the Quota Percentage Display is enabled indicating the percentage of ...

Page 205: ...le Customized Quota Notice Page By default the following data displays in the Category frame Category field The name of the library category containing a URL the user accessed that triggered the quota notice displays Requested URL field The URL the user accessed that triggered the quota notice displays IP field The user s IP address displays User Machine field The username displays for the NT LDAP...

Page 206: ... the user to 8e6 s Web site The following button is included in the quota notice page Continue Clicking this button closes the quota notice page and takes the user to the URL he she requested 2 Click the X in the upper right corner of the window to close the sample customized quota notice page TIP If necessary make edits in the Quota Block Page Customi zation window or the Common Customization win...

Page 207: ...tor configure URL hits that along with quotas specified in filtering profiles determine when a user will be blocked from further accessing URLs in a library group category This window is also used for resetting quotas so that users who have maxed out their quota time will regain access to a library group category with a quota time limit Fig 2 1 96 Quota Setting window TIP After making all configur...

Page 208: ... 3600 seconds one hour As an example of how a quota works in conjunction with hits if a quota is set to 10 minutes and the number of seconds per hit is set to 10 seconds then the user will be blocked from accessing URLs in the library group category when 60 hits are made to that category i e 600 seconds 10 minutes divided by 10 seconds NOTE The Centralize Hits on Source field is greyed out since a...

Page 209: ...te at which the quota will be reset 00 59 2 Click Add to include this reset time in the Current Reset Time s list box TIP Repeat steps 1 and 2 for each quota reset time to be sched uled After making all configuration settings in this window during this session click Apply Delete a Quota Reset Time from the Schedule 1 Select the quota reset time from the Current Reset Time s list box 2 Click Remove...

Page 210: ... displays Fig 2 1 97 Sample Quota Notice Page By default the following fields display Category field Name of the library category with the most hits Requested URL field The URL that triggered the Quota Notice page IP field The end user s IP address User Machine field The username displays for the NT LDAP user This field is blank for the IP group user By default the following standard links are inc...

Page 211: ...ser to 8e6 s Web site The end user can decide whether or not to access the requested URL By clicking Continue the user is redirected to the original requested site Quota Block page When the end user has spent 100 percent of time in a quota restricted library group category the quota block page displays Fig 2 1 98 Sample Quota Block Page Once receiving a quota block page the end user will not be ab...

Page 212: ...ser attempted to access displays IP field The user s IP address displays User Machine field The username displays for the NT LDAP user This field may be blank for the IP group user By default the following standard links are included in the quota block page HELP Clicking this link takes the user to 8e6 s Technical Support page that explains why access to the site or service may have been denied 8e...

Page 213: ...Fig 2 2 1 Group screen For the IP group branch the global administrator creates master IP groups For each master IP group the designated group administrator creates sub groups and individual IP members and adds and maintains their filtering profiles For the NT and LDAP domain branches the global adminis trator must first set up authentication in order to enable the NT LDAP branch es For each domai...

Page 214: ...ti cation is enabled Double click the branch of your selection to display the list of groups domains previously added to that branch Keep double clicking items in the tree list to view additional items Click an entity in the tree list to view a menu of topics or actions that can be performed for that entity NOTES Information on NT and LDAP groups can be found in the 8e6 ProxyBlocker Authentication...

Page 215: ... GUIDE 201 Global Group Global Group includes options for creating and maintaining groups Click the Global Group link to view a menu of sub topics Range to Detect Rules Global Group Profile Over ride Account Minimum Filtering Level and Refresh All Fig 2 2 2 Group screen Global Group menu ...

Page 216: ...twork traffic to be detected by the ProxyBlocker Service ports that should be open ignored by the ProxyBlocker are also defined in this window Fig 2 2 3 Range to Detect Settings window main window The main window Fig 2 2 3 lets you add segments to the network or modify or remove existing segments The Current Ranges list box includes a list of segments previ ously added using this feature The Manda...

Page 217: ... to select the procedure for adding the segment Start the Setup Wizard clicking this button takes you to the Range to Detect Setup Wizard Follow the instructions in the Range to Detect Setup Wizard sub section to complete the addition of the segment on the network Advanced Settings clicking this button takes you to the Range to Detect Advanced Settings window Follow the instructions in the Range t...

Page 218: ...ed of six steps An entry is required in Step 1 but not in Steps 2 5 Settings made using the Wizard are saved in Step 6 Step 1 In this step you define the source IP address es to be filtered Fig 2 2 5 Range to Detect Setup Wizard Step 1 Since the first four pages of the Wizard contain the same fields and buttons instructions provided for this step are not repeated for Steps 2 4 1 Choose the appropr...

Page 219: ...e IP address 2 Click Add to include the segment in the list box above NOTE To modify the segment select it from the list box and click Modify to move the segment to the field s below for editing To remove the segment select it from the list box and click Remove 3 Click Next to go to the next page of the Wizard NOTE Click Cancel to be given the option to return to the main Range to Detect Settings ...

Page 220: ...s to be filtered NOTE By making entries in Destination IP fields traffic will be restricted to the range specified in the Source IP and Destination IP frames This reduces the load on the ProxyBlocker thus enabling it to handle more traffic Fig 2 2 6 Range to Detect Setup Wizard window Step 2 NOTE For Steps 2 6 click Back to return to the previous page of the Wizard ...

Page 221: ...SECTION CHAPTER 2 GROUP SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 207 Step 3 Optional In this step you define the source IP address es to be excluded from filtering Fig 2 2 7 Range to Detect Setup Wizard window Step 3 ...

Page 222: ...uded from filtering Any entries from the list box in Step 1 automatically display in the list box above NOTE By making entries in Destination IP fields traffic will be restricted to the range specified in the Source IP and Destination IP frames This reduces the load on the ProxyBlocker thus enabling it to handle more traffic Fig 2 2 8 Range to Detect Setup Wizard window Step 4 ...

Page 223: ...numbers to be excluded from filtering Fig 2 2 9 Range to Detect Setup Wizard window Step 5 1 In the Individual Port field enter the port number to be excluded from filtering 2 Click Add to include the entry in the list box above NOTE To remove the port number select it from the list box and click Remove 3 Click Next to go to the last page of the Wizard ...

Page 224: ...1 Review the contents in all list boxes 2 Perform one of the following actions click the Modify button to the right of the list box if you need to make changes This action takes you to that page of the Wizard where you make your edits Click Next until you return to Step 6 click Finish to accept all your entries This action takes you to the main Range to Detect Settings window where the segment you...

Page 225: ... in the list box using the correct syntax Refer to the examples above TIP Use the Calculator to calculate IP ranges without any over laps Enter the IP address select the Netmask and then click Calculate to display results in the Min Host and Max Host fields Click Close to exit NOTE Click Cancel to be given the option to return to the main Range to Detect Settings window without saving your setting...

Page 226: ...fying the segment Start the Setup Wizard clicking this button takes you to Step 6 of the Range to Detect Setup Wizard see Fig 2 2 10 Follow the instructions in the Range to Detect Setup Wizard sub section for Step 6 Advanced Settings clicking this button takes you to the Range to Detect Advanced Settings window see Fig 2 2 11 Follow the instructions in the Range to Detect Advanced Settings sub sec...

Page 227: ...filtering profile for an entity Fig 2 2 12 Rules window By default Rule1 BYPASS displays in the Current Rules pull down menu The other choices in this pull down menu are Rule2 BLOCK Porn Rule3 Block IM and Porn Rule4 8e6 CIPA Compliance which pertains to the Chil dren s Internet Protection Act and the Block All rule By default Rule1 displays in the Rule field BYPASS displays in the Rule Descriptio...

Page 228: ...ategory Groups tree are set to pass indicating that the end user can access URLs in all library catego ries This filter setting is designated by the check mark inside a green circle in the Pass column TIP In the Category Groups tree double click the group enve lope to open that segment of the tree and to view library catego ries belonging to that group To change the filter setting for a category g...

Page 229: ...egory and then pressing the Shift key on your keyboard while clicking the last category and then double clicking in the appropriate column 4 Make a selection from the Uncategorized Sites pull down menu to specify how to handle a URL that has not yet been categorized Pass Warn or Block 5 To use the quota feature to restrict the end user s access to a passed library group category do the following I...

Page 230: ...d Rule to include your rule to the list that displays in the pull down menu Modify a Rule After a rule is added it can later be modified To make changes to a rule 1 Select the rule from the Current Rules pull down menu 2 Modify settings for library groups and categories in the Rule Details frame 3 Click Save Rule Copy a Rule As a time saving practice a rule can be used as a basis when creating ano...

Page 231: ...INISTRATOR SECTION CHAPTER 2 GROUP SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 217 5 Click Save Rule Remove a Rule To delete a rule 1 Select the rule from the Current Rules pull down menu 2 Click Delete Rule ...

Page 232: ...lobal Group menu This window is used for viewing creating the global default filtering profile that will be used by all users on the network unless a unique filtering profile is created for an entity Click the following tabs in this window Category Port Default Redirect URL and Filter Options Entries in these tabs comprise the profile string for the global group Fig 2 2 13 Global Group Profile win...

Page 233: ... raphy and Pornography Adult Content indicating that the end user can access URLs in all other library categories This filter setting is designated by the check mark inside a green circle in the Pass column for all category groups except Adult Content TIP In the Category Groups tree double click the group enve lope to open that segment of the tree and to view library catego ries belonging to that ...

Page 234: ... the appropriate column Blocks of categories can be assigned the same filter setting by clicking the first category and then pressing the Shift key on your keyboard while clicking the last category and then double clicking in the appropriate column 2 Make a selection from the Uncategorized Sites pull down menu to specify how to handle a URL that has not yet been categorized Pass Warn or Block 3 To...

Page 235: ...nabled if a quota is entered for any library group category By default the enabled Overall Quota is turned Off If turned On enter the number of minutes in the Min field to indicate when the end user s access to passed library groups categories with quotas will be blocked If the end user spends this amount of time at URLs in any quota marked library group category the Overall Quota over rides the n...

Page 236: ...2 2 14 Global Group Profile window Port tab Create Edit a List of Service Ports All service ports are filtered by default To block a service port from being accessed by global filtering profile users 1 Enter the port number in the Port field 2 Click Add Each port number you add displays in the Block Port s list box 3 Click Apply to apply your settings at the global level To remove a port number fr...

Page 237: ...the URL to be used for redirecting users who attempt to access a site or service set up to be blocked for the global filtering profile Fig 2 2 15 Global Group Profile window Default Redirect URL tab Create Edit the Redirect URL 1 Specify the type of redirect URL to be used Default Block Page Authentication Request Form or Custom URL If Custom URL is selected enter the redirect URL in the correspon...

Page 238: ...bal group filtering profile Fig 2 2 16 Global Group Profile window Filter Options tab Create Edit the Filter Options 1 Click the checkbox es corresponding to the option s to be applied to the global group filtering profile X Strikes Blocking Google Yahoo Ask com AOL Safe Search Enforcement Search Engine Keyword Filter Control URL Keyword Filter Control If URL Keyword Filter Control is selected the...

Page 239: ...ct SafeSearch Filtering option will be used whenever end users perform a Google Yahoo Ask com or AOL Web search or Image search WARNINGS This feature is not compatible with the proxy envi ronment as it will cause overblocking An inappropriate image will only be blocked if that image is included in 8e6 s library or is blocked by Google Yahoo Ask com or AOL If this option is used in conjunction with...

Page 240: ...ibrary categories NOTES Search engine keyword filtering relies on an exact keyword match For example if the word sex is set up to be blocked but sexes is not set up to be blocked a search will be allowed on sexes but not sex However if the word gin is set up to be blocked a search on cotton gin will be blocked since the word gin is blocked To set up search engine keywords in a Search Engine Keywor...

Page 241: ...fter the character in a URL NOTE To set up URL keywords in a URL Keywords window see the following sections of this user guide for the specified library type 8e6 Supplied Categories see Chapter 3 Library screen URL Keywords window in this section Custom Category see the Group Administrator Section Chapter 2 Library screen URL Keywords window WARNING If this feature is activated use extreme caution...

Page 242: ...lays when Override Account is selected from the Global Group menu This window is used for creating an override account that allows an IP group user to bypass settings at the minimum filtering level A user with an override account will be able to access categories and service ports blocked at the minimum filtering level Fig 2 2 17 Override Account window ...

Page 243: ...talled on his her workstation Add an Override Account To create an Override Account profile 1 In the Account Details frame enter the username in the Name field 2 Enter the Password 3 Make the same entry again in the Confirm Password field 4 Click Add to include the username in the list box of the Current Accounts frame and to open the pop up window containing the Current Accounts name as well as t...

Page 244: ...the category profile 1 Select a filtering rule from the available choices in the Available Filter Levels pull down menu This action automatically populates the Pass Allow Warn and or Block columns in the Rule Details frame with filter settings for each category group library category in the Category Groups tree TIP In the Category Groups tree double click the group enve lope to open that segment o...

Page 245: ... that column Pass URLs in this category will pass to the end user Allow URLs in this category will be added to the end user s white list Warn URLs in this category will warn the end user that the URL he she requested can be accessed but may be against the organization s policies The end user can view the URL after seeing a warning message and agreeing to its terms Block URLs in this category will ...

Page 246: ... Settings window in Chapter 1 System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas The Overall Quota field becomes enabled if a quota is entered for any library group category By default the enabled Overall Quota is turned Off If turned On enter the number of minutes in the Min field to indicate when the end user s access t...

Page 247: ... or service set up to be blocked Fig 2 2 19 Override Account pop up window Redirect tab 1 Specify the type of redirect URL to be used Default Block Page Authentication Request Form or Custom URL If Custom URL is selected enter the redirect URL in the corresponding text box The user will be redirected to the designated page at this URL instead of the block page 2 Click Apply to apply your settings ...

Page 248: ...is used for specifying which filter option s will be applied to the override account profile Fig 2 2 20 Override Account pop up window Filter Options tab 1 Click the checkbox es corresponding to the option s to be applied to the override account filtering profile X Strikes Blocking With the X Strikes Blocking option enabled if the user attempts to access inappro priate sites on the Internet he she...

Page 249: ...a user is performing an inappropriate Google Yahoo Ask com or AOL Image search the number of strikes that user will receive is based upon the amount of time it will take for unacceptable Google Yahoo Ask com or AOL images returned by the query to load on the page The user will receive only one strike if all inappropriate images load within the tolerance time range of a given strike Search Engine K...

Page 250: ...a browser window if that keyword has been set up to be blocked the user will be denied access to that site or service URL keywords are entered in the URL Keywords window of 8e6 supplied library categories and custom library categories With the Extend URL Keyword Filter Control option enabled a URL keyword search will be extended after the character in a URL NOTE To set up URL keywords in a URL Key...

Page 251: ... Password 4 Make the same entry again in the Confirm Password field 5 Click View Modify to open the pop up window 6 Click Apply 7 Click Close to close the pop up window Modify an Override Account To modify an override account 1 In the Current Accounts frame select the username from the list box 2 Click View Modify to open the pop up window 3 Click the tab in which to make modifications Rule Redi r...

Page 252: ...making selections from the list of library categories and service ports These settings can be bypassed if a user has an override account NOTE See the Override Account window in this chapter and in Chapter 1 of the Group Administrator Section for more informa tion about override accounts Click the following tabs in this window Category Port and Min Filter Bypass Entries in the Category and Port tab...

Page 253: ...rnography and Pornography Adult Content are assigned a Block filter setting and all other active library categories are set to Pass Filter settings are designated by the check mark inside a green circle in the Pass or Block column TIP In the Category Groups tree double click the group enve lope to open that segment of the tree and to view library catego ries belonging to that group ...

Page 254: ... this category will pass to the end user Block URLs in this category will be blocked TIPS Multiple categories can be assigned the same filter setting by clicking each category while pressing the Ctrl key on your keyboard and then double clicking in the appropriate column Blocks of categories can be assigned the same filter setting by clicking the first category and then pressing the Shift key on y...

Page 255: ...l Fig 2 2 22 Minimum Filtering Level window Port tab Create Edit a List of Service Ports All service ports are filtered by default To block a service port from being accessed at the minimum filtering level 1 Enter the port number in the Port field 2 Click Add Each port number you add displays in the Block Port s list box 3 Click Apply to apply your settings at the minimum filtering level To remove...

Page 256: ...ys when the Min Filter Bypass tab is clicked This tab is used for specifying whether users in a master IP group will be allowed to bypass the minimum filtering level with an override account or an exception URL Fig 2 2 23 Minimum Filtering Level window Min Filter Bypass tab NOTE See the Override Account window and Exception URL window of the Group screen in the Group Administrator Section of this ...

Page 257: ...able to access content blocked at the minimum filtering level 2 Click Save to apply your settings To allow users to bypass exception URLs set up to be blocked at the minimum filtering level 1 In the Exception URL frame click the On checkbox Users will be able to bypass settings at the minimum filtering level if URLs blocked at the minimum filtering level are set up to be accessed by users 2 Click ...

Page 258: ...oup menu click Refresh All to refresh the main branches of the tree This action should be performed whenever authentication has been enabled or disabled If authentication is enabled when Refresh All is clicked the NT and LDAP branches of the tree display When authenti cation is disabled when Refresh All is clicked only the IP branch of the tree displays ...

Page 259: ... GROUP SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 245 IP IP includes options for adding a master IP group and to refresh the tree list Click the IP link to view a menu of sub topics Add Group and Refresh Fig 2 2 24 Group screen IP menu ...

Page 260: ...he following characters cannot be used in the name period comma colon semi colon exclamation point question mark ampersand asterisk quotation mark apostrophe grave accent mark tilde caret _ underscore pipe slash backslash double backslashes left parenthesis right paren thesis left brace right brace left bracket right bracket at sign pound sign dollar sign percent sign less than symbol greater than...

Page 261: ... add the group to the tree NOTE Information on defining the group and its members and establishing their filtering profiles can be found in the Group Administrator Section of this user guide Refresh Refresh IP Groups From the IP group menu click Refresh whenever changes have been made in this branch of the tree ...

Page 262: ...ibrary screen A list of main topics displays in the navigation panel at the left of the screen Updates Library Lookup Category Weight System NNTP Newsgroup and Category Groups Click Updates to display a menu of sub topics Configura tion Manual Update Additional Language Support Library Update Log and Emergency Update Log Click Library Lookup Category Weight System or NNTP Newsgroup to select that ...

Page 263: ...Search Engine Keywords To maintain a custom category click Custom Categories and select either ALLOW or BLOCK to view a menu of sub topics for that library category item Library Details URLs URL Keywords and Search Engine Keywords NOTES See Appendix A in the Appendices Section for the URL to the page that provides a list of 8e6 supplied library categories See Appendix B for information on messages...

Page 264: ...ER GUIDE Updates Updates includes options for making configurations for library category activities Click the Updates link to view a menu of sub topics Configuration Manual Update Addi tional Language Support Library Update Log and Emer gency Update Log Fig 2 3 2 Library screen Updates menu ...

Page 265: ...s window is used for making settings to allow the ProxyBlocker to receive 8e6 supplied library category updates on a daily basis Fig 2 3 3 Configuration window Set a Time for Updates to be Retrieved 1 In the Schedule Time frame by default 1 00 am displays for the Current automatic update time At this pull down menu specify the time at which library updates will be retrieved 2 Click Apply to apply ...

Page 266: ...he Proxy Server Enter the host name for the proxy server in this field 3 By default userid displays in the Username field Enter the username for the FTP account 4 Enter the same password in the Password and Confirm Password fields 5 Click Apply to apply your settings Select the Log Level 1 In the Log Level frame select the log level to be used for specifying the log contents Log Level 1 includes a...

Page 267: ...e is selected from the Updates menu This window is used for updating specified 8e6 supplied library categories on demand from the update server if the ProxyBlocker has not received daily updates due to an occurrence such as a power outage Fig 2 3 4 Manual Update window NOTE The Configuration window should be used for scheduling the ProxyBlocker to automatically download libraries on a daily basis ...

Page 268: ...re library files Patch Update Select this option to download new software updates for the ProxyBlocker if available Any software updates that are downloaded can be found in the System section of the console in the Local Patch window Using that window a software update can be selected and applied 2 Click Update Now to begin the update process TIP To view update activity select Library Update Log fr...

Page 269: ...ed for including additional 8e6 supported languages in library downloads Fig 2 3 5 Additional Language Support window Select Additional Languages 1 Make a selection from the Unselected Languages list box and click the right arrow to move that selection to the Selected Languages list box 2 Once the Selected Languages list box is populated the Optional Select Primary Language pull down menu includes...

Page 270: ...selection for a primary language choose the language from the Optional Select Primary Language pull down menu TIP To move a language selection back to the Unselected Languages list box select the item and then click the left arrow 3 Click Apply to have URLs from the selected language s included in the library categories ...

Page 271: ...y of library updates from the update server to your ProxyBlocker and for downloading the activity log Fig 2 3 6 Library Update Log window View the Library Update Process When performing a manual on demand library update click View Log to display contents from the log file with the status of the library update Keep clicking this button to continue viewing log file data NOTE See Appendix B Traveler ...

Page 272: ... how to download the log file to your worksta tion if using Windows XP 2 Click OK to close the alert box Two pop up boxes open A second alert box asks you to confirm that the file was successfully saved to your machine Click OK in this box after the download is completed In the File Download dialog box click Save Fig 2 3 7 Download Log dialog box This action opens the Save As window Fig 2 3 8 Save...

Page 273: ...ens Fig 2 3 9 Download Complete box 4 You can now open this file open the folder where the file was saved or close this dialog box NOTE Proceed to View the Contents of the Log for information on viewing or printing the contents of the log file 5 Click OK to close the alert box asking you to verify that the log file was successfully saved to your machine View the Contents of the Log Once the log fi...

Page 274: ...R USER GUIDE Fig 2 3 10 Folder containing downloaded file 2 Choose Open With and then select a zip file executable program such as WinZip Executable to launch that application Fig 2 3 11 WinZip Executable program 3 If using WinZip click I Agree to open the window containing the zip file ...

Page 275: ...UIDE 261 Fig 2 3 12 WinZip window 4 Right click the zip file to open the pop up menu and choose View to open the View dialog box Fig 2 2 13 View dialog box 5 Select Internal ASCII text viewer and then click View to open the View window containing the log file contents Fig 2 3 14 View window ...

Page 276: ...ents of this file 1 Click Clipboard Copy wait for the dialog box to open and confirm that the text has been copied to the clip board and then click OK to close the dialog box 2 Open Notepad in Windows XP Start All Programs Accessories Notepad in Windows 2000 Start Programs Accessories Notepad 3 Paste the contents from the clipboard into the Notepad file Fig 2 3 15 Notepad The correctly formatted N...

Page 277: ...ed for viewing transfer activity of emergency software updates from the update server to your Proxy Blocker and for downloading the activity log Fig 2 3 16 Emergency Update Log window View the Emergency Software Update Process Click View Log to display contents from the emergency software update log file with the status of the software update NOTES See Appendix B Traveler Log Messages for informat...

Page 278: ...lick OK in this box after the download is completed In the File Download dialog box click Save this action opens the Save As window 3 Find the folder in which to save the file and then enter the File name retaining the zip file extension Click Save to begin downloading the zip file to your worksta tion After the file has completely downloaded the Down load complete dialog box opens 4 You can now o...

Page 279: ...y Lookup Library Lookup window The Library Lookup window displays when Library Lookup is selected from the navigation panel This window is used for verifying whether a URL or search engine keyword or keyword phrase exists in a library category and to remove it if necessary Fig 2 3 17 Library Lookup window ...

Page 280: ... http 209 247 228 221 octal format e g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 decimal value format e g http 1180014290 escaped hexadecimal format e g http 57 57 57 41 44 44 49 43 54 49 4E 4 7 47 41 4D 45 53 43 4F 4D NOTE The minimum number of wildcard levels that can be entered is three e g yahoo com and the maximu...

Page 281: ...he Result Category list box 2 Click Remove Submit an Email to the Administrator If using a non Web based email client such as Outlook you can send an email to the administrator at your organization regarding a URL or search engine keyword that appears to be incorrectly categorized 1 Select the item s from the Result Category list box 2 Click Email Result ...

Page 282: ...esult Category list box showing the long name of all categories that contain the search engine keyword phrase Remove a Search Engine Keyword To remove a search engine keyword phrase from library categories 1 After performing the search engine keyword search select the categories from the Result Category list box 2 Click Remove Reload the Library Once all changes have been made to library windows c...

Page 283: ...ory Weight System window displays when Cate gory Weight System is selected from the navigation panel This feature lets you choose which category will be logged and reported for a URL request that exists in multiple cate gories possibly both 8e6 supplied and custom library cate gories with the same operational precedence Fig 2 3 18 Category Weight System window ...

Page 284: ...ltiple categories the highest operational prece dence would be logged If a URL exists in a category that is Always Allowed as well as a category set to be Blocked for that user Always Allowed would be logged because it holds the highest oper ational precedence However if an end user attempts to access a URL set to be Blocked in several categories the category with the highest weighting would be lo...

Page 285: ...the No Weight Categories list box Once the Weight Categories list box is populated with categories you wish to include select a category and use the arrow keys to weight it against other categories TIP There are four arrow keys to the right of the Weight Cate gories list box From top to bottom the first arrow key moves the selection to the top of the list The second arrow key moves the selection u...

Page 286: ...n NNTP News group is selected from the navigation panel This window is used for adding or removing a newsgroup from the libraries Fig 2 3 19 NNTP Newsgroup window Add a Newsgroup to the Library To add a newsgroup to the library 1 In the Newsgroup frame enter the Newsgroup address 2 Click Add If the newsgroup already exists an alert box will open to inform you that it exists ...

Page 287: ...library 1 In the Newsgroup frame enter the Newsgroup address 2 Click Remove After all changes have been made to library windows click Reload Library to refresh NOTE Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker 8e6 recommends clicking Reload Library only after modifications to all library windows have been made ...

Page 288: ... via Traveler 8e6 s executable program that supplies updates to the ProxyBlocker Category Groups also contains the Custom Categories category group The ALLOW and BLOCK library categories within this category group must be maintained by the global administrator Fig 2 3 20 Library screen Category Groups menu Double click Category Groups to open the tree and to display category groups Double click a ...

Page 289: ...ER GUIDE 275 Click the 8e6 supplied category link or the ALLOW or BLOCK link in Custom Categories to view a menu of sub topics Library Details URLs URL Keywords and Search Engine Keywords Menus for Instant Messaging library categories only include the sub topics Library Details and URLs ...

Page 290: ...ls window The Library Details window displays when Library Details is selected from the library category s menu of sub topics This window is a view only window Fig 2 3 21 Library Details window View Library Details This window displays the Group Name Description and Short Name of the 8e6 supplied library category ...

Page 291: ...ving a URL from a library category A URL can contain a domain name such as playboy in http www playboy com or an IP address such as 209 247 228 221 in http 209 247 228 221 A wildcard asterisk symbol followed by a period can be entered in a format such as playboy com for example to block access to all URLs ending in playboy com A URL is used in a filtering profile for blocking a user s access to a ...

Page 292: ...ry Category To view a list of all URLs that either have been added or deleted 1 Click the View tab 2 Make a selection from the pull down menu for Addition List Deletion List Wildcard Addition List or Wild card Deletion List 3 Click View List to display the specified items in the Select List list box Fig 2 3 23 URLs window View tab ...

Page 293: ...IP address e g 209 247 228 221 in http 209 247 228 221 octal format e g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 decimal value format e g http 1180014290 escaped hexadecimal format e g http 57 57 57 41 44 44 49 43 54 49 4E 4 7 47 41 4D 45 53 43 4F 4D 2 Click Add to display the associated URL s in the list box below 3...

Page 294: ... that you wish to add to the category 4 Click Apply Action NOTE Wildcard URL query results include all URLs containing text following the period after the wildcard symbol For example an entry of porn com would find a URL such as http sex porn com However if a specific URL was added to a library category that is not set up to be blocked and a separate wildcard entry containing a portion of that URL...

Page 295: ...List frame as pertinent 3 Click Remove to display the associated URLs in the list box below 4 Select the URL s that you wish to remove from the cate gory 5 Click Apply Action Reload the Library After all changes have been made to library windows click Reload Library to refresh NOTE Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker 8e6 recommends ...

Page 296: ...words from a library category A library category uses URL keywords to block a user s access to Internet addresses containing keywords included in its list Fig 2 3 24 URL Keywords window NOTE If the feature for URL keyword filtering is not enabled in a filtering profile URL keywords can be added in this window but URL keyword filtering will not be in effect for the user s See the Filter Options tab...

Page 297: ...h as http www essex com View a List of URL Keywords To view a list of all URL keywords that either have been added or deleted 1 In the View Keyword Addition Deletion List frame make a selection from the pull down menu for Addition List or Deletion List 2 Click View List to display the specified items in the Select List list box Add or Remove URL Keywords Add a URL Keyword to the Library Category T...

Page 298: ... the server by clicking the Append or Overwrite radio button Upload a List of URL Keyword Additions To upload a text file with URL keyword additions 1 Click Upload To Addition File to open the Upload Library Keyword pop up window Fig 2 3 25 Upload Library Keyword pop up window 2 Click Browse to open the Choose file window 3 Select the file to be uploaded 4 Click Upload File to upload this file to ...

Page 299: ...op up window see Fig 2 3 25 2 Click Browse to open the Choose file window 3 Select the file to be uploaded 4 Click Upload File to upload this file to the server Reload the Library After all changes have been made to library windows click Reload to refresh NOTE Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker 8e6 recommends clicking Reload only a...

Page 300: ...s used for adding and removing search engine keywords phrases to and from a library category A library category uses search engine keywords to block searches on subjects containing keywords included in its list Fig 2 3 26 Search Engine Keywords window NOTE Master lists cannot be uploaded to any 8e6 supplied library category See the Custom Categories sub section of the Group Administrator Section o...

Page 301: ...ked categories For example if all searches on gin are set up to be blocked users will not be able to run a search on a subject such as cotton gin However if the word sex is set up to be blocked a search will be allowed on sexes but not sex since a search engine keyword must exactly match a word set up to be blocked View a List of Search Engine Keywords To view a list of all search engine keywords ...

Page 302: ...el Keyword frame specify whether the contents of this file will add to the current file or overwrite the current file on the server by clicking the Append or Overwrite radio button Upload a List of Search Engine Keyword Additions To upload a text file with search engine keyword phrase additions 1 Click Upload To Addition to open the Upload Library Keyword pop up window see Fig 2 3 25 2 Click Brows...

Page 303: ...ry Keyword pop up window see Fig 2 3 25 2 Click Browse to open the Choose file window Select the file to be uploaded 3 Click Upload File to upload this file to the server Reload the Library After all changes have been made to library windows click Reload to refresh NOTE Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker 8e6 recommends clicking Rel...

Page 304: ...nel at the left of the screen click Report Configuration to display the Report Configuration window used if the ProxyBlocker s log files will be trans ferred to a reporting application Click Real Time Probe to display windows for configuring and maintaining real time probes This tool is used for monitoring Internet activities of specified users in real time NOTE Information on configuring the Ente...

Page 305: ... the navigation panel This window is used if a reporting application needs to be set up to receive logs from the ProxyBlocker Fig 2 4 2 Report Configuration window Specify the Reporting Device By default no option is selected at the Export field If ProxyBlocker logs will be exported to a reporting applica tion 1 Click the checkbox corresponding to the reporter to be used for transferring logs 8e6 ...

Page 306: ... to specify criteria for the ER server that will receive logs from the ProxyBlocker Fig 2 4 3 Report Configuration window 8e6 ER option ER tab Edit ER Server Information In the Log File Transfer Configuration frame by default the IP address 1 2 3 6 displays in the Remote Server list box To add the IP address assigned to the ER server 1 Enter the LAN 1 IP address in the Server field 2 Click Add to ...

Page 307: ...ss 2 Click Remove Execute Log Transfer Now In the Initiating Log Transfer frame click Initiate to transfer the log on demand View Transfer Activity to the ER After the ER has been configured and logs have been trans ferred from the ProxyBlocker to the ER you can view transfer activity Fig 2 4 4 Report Configuration window 8e6 ER option Log tab 1 Click the Log tab ...

Page 308: ...elected the Other Device tab displays by default On this tab you need to specify criteria for the reporter that will receive logs from the ProxyBlocker Fig 2 4 5 Report Configuration window Other Device option and tab Enter or Edit Server Information In the Server Configuration frame 1 In the Remote Server field enter the IP address of the remote server 2 In the FTP Directory field enter the path ...

Page 309: ...is selected these fields are deactivated 6 Click Save In the FTP Log Update frame 1 At the Hour field make a selection from the pull down menu 1 2 3 4 6 8 12 24 to specify the interval between hours in military time when the update should occur 1 updates occur each hour 2 updates occur every two hours at these intervals of time 2 4 6 8 10 12 14 16 18 20 22 24 3 updates occur every three hours at t...

Page 310: ...USER GUIDE View Transfer Activity to the Reporting Device After logs have been transferred from the ProxyBlocker to the reporting device the Log tab can be clicked to view transfer activity On this tab click View Log to view up to the last 300 lines of transfer activity in the View Log frame ...

Page 311: ...be Real Time Probe window The Real Time Probe window displays when Real Time Probe is selected from the navigation panel This feature lets the probe administrator monitor a user s Internet usage in real time to see if that user is using the Internet appropri ately Fig 2 4 6 Real Time Probe window Configuration tab ...

Page 312: ...bes 2 Enter the Maximum Probes that can be Scheduled equal to or less than the maximum probes that can run at the same time The default setting is 5 probes 3 Enter the Maximum Run Time in Minutes the probe will search for URLs up to 1440 minutes 24 hours The default setting is 1000 minutes 4 Enter the Maximum Report Lifetime in Days to keep a saved report before deleting it The default setting is ...

Page 313: ...hite list of IPs list box 2 Click Delete to remove the IP address es from the white list Report Recipients Click the Report Recipients tab to display Email Report Fig 2 4 7 Real Time Probe window Report Recipients tab Specify Email File Criteria 1 Click the radio button corresponding the to the Email Format to be used for the file Plain Text or HTML By default HTML is selected ...

Page 314: ...of an individual who will receive completed probe reports 2 Click Add to include the email address in the Current List of Completed Reports to be Emailed list box NOTE The maximum number of report recipients is 50 If more than 50 recipients need to be included 8e6 recommends setting up an email alias list for group distribution Remove Email Addresses 1 Select the email address es from the Current ...

Page 315: ... tab Set up Users Authorized to Create Probes 1 Enter the Username of a staff member who is authorized to create real time probes 2 Enter the user s password in the Password and Confirm Password fields using eight to 20 characters and at least one alpha character one numeric character and one special character The password is case sensitive 3 Click Add to include the username in the Current Acces ...

Page 316: ... account 1 Select the username from the Current Accessible Users list box 2 Click Disable to move the username to the Current Un Accessible Users list box Delete a Logon Account To delete a user s account 1 Select the username from the Current Accessible Users list box 2 Click Delete WARNING By deleting a logon account in addition to not being able to create real time probes that user will also be...

Page 317: ...ator clicks Go to Real Time Probe Reports GUI either the Re login window or the Real Time Probe Reports pop up window opens Re login window The Re login window opens if the user s session needs to be validated Fig 2 4 9 Re login window 1 Enter your Username 2 Enter your Password 3 Click OK to close the Re login window and to re access the ProxyBlocker console ...

Page 318: ...ing the global administrator information on all active probes NOTE An authorized staff member can click a link in an email alert or type in http x x x x 88 RtProbe jsp in the address field of a browser window in which x x x x is the IP address of the ProxyBlocker to only see probes he she created Create a Real Time Probe Click the Create tab to enter and specify criteria for the report you wish to...

Page 319: ...e characters to be included in the User Name s to be probed The entry in this field is case sensitive This selection generates a report with data for all usernames containing the consecutive characters you specified In this example if ART is entered ART GARTH and MARTA would be included in the report But Art or BARRETT would not be included since the former username does not contain all uppercase ...

Page 320: ... report to a specified email address enter the Email Address to Mail the Completed Report 5 Specify the Start Date Time by clicking the appropriate radio button Now click this radio button to run the probe now Schedule at click this radio button to schedule a time for running the probe Select the date and time from the pull down menus A probe that is scheduled to run at a specified date and time c...

Page 321: ...ails about active probes Fig 2 4 11 Real Time Probe Reports View tab The Display Name shows the name assigned to the probe on the Create tab The Start Date Time displays in the YYYY MM DD HH MM SS format Daily displays in the Recurrence column if the probe is scheduled to run on a daily basis The Status of the probe displays Completed In Progress or Scheduled ...

Page 322: ... is Completed or In Progress clicking View opens the Real Time Information box Fig 2 4 12 Real Time Information box This box displays the number of minutes left for the probe to run Run Time Left and user details for each item in the grid Date Time in the YYYY MM DD HH MM SS format IP Address User Name library Category Filter Action set up in the profile Pass Block reserved for ER Warn Warned X St...

Page 323: ...il After the probe is completed the Email button is avail able instead of the Stop button Clicking Email opens the Email option dialog box in which you specify an email address to send the completed report see Email option Click Close to close the Real Time Information box Properties option Clicking Properties opens the Probe Properties box Fig 2 4 13 Probe Properties box This box includes the fol...

Page 324: ...r mation box via the Stop button Clicking Delete opens the following dialog box asking if you want to delete the probe Fig 2 4 14 Probe Properties deletion box Click Yes to delete the probe and remove it from the View tab Email option Clicking Email opens the Email Address box Fig 2 4 15 Email Address box Enter the Email Address to Mail the Completed Report and click Send to send the completed rep...

Page 325: ...p and main taining master IP groups and group members Chapter 2 includes information on maintaining exception URLs The group administrator performs the following tasks defines members of a master IP group adds sub group members and or individual IP members and creates their filtering profiles grants designated users access to Internet content blocked at the global level as appropriate via an over ...

Page 326: ...d with an IP address and may contain a netmask within a valid IP address range Fig 3 1 1 Group screen The navigation panel at the left of the screen contains the IP branch of the Group tree Double click the IP branch of the tree to open it and to display the master IP group Double click the master IP group to open it and to display any IP sub groups and or individual IP members previously set up i...

Page 327: ...R 1 GROUP SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 313 IP Refresh Refresh the Master IP Group Member Click Refresh whenever a change has been made to the master IP group or member level of the tree Fig 3 1 2 Group screen IP menu ...

Page 328: ...ting up an override account and or exception URLs to bypass global settings and uploading or downloading IP profiles Click the master IP group s link to view a menu of sub topics Group Details Members Override Account Group Profile Exception URL Time Profile Upload Download IP Profile Add Sub Group Add Individual IP Delete Group and Paste Sub Group Fig 3 1 3 Group screen master IP group menu ...

Page 329: ... changing the password of the group administrator Fig 3 1 4 Group window Change the Group Administrator Password In the Group Administrator frame the Group Name displays To change the password for this group 1 Enter the password in the Password and Confirm Pass word fields using eight to 20 characters and at least one alpha character one numeric character and one special character The password is ...

Page 330: ...A member is comprised of an associated IP address and a sub group may also contain a netmask Fig 3 1 5 Members window Add the IP Address of the Member 1 Specify whether to add an IP address range with or without a netmask by selecting either Source IP or Source IP Start End If Source IP was selected enter the IP address and specify the netmask in the Source IP fields If Source IP Start End was sel...

Page 331: ...x TIP Click Calculator to open the IP Calculator and calculate IP ranges without any overlaps Enter the IP address specify the Netmask and then click Calculate to display results in the Min Host and Max Host fields Click Close to exit Remove a Member from the Group To remove an entry from the Current Members list box 1 Select the member from the list box 2 Click Remove ...

Page 332: ...ted from the menu This window is used for creating an override account that allows an end user from a master IP group to bypass settings at the minimum filtering level A user with an override account will be able to access categories and service ports blocked at the minimum filtering level if the option to bypass the minimum filtering level is activated Fig 3 1 6 Override Account window ...

Page 333: ...th an override account can authenticate if a pop up blocker is installed on his her workstation Add an Override Account To create an Override Account profile 1 In the Account Details frame enter the username in the Name field 2 Enter the Password 3 Make the same entry again in the Confirm Password field 4 Click Add to include the username in the list box of the Current Accounts frame and to open t...

Page 334: ...he category profile 1 Select a filtering rule from the available choices in the Available Filter Levels pull down menu This action automatically populates the Pass Allow Warn and or Block columns in the Rule Details frame with filter settings for each category group library category in the Category Groups tree TIP In the Category Groups tree double click the group enve lope to open that segment of...

Page 335: ... that column Pass URLs in this category will pass to the end user Allow URLs in this category will be added to the end user s white list Warn URLs in this category will warn the end user that the URL he she requested can be accessed but may be against the organization s policies The end user can view the URL after seeing a warning message and agreeing to its terms Block URLs in this category will ...

Page 336: ...Settings window in Chapter 1 System screen for more information on configuring quota settings and resetting quotas for end users currently blocked by quotas The Overall Quota field becomes enabled if a quota is entered for any library group category By default the enabled Overall Quota is turned Off If turned On enter the number of minutes in the Min field to indicate when the end user s access to...

Page 337: ...if he she attempts to access a site or service set up to be blocked Fig 3 1 8 Override Account pop up window Redirect tab Specify the type of redirect URL to be used Default Block Page Authentication Request Form or Custom URL If Custom URL is selected enter the redirect URL in the corresponding text box The user will be redirected to the designated page at this URL instead of the block page ...

Page 338: ...he checkbox es corresponding to the option s to be applied to the override account filtering profile X Strikes Blocking With the X Strikes Blocking option enabled if the user attempts to access inappropriate sites on the Internet he she will be locked out from his her workstation after a specified number of tries within a fixed time period NOTE See the X Strikes Blocking window in Chapter 1 System...

Page 339: ...ce time range of a given strike Search Engine Keyword Filter Control With the Search Engine Keyword Filter Control option enabled search engine keywords can be set up to be blocked When the user enters a keyword in the search engine if that keyword has been set up to be blocked the search will not be performed Search engine keywords are entered in the Search Engine Keywords window of custom librar...

Page 340: ...the username in the Name field 3 Enter the new Password 4 Make the same entry again in the Confirm Password field 5 Click View Modify to open the pop up window 6 Click Apply 7 Click Close to close the pop up window Modify an Override Account To modify an override account 1 In the Current Accounts frame select the username from the list box 2 Click View Modify to open the pop up window 3 Click the ...

Page 341: ...R SECTION CHAPTER 1 GROUP SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 327 Delete an Override Account To delete an override account 1 In the Current Accounts frame select the username from the list box 2 Click Remove ...

Page 342: ...gory Redirect URL and Filter Options Entries in these tabs comprise the profile string for the group Category Profile Category Profile displays by default when Group Profile is selected from the group menu or when the Category tab is clicked This tab is used for assigning filter settings to cate gory groups library categories for the group s filtering profile Fig 3 1 10 Group Profile window Profil...

Page 343: ...oup library category in the Category Groups tree TIP In the Category Groups tree double click the group enve lope to open that segment of the tree and to view library catego ries belonging to that group NOTE If a category group does not display any filter setting i e the check mark does not display in any column for the category group one or more library categories within that group has a setting ...

Page 344: ...e appropriate column 3 Make a selection from the Uncategorized Sites pull down menu to specify how to handle a URL that has not yet been categorized Pass Warn or Block 4 To use the quota feature to restrict the end user s access to a passed library group category do the following In the Quota column enter the number of minutes the user will be able to access the library group category The minimum ...

Page 345: ...o close the pop up window and to return to the Override Account window Redirect URL Redirect URL displays when the Redirect URL tab is clicked This tab is used for specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked at the group level Fig 3 1 11 Group Profile window Redirect URL tab Create Edit the Redirect URL 1 Specify the type of redi...

Page 346: ... Filter Options Filter Options displays when the Filter Options tab is clicked This tab is used for specifying which filter option s will be applied to the group s filtering profile Fig 3 1 12 Group Profile window Filter Options tab Create Edit the Filter Options 1 Click the checkbox es corresponding to the option s to be applied to the sub group filtering profile X Strikes Blocking Google Yahoo A...

Page 347: ...erform a Google Yahoo Ask com or AOL Web search or Image search WARNINGS This feature is not compatible with the proxy envi ronment as it will cause overblocking An inappropriate image will only be blocked if that image is included in 8e6 s library or is blocked by Google Yahoo Ask com or AOL If this option is used in conjunction with the X Strikes Blocking feature and a user is performing an inap...

Page 348: ...rol option enabled URL keywords can be set up to be blocked When a user enters a keyword in the address line of a browser window if that keyword has been set up to be blocked the user will be denied access to that site or service URL keywords are entered in the URL Keywords window of custom library categories With the Extend URL Keyword Filter Control option enabled a URL keyword search will be ex...

Page 349: ... Exception URL window NOTE Settings in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator Users with an override account will be able to access URLs set up to be blocked in this window if the global administrator acti vates bypass settings in the Minimum Filtering Bypass Options tab See the...

Page 350: ...ed by the group again 1 Select the URL from the Block URLs list box 2 Click Remove ByPass URL frame To allow a URL that is blocked at the minimum filtering level to be accessed by the group 1 In the ByPass URL field enter the URL 2 Click Add to include the URL in the ByPass URLs list box To block the group s access to the URL again 1 Select the URL from the ByPass URLs list box 2 Click Remove Appl...

Page 351: ...oup menu This window is used for setting up or modifying a filtering profile to be activated at a specified time Fig 3 1 14 Time Profile window The Current Time Profiles list box displays the Name and Description of any time profiles previously set up for the entity that are currently active Add a Time Profile To create a time profile 1 Click Add to open the Adding Time Profile pop up box ...

Page 352: ...Profile 2 Type in three to 20 alphanumeric characters the under score _ character can be used for the profile name 3 Click OK to close the pop up box and to open the Adding Time Profile pop up window that displays the name of this profile at the top of the Time Profile frame Fig 3 1 16 Time Profile window Recurrence tab ...

Page 353: ...s in the Start field and 12 15 displays in the End field b Indicate whether this time slot is AM or PM c Today s date displays using the MM DD YY format To choose another date click the arrow in the date drop down menu to open the calendar pop up box In this pop up box you can do the following Click the left or right arrow at the top of this box to navigate to the prior month or the next month Dou...

Page 354: ...ered and Wednesday and Friday are selected this profile will be used every two weeks on Wednesday and Friday Monthly If this selection is made first enter the interval for the months this time profile will be used and next specify which day of the month If Day is chosen select from 1 31 If a non specific day is chosen make selections from the two pull down menus for the following week of the month...

Page 355: ...menus for the following week of the month First Fourth or Last day of the month Sunday Saturday Day Weekday Weekend month January December By default the First Sunday of January are selected If 2 is entered and the First Monday of June are selected this profile will be used every two years on the first Monday in June For example if the current month and year are May 2008 the first Monday in June t...

Page 356: ...e profile See Category Profile Redirect URL Filter Options and Exception URL in this sub section for infor mation on the Rule Redirect Filter Options and Excep tion tabs 8 Click Apply to activate the time profile for the IP group at the specified time 9 Click Close to close the Adding Time Profile pop up window and to return to the Time Profile window In this window the Current Time Profiles list ...

Page 357: ... Profile The Rule tab is used for creating the categories portion of the time profile Fig 3 1 17 Time Profile pop up window Rule tab NOTE See the Override Account window Category Profile sub section in this chapter for information about entries that can be made for this component of the filtering profile ...

Page 358: ...r specifying the URL to be used for redirecting users who attempt to access a site or service set up to be blocked Fig 3 1 18 Time Profile pop up window Redirect URL tab NOTE See the Override Account window Redirect URL sub section in this chapter for information about entries that can be made for this component of the filtering profile ...

Page 359: ...r Options tab is used for specifying which filter option s will be applied to the time profile Fig 3 1 19 Time Profile pop up window Filter Options tab NOTE See the Override Account window Filter Options sub section in this chapter for information about entries that can be made for this component of the filtering profile ...

Page 360: ...ngs in this window work in conjunction with those made in the Override Account window and in the Minimum Filtering Level window maintained by the global administrator Users with an override account will be able to access URLs set up to be blocked in this window if the global administrator acti vates bypass settings in the Minimum Filtering Bypass Options tab See the Override Account window in this...

Page 361: ...Ls list box To allow the URL to be accessed by the group again 1 Select the URL from the Block URLs list box 2 Click Remove To allow a URL that is blocked at the minimum filtering level to be accessed by the group 1 In the ByPass URL field enter the URL 2 Click Add to include the URL in the ByPass URLs list box To block the group s access to the URL again 1 Select the URL from the ByPass URLs list...

Page 362: ...ofiles pop up window 3 Make modifications in the default Recurrence tab and or click the tab in which to make modifications Rule Redi rect Filter Options Exception 4 Make edits in this tab and in any other tab if necessary 5 Click Apply 6 Click Close to close the Modify Time Profiles pop up window and to return to the Time Profile window Delete a Time Profile To delete a time profile 1 Select the ...

Page 363: ...Download IP Profile window The Upload Download IP Profile window displays when Upload Download IP Profile is selected from the group menu This window is used for uploading or downloading a text file containing filtering profiles of multiple users or sub groups Fig 3 1 21 Upload Download IP Profile window ...

Page 364: ...ntaining the IP profiles to be uploaded This text file of user group profiles must be entered in a specific format NOTE For examples of entries to include in a profile file go to http www 8e6 com pbahelp files 2group_ipprofiles html Once the file is selected the path displays in File field WARNING Any existing profiles will be overwritten by the contents of the uploaded file 3 Click Upload File in...

Page 365: ...Profile If profiles have been created and or uploaded to the server 1 Click Download Profile to open a browser window containing the profiles Fig 3 1 23 Download IP Profiles window The contents of this window can viewed printed and or saved 2 Click the X in the upper right corner of the window to close it ...

Page 366: ... contain spaces The first character cannot be a digit The following characters cannot be used in the name period comma colon semi colon exclamation point question mark ampersand asterisk quotation mark apostrophe grave accent mark tilde caret _ underscore pipe slash backslash double backslashes left parenthesis right paren thesis left brace right brace left bracket right bracket at sign pound sign...

Page 367: ... Fig 3 1 25 Create Individual IP box 2 Enter the Member Name for the Individual IP address NOTES The name of the individual IP address must be less than 20 characters cannot be IP NT or LDAP and cannot contain spaces The first character cannot be a digit The following characters cannot be used in the name period comma colon semi colon exclamation point question mark ampersand asterisk quotation ma...

Page 368: ... an Individual IP member to the tree list the user will be blocked from Internet access until the minimum filtering level profile is defined via the Minimum Filtering Level window The minimum filtering level is established by the global administrator Delete Group Delete a Master IP Group Profile To delete a group profile choose Delete Group from the group menu This action removes the master IP gro...

Page 369: ...e configuration settings as one that already exists A sub group can be pasted or copied to a group if the Copy Sub Group function was first performed at the sub group level Paste a Copied IP Sub Group From the group menu 1 Select Paste Sub Group to open the Paste Sub Group dialog box Fig 3 1 26 Paste Sub Group dialog box 2 In the Input sub group name field enter the name of the sub group 3 Click O...

Page 370: ...roup Sub Group includes options for creating and maintaining the filtering profile for the sub group Click the sub group s link to view a menu of sub topics Sub Group Details Members Sub Group Profile Exception URL Time Profile Delete Sub Group and Copy Sub Group Fig 3 1 27 Group screen Sub Group menu ...

Page 371: ...selected from the menu This window is used for viewing and adding or editing details on an IP group member Fig 3 1 28 Sub Group IP Group window view only View IP Sub Group Details If the sub group was previously defined the fields in the Sub Group Details frame cannot be edited The following infor mation displays Sub Group Name IP Range Member IP address and netmask or IP address range ...

Page 372: ...Sub Group IP Group window fields activated 1 In the IP Address frame click the appropriate radio button corresponding to the type of Member IP address range to be entered IP address with netmask or IP address range TIP Use the IP Range pull down menu to view the IP address es that can be entered in these fields 2 Corresponding to the selected radio button enter the IP address and specify the netma...

Page 373: ...pply to save your entries Once applied the Member fields become greyed out and the Apply button becomes deactivated see Fig 3 1 28 Members window The Members window displays when Members is selected from the menu This window is used for modifying the sub group s Member IP address Fig 3 1 30 Members window ...

Page 374: ... IP Start and End of the IP address range TIP Click Calculator to open the IP Calculator and calculate IP ranges without any overlaps 2 Click Modify to apply your settings Sub Group Profile window The Sub Group Profile window displays when Sub Group Profile is selected from the sub group menu This window is used for viewing creating the sub group s filtering profile Click the following tabs in thi...

Page 375: ...or information on entries that can be made in this window Time Profile window The Time Profile window displays when Time Profile is selected from the sub group menu This window is used for setting up or modifying a filtering profile to be activated at a specified time NOTE See the Time Profile window in the group tree section of this chapter for information on entries that can be made for the foll...

Page 376: ...if the sub group to be added has the same configuration settings as one that already exists Copy an IP Sub Group To copy configurations made for a specified sub group 1 Choose Copy Sub Group from the sub group menu 2 Select the group from the tree and choose Paste Sub Group from the group menu to paste the sub group to the group See Paste Sub Group dialog box in the Group section of this chapter ...

Page 377: ...ual IP Individual IP includes options for creating and maintaining the filtering profile for the Individual IP member Click the individual IP member s link to view a menu of sub topics Members Individual IP Profile Exception URL Time Profile Delete Individual IP Fig 3 1 31 Group screen Individual IP menu ...

Page 378: ...ember window displays when Members is selected from the menu This window is used for modifying the indi vidual IP member s IP address Fig 3 1 32 Member window Enter the IP Address of the Member In the Modify Individual Group Member frame 1 Enter the IP address in the Member field 2 Click Modify to apply your changes ...

Page 379: ...on URL window The Exception URL window displays when Exception URL is selected from the individual IP member menu This window is used for blocking the member s access to speci fied URLs and or for letting the member access specified URLs blocked at the minimum filtering level NOTE See the Exception URL window in the group tree section of this chapter for information on entries that can be made in ...

Page 380: ...SCREEN 366 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE Delete Individual IP Delete an Individual IP Member To delete an individual IP member choose Delete Individual IP from the individual IP member menu This action removes the member from the tree ...

Page 381: ...p URLs in library categories Library categories are used when creating or modifying filtering profiles Fig 3 2 1 Library screen A list of main topics displays in the navigation panel at the left of the screen Main topics in this section include the following Library Lookup and Category Groups the latter topic containing the Custom Categories sub topic which is only activated for the global adminis...

Page 382: ...ected from the navigation panel This window is used for verifying whether or not a URL or search engine keyword or keyword phrase exists in a library category Fig 3 2 2 Library Lookup window NOTE This window is also used by global administrators except their permissions let them remove URLs and search engine keywords phrases The reload library function is used after making changes to the library ...

Page 383: ... http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 decimal value format e g http 1180014290 escaped hexadecimal format e g http 57 57 57 41 44 44 49 43 54 49 4E 4 7 47 41 4D 45 53 43 4F 4D NOTE The minimum number of wildcard levels that can be entered is three e g yahoo com and the maximum number of levels is six e g mail att...

Page 384: ...ngine keyword or keyword phrase has been included in any library category 1 In the Search Engine Keyword Lookup frame enter the Search Engine Keyword or keyword phrase up to 75 alphanumeric characters 2 Click Lookup to display results in the Result Category list box showing the long name of all categories that contain the search engine keyword phrase ...

Page 385: ...s includes the ALLOW and BLOCK library categories Click either ALLOW or BLOCK to view a menu of sub topics Library Details URLs URL Keywords and Search Engine Keywords Fig 3 2 3 Library screen custom library category menu NOTE Maintaining the list of custom category URLs and keywords is the responsibility of the global administrator ...

Page 386: ...ub topics This window is used for editing the long name of the custom library category and for viewing name criteria previously entered Fig 3 2 4 Library Details window View Edit Library Details The following display and cannot be edited Custom Cate gories Group Name and library category Short Name 1 The long Description name displays and can be edited 2 After modifying the description for the lib...

Page 387: ... library category s master URL list or master wildcard URL list A URL can contain a domain name such as playboy in http www playboy com or an IP address such as 209 247 228 221 in http 209 247 228 221 A wildcard asterisk symbol followed by a period can be entered in a format such as playboy com for example to block access to all URLs ending in playboy com A URL is used in a filtering profile for b...

Page 388: ...egory To view a list of all URLs that either have been added or deleted from the master URL list or master wildcard URL list 1 Click the View tab 2 Make a selection from the pull down menu for Master List or Wild Card Master List 3 Click View List to display the specified items in the Select List list box Fig 3 2 6 URLs window View tab ...

Page 389: ...also can be entered in this field IP address e g 209 247 228 221 in http 209 247 228 221 octal format e g http 0106 0125 0226 0322 hexadecimal short format e g http 0x465596d2 hexadecimal long format e g http 0x46 0x55 0x96 0xd2 decimal value format e g http 1180014290 escaped hexadecimal format e g http 57 57 57 41 44 44 49 43 54 49 4E 4 7 47 41 4D 45 53 43 4F 4D 2 Click Add to display the associ...

Page 390: ...s that you wish to add to the category 4 Click Apply Action NOTE Wildcard URL query results include all URLs containing text following the period after the wildcard symbol For example an entry of porn com would find a URL such as http sex porn com However if a specific URL was added to a library category that is not set up to be blocked and a separate wildcard entry containing a portion of that UR...

Page 391: ...Category To remove a URL or wildcard URL from the library category 1 Click the Action tab 2 Enter the URL in the Edit URL List frame or Edit Wild Card URL List frame as pertinent 3 Click Remove to display the associated URLs in the list box below 4 Select the URL s that you wish to remove from the cate gory 5 Click Apply Action ...

Page 392: ...s 1 Click Upload Master to open the Upload Custom Library URL pop up window Fig 3 2 7 Upload Custom Library URL window 2 Click Browse to open the Choose file pop up window 3 Select the file to be uploaded TIP A URL text file must contain one URL per line WARNING The text file uploaded to the server will overwrite the current file NOTE Before the file is uploaded to the server it will first be vali...

Page 393: ...Options URLs contained in the file are listed under the column for either Valid URL or Invalid URL 5 If the file contains invalid URLs click Back to return to the Upload URL window Another attempt to validate the file can be made after corrections have been made to the file If the file contains valid URLs a Go to the IP Lookup Options section and click the radio button corresponding to the option ...

Page 394: ...s that correspond to URLs in the uploaded file will not be performed b Click Upload to open the Upload Successful pop up window NOTE In order for the URLs to take effect library categories must be reloaded Upload a Master List of Wildcard URLs To upload a master file with wildcard URL additions 1 Click Upload Wildcard Master to open the Upload Custom Library WildCard URL pop up window Fig 3 2 9 Up...

Page 395: ...erver it will first be vali dated 4 Click Upload File to display the results of the library file content validation in the Library File Content IP Lookup Options pop up window Fig 3 2 10 Library File Content IP Lookup Options Wildcard URLs contained in the file are listed under the column for either Valid URL or Invalid URL 5 If the file contains invalid wildcard URLs click Back to return to the U...

Page 396: ...dow NOTE In order for the URLs to take effect library categories must be reloaded Reload the Library After all changes have been made to library windows click Reload Library to refresh NOTE Since reloading the library utilizes system resources that impact the performance of the ProxyBlocker 8e6 recommends clicking Reload Library only after modifications to all library windows have been made ...

Page 397: ...rd from a custom library category s master list A library category uses URL keywords to block a user s access to Internet addresses containing keywords included in its list Fig 3 2 11 URL Keywords window NOTE If the feature for URL keyword filtering is not enabled in a filtering profile URL keywords can be added in this window but URL keyword filtering will not be in effect for the user s See the ...

Page 398: ...on pornographic site such as http www essex com View a List of URL Keywords To view a list of all URL keywords that either have been added or deleted 1 In the View Keyword Addition Deletion List frame make a selection from the pull down menu for Master List 2 Click View List to display the specified items in the Select List list box Add or Remove URL Keywords Add a URL Keyword to the Library Categ...

Page 399: ... the Choose file window 3 Select the file to be uploaded 4 Click Upload File to upload this file to the server NOTE A URL keywords text file must contain one URL keyword per line WARNING The text file uploaded to the server will overwrite the current file Reload the Library After all changes have been made to library windows in the Reload URL Keywords frame click Reload to refresh NOTE Since reloa...

Page 400: ...ses to and from a custom library category s master list A library category uses search engine keywords to block searches on subjects containing keywords included in its list Fig 3 2 13 Search Engine Keywords window NOTE If the feature for search engine keyword filtering is not enabled in a filtering profile search engine keywords can be added in this window but search engine keyword filtering will...

Page 401: ... word sex is set up to be blocked a search will be allowed on sexes but not sex since a search engine keyword must exactly match a word set up to be blocked View a List of Search Engine Keywords To view a list of all search engine keywords that either have been added or deleted 1 In the View Search Keyword Addition Deletion List frame make a selection from the pull down menu for Master List 2 Clic...

Page 402: ...oad Master to open the Upload Library Keyword pop up window see Fig 3 2 12 2 Click Browse to open the Choose file window 3 Select the file to be uploaded TIP A search engine keyword text file must contain one keyword phrase per line WARNING The text file uploaded to the server will overwrite the current file 4 Click Upload File to upload this file to the server Reload the Library After all changes...

Page 403: ...ARY SCREEN 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE 389 Delete Category Delete a Custom Category To delete a custom library category choose Delete Cate gory from the menu This action removes the library cate gory from the Custom Categories list ...

Page 404: ...act us by phone by email or in writing Hours Regular office hours are from Monday through Friday 8 a m to 5 p m PST After hours support is available for emergency issues only Requests for assistance are routed to a senior level techni cian through our forwarding service Contact Information Domestic United States 1 Call 1 888 786 7999 2 Select option 3 International 1 Call 1 714 282 6111 2 Select o...

Page 405: ...bers 8e6 Corporate Headquarters USA 828 West Taft Avenue Orange CA 92865 4232 USA Local 714 282 6111 Fax 714 282 6116 Domestic US 1 888 786 7999 International 1 714 282 6111 8e6 Taiwan 7 Fl No 1 Sec 2 Ren Ai Rd Taipei 10055 Taiwan R O C Taipei Local 2397 0300 Fax 2397 0306 Domestic Taiwan 02 2397 0300 International 886 2 2397 0300 ...

Page 406: ...em and attempt to resolve the issue directly If your issue needs to be escalated you will be given a ticket number for reference and a senior level technician will contact you to resolve the issue If your issue requires immediate attention such as your network traffic being affected or all blocked sites being passed you will be contacted by a senior level techni cian within one hour Your trouble t...

Page 407: ...8e6 Technologies warrants that the 8e6 product s do es not infringe on any third party copyrights or patents This warranty shall not apply to the extent that infringement is based on any misuse or modification of the hardware equip ment or software provided This warranty does not apply if the infringement is based in whole or in part on the customer s modification of the hardware equipment or soft...

Page 408: ...n can be reached by voice line Technical support information Online http www 8e6 com support html Toll Free 888 786 7999 press 3 Telephone 1 714 282 6111 press 3 E mail support 8e6 com Have the following information ready before calling tech nical support Product Description ______________________________ Purchase Date __________________________________ Extended warranty purchased ________________...

Page 409: ...l be furnished as necessary to maintain the proper operational condition of the product s If parts are discontinued from production during the Warranty Period immediate replacement product s or hardware parts will be available for exchange with defective parts from 8e6 Technologies local reseller or distributor Extended Technical Support and Service Extended technical support is available to custo...

Page 410: ...ems 1 The username or group name 2 IP address 3 Filtering profile criteria Rule number Rule0 Rule1 etc or rule criteria a Ports to Block or Filter b Categories to Block or Open c Filter Mode 4 Redirect URL optional 5 Filter Options optional For IP profiles the code 0x1 should be placed at the end with all filter options disabled 6 Quotas optional NOTE Each filtering profile should be entered on a ...

Page 411: ...ts B Filter the defined port number s I Open all ports J Open the defined port number s M Set the defined port number s to trigger a warn message Q Block all ports R Block the defined port number s Port Numbers 21 FTP File Transfer Protocol 80 HTTP Hyper Text Transfer Protocol 119 NNTP Network News Transfer Protocol 443 HTTPS Secured HTTP Transmission Other Filter Mode Values 1 Default Block Mode ...

Page 412: ...sitioned at the end of a profile string indicating that all other categories should pass PASSED When positioned at the end of a string of categories or after a category command code this code indicates that unidentified categories will follow suit with categories defined by that code J pass R block or M receive warning message Category Codes For the list of category codes short names and their cor...

Page 413: ...0x1307 should be entered at the end of the profile string unless the quota option is used in which case the quota should be entered at the end of the profile string To disable all filter codes for an IP profile enter 0x1 for the filter option Quota format To include quotas in a profile string enter them after the filter options using this format A semicolon Overall Quota minutes a comma the first ...

Page 414: ...ified time via the Configuration window See the Library screen s Configuration window and Manual Update window in the Global Group Section for more information about updating 8e6 supplied library categories NOTE In the Global Administrator Section Library screen see the Library Update Log window for information about viewing the library update log Messages in this Appendix are grouped according to...

Page 415: ...unning cannot start another traveler Installscript is running cannot start another traveler Traveler_Full_Download is running cannot start another traveler System Command Execution Run system command killCmd Failed in executing killCmd Temp Files Create tmp file getpid Write pid to tmp file Traveler failed to create the tmp file ServerConstants TRAVELER_TEMP Temp file deleted Fail to rename szFile...

Page 416: ...loading files Processing downloaded files Processing downloaded files Fail Decrypting file Decryption success A problem occurred while deleting filename HTTPS download complete filename For HTTPS downloads File does not exist on the update server Login error Could not write history file exception Could not read emergency date from emergency update file Failed to download filename Exception Finishe...

Page 417: ...urred during the Traveler process Connection is lost Finished updating library Fail to download all libraries Failed to sort the library files Started reloading library Finished reloading library Library filename does not exist Fail to encrypt category library Printstack Trace PrintstackTrace Fail to back up file for FileUrl PrintStackTrace java error message PrintstackTrace Fail to back up file f...

Page 418: ...r encounters an exception Alert emails could not be read email alert configuration file does not exist Reloading library encounters an exception Send alert encountered an exception Traveler exits after reaching time limit time limit mins Log file could not be set Exception List could not be read from file ...

Page 419: ...to download deleted category Failed to download category library Successfully downloaded category library Fail to unzip category Weekly Update has completed Summary Messages Failed to download File does not exist Failed to unzip Was not a primary language deletion file Failed to sort the library files Failed to merge files for category File is the most current version Successfully updated Checksum...

Page 420: ... full library keyword library all categories Successfully download category deletion library Fail to download category deletion library Trial itotal Fail to download category deletion library Complete Update has successfully completed IM and P2P Pattern File Update Successfully downloaded pattern Failed to download pattern IM and P2P Update has successfully completed Newsgroup Library Update News ...

Page 421: ...ly downloaded category Fail to download category Search Engine Keyword Library Update has successfully completed Patch Update Download patch Downloading patch Dated patchdate The patch has been downloaded already Successfully processed patch Failed to download patch Patch Update has completed Emergency Update Emergency update Could not read emergency date from emergency update file Emergency Updat...

Page 422: ... Modify the ProxyBlocker 1 Enable block page redirection Select either of the following options to modify the Proxy Blocker Option 1 lets you modify the back end and Option 2 lets you modify the ProxyBlocker console Option 1 Modify the back end PROS No need to set up the redirect URL for each group CONS Redirect URL must be set up in the back end LDC_http_default_redirecturl http server for block_...

Page 423: ...e placed at the default HTTP port which is 80 Since the console may not allow certain characters e g _ if such characters are used in the URL a modified name must be used instead for the blockpage As a result the ProxyBlocker will redirect the block page to the customized one with the following link format http server for block_page port for block page blockpage URL blocked url IP client IP CAT UR...

Page 424: ...ck page must be accessible via this link http server for block_page port for block page blockpage Show 8e6 s information in the block page optional The following information is passed to the blockpage through the query string Name Description Value URL Blocked URL From the query string of the block page URL IP IP that accessed the blocked URL see URL CAT Category of the blocked URL see URL USER Us...

Page 425: ...om ized block page Examples include 1 HTML using Java Script to parse post form data 2 CGI written in Perl 3 CGI written in C See the Reference portion of this appendix for coding details NOTE Don t forget to replace ProxyBlocker IP with the real IP in the HTML CGI before using these samples Part III Restart the ProxyBlocker You must restart the unit to make your changes effective Name Description...

Page 426: ...t end result i str indexOf start if i 0 len str length substr str substr i start length len start length j substr indexOf end if j 0 result substr substring 0 j else if j 0 len substr length result substr substr 0 len return result function getData str document location href len str length i str indexOf if i 0 query str substr i 1 len i 1 url parseData query URL document block URL value url ip par...

Page 427: ...nt block action http ProxyBlocker IP 81 cgi block cgi document block submit script head body form method post name block input type hidden name SITE value _BLOCK_SITE_ input type hidden name URL value input type hidden name IP value input type hidden name CAT value input type hidden name USER value input type hidden name STEP value STEP2 form br ProxyBlocker Customized Block Page HTML using Java S...

Page 428: ...for ProxyBlocker customized block page Replace the ProxyBlocker IP with the real IP before using This script provide data to the options CGI through query string Revision 1 Date 03 08 2004 method ENV REQUEST_METHOD if method post i string STDIN else string ENV QUERY_STRING url 1 if string URL S IP i ip 1 if string IP S CAT i cat 1 if string CAT S USER i user 1 if string USER S i print Content type...

Page 429: ...Replace the ProxyBlocker IP with the real IP before using This script uses Java Script to post form data to options CGI Revision 1 Date 03 08 2004 method ENV REQUEST_METHOD if method post i string STDIN else string ENV QUERY_STRING url 1 if string URL S IP i ip 1 if string IP S CAT i cat 1 if string CAT S USER i user 1 if string USER S i print Content type text html n n print html n print head n p...

Page 430: ... URL value url n print input type hidden name CAT value cat n print input type hidden name USER value user n print input type hidden name STEP value STEP2 n print br ProxyBlocker Customized Block Page CGI written with Perl using Java Script to post form data br n print URL url br n print IP ip br n print CAT cat br n print USER user br n print br For further options a href javascript do_options cl...

Page 431: ...tion prototypes void printhtml void unescape_url char url char x2c char what char makeword char line char stop void plustospace char str char fmakeword FILE f char stop int cl int to_upper char string void getquery char paramd char paramv void getnextquery char paramv int main int argc char argv int data_size size in bytes of POST input int index char paramd paramn paramv char step 120 printf cont...

Page 432: ...t a variety of global variables to be used by other areas of the program data_size atoi getenv CONTENT_LENGTH for index 0 data_size feof stdin index entries index val char fmakeword stdin data_size plustospace entries index val unescape_url entries index val entries index name char makeword entries index val if strcmp entries index name IP 0 strcpy szIP entries index val else if strcmp entries ind...

Page 433: ...s n szIP printf input type hidden name URL value s n szURL printf input type hidden name CAT value s n szCategory printf input type hidden name USER value s n szUserName printf input type hidden name STEP value STEP2 n printf br ProxyBlocker Customized Block Page CGI written with C using Java Script to post form data br n printf URL s br n szURL printf IP s br n szIP printf CAT s br n szCategory p...

Page 434: ...xdf A 10 what 0 0 digit 16 digit what 1 A what 1 0xdf A 10 what 1 0 return digit char makeword char line char stop int x 0 y char word char malloc sizeof char strlen line 1 for x 0 line x line x stop x word x line x word x 0 if line x x y 0 while line y line x return word void plustospace char str register int x for x 0 str x x if str x str x char fmakeword FILE f char stop int cl ...

Page 435: ...fgetc f if ll wsize word ll 1 0 wsize 102400 word char realloc word sizeof char wsize 1 cl if word ll stop feof f cl if word ll stop ll word ll 0 return word ll to_upper Change the string to upper case int to_upper char string int len int i char tmp NULL if string strlen string if tmp char strdup string return 0 len strlen string for i 0 i len i string i toupper tmp i free tmp ...

Page 436: ...ON APPENDIX C 422 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE return 1 void getquery char paramd char paramv if paramd NULL paramv NULL else paramv char strtok paramd void getnextquery char paramv paramv char strtok NULL ...

Page 437: ... her workstation will need to temporarily disable pop up blocking in order to authenticate him herself via the Options page Fig D 1 Options page This appendix provides instructions on how to use an over ride account if typical pop up blocking software is installed as in the following products Yahoo Toolbar Google Toolbar AdwareSafe Mozilla Firefox and Windows XP Service Pack 2 SP2 ...

Page 438: ...ton this action opens the override account pop up window Add Override Account to the White List If the override account window was previously blocked by the Yahoo Toolbar it can be moved from the black list and added to the white list so that it will always be allowed to pass To do this 1 Go to the Yahoo Toolbar and click the pop up icon to open the pop up menu Fig D 2 Select menu option Always Al...

Page 439: ...low pop ups from source 3 Select the source from the Sources of Recently Blocked Pop Ups list box to activate the Allow button 4 Click Allow to move the selected source to the Always Allow Pop Ups From These Sources list box 5 Click Close to save your changes and to close the dialog box ...

Page 440: ...taneously clicking the Override button this action opens the override account pop up window Add Override Account to the White List To add the override account window to the white list so that it will always be allowed to pass go to the Google Toolbar and click the blocked icon Fig D 4 blocked icon enabled Clicking this icon toggles to the Site pop ups allowed icon adding the override account windo...

Page 441: ...fe toolbar lets you toggle between enabling pop up blocking popups blocked and disabling pop up blocking Popup protection off by clicking the pop up icon 1 In the IE browser go to the SearchSafe toolbar and click the icon for popups blocked to toggle to Popup protec tion off This action turns off pop up blocking 2 In the Options page see Fig D 1 enter your Username and Password 3 Click the Overrid...

Page 442: ...ferences dialog box 2 Go to the Category list box and select Privacy Security Popup Windows to display the Popup Windows page Fig D 6 Mozilla Firefox Popup Windows Preferences 3 With the Block unrequested popup windows checkbox checked click Allowed Sites and enter the URL to allow the override account window to pass 4 Click OK to save your changes and to close the dialog box ...

Page 443: ... the pop up blocking feature in the IE browser Use the Internet Options dialog box 1 From the IE browser go to the toolbar and select Tools Internet Options to open the Internet Options dialog box 2 Click the Privacy tab Fig D 7 Enable pop up blocking 3 In the Pop up Blocker frame check Block pop ups 4 Click Apply and then click OK to close the dialog box ...

Page 444: ... this menu selec tion changes to Turn Off Pop up Blocker and activates the Pop up Blocker Settings menu item You can toggle between the On and Off settings to enable or disable pop up blocking Temporarily Disable Pop up Blocking 1 In the Options page see Fig D 1 enter your Username and Password 2 Press and hold the Ctrl key on your keyboard while simultaneously clicking the Override button this ac...

Page 445: ...the toolbar and select Tools Pop up Blocker Pop up Blocker Settings to open the Pop up Blocker Settings dialog box Fig D 9 Pop up Blocker Settings 2 Enter the Address of Web site to allow and click Add to include this address in the Allowed sites list box Click Close to close the dialog box The override account window has now been added to your white list 3 In the Options page see Fig D 1 enter yo...

Page 446: ...up Blocker Settings to open the Pop up Blocker Settings dialog box see Fig D 9 2 In the Notifications and Filter Level frame click the checkbox for Show Information Bar when a pop up is blocked 3 Click Close to close the dialog box Access your Override Account 1 In the Options page see Fig D 1 enter your Username and Password 2 Click the Override button This action displays the following message i...

Page 447: ...te this action opens the Allow pop ups from this site dialog box Fig D 12 Allow pop ups dialog box 5 Click Yes to add the override account to your white list and to close the dialog box NOTE To view your white list go to the Pop up Blocker Settings dialog box see Fig D 9 and see the entries in the Allowed sites list box 6 Go back to the Options page and click Override to open the override account ...

Page 448: ...eted in order for the ER to receive logs from the ProxyBlocker Entries in the ProxyBlocker Admin console 1 Choose Reporting Report Configuration to display the Report Configuration window 2 Click the 8e6 Enterprise Reporter checkbox to display the 8e6 Enterprise Reporter tab Fig E 1 Report Configuration window ER tab 3 In the Log File Transfer Configuration frame enter the LAN 1 IP address assigne...

Page 449: ...4 After the ER has been configured and logs have been transferred from the ProxyBlocker to the ER click the Log tab to view transfer activity 5 On the Log tab click View Log to view up to the last 300 lines of transfer activity in the View Log frame NOTE It is recommended you wait one to two hours after the initial configuration so sufficient data is available for viewing Fig E 2 Report Configurat...

Page 450: ... down menu choose Tools to display the Tools screen 3 From the Database Status menu choose File Watch Log 4 Click View to open the File Watch Status pop up box If logs are being transferred you will see an entry that includes the date time and IMPORTING shadow log machine1 Once you see an entry reporting information will be available one hour after the timestamp of the import listing NOTE Transfer...

Page 451: ...er supplies or fans NOTE As part of the ongoing maintenance procedure for your RAID server 8e6 recommends that you always have a spare drive and spare power supply on hand Contact 8e6 Technical Support for replacement hard drives and power supplies Part 1 Hardware Components The ProxyBlocker SL RAID server contains two hard drives two power supplies and five sets of dual cooling fans 10 in total T...

Page 452: ...rt 2 Server Interface LED indicators in SL units On an SL unit the following LED indicators for software and hardware status monitoring display on the left side of the front panel FLTR Filtering Status LIBR Library Update Status RAID Hard Drive Status UPDT Software Update Status ...

Page 453: ... uploaded or one or more processes being started Red On Not filtering traffic LIBR Green On Library updated within the past two days or less Amber On Library updated more than two days ago but within the past three days Red On Library updated more than three days ago RAID Green On RAID mode enabled and running Off RAID mode is inactive Red On Hard drive fault or failure UPDT Amber On Software upda...

Page 454: ... Overheat Fan Fail icon This LED is unlit unless the chassis is overheated A flashing red LED indicates a fan failure A steady red LED on and not flashing indicates an overheating condi tion which may be caused by cables obstructing the airflow in the system or the ambient room tem perature being too warm NIC2 icon A flashing green LED indicates net work activity on LAN2 The LED is a steady green ...

Page 455: ...ation on detecting a hard drive failure and resolving this problem Power icon The LED is unlit when the server is turned off A steady green LED indicates power is being supplied to the unit s power supplies See also Rear of chassis See Power supply failure in the Troubleshooting sub section for information on detecting a power supply failure and resolving this problem Power button When the power b...

Page 456: ... the admin istrator of the server This email identifies the failed hard drive by its number HD 1 or HD 2 Upon receiving this alert the administrator should verify the status of the drives by first going to the Hardware Failure Detection window in the Administrator console WARNING Do not attempt to remove any of the drives from the unit at this time Verification of the failed drive should first be ...

Page 457: ...lure Detection window The Hardware Failure Detection window displays the current RAID Array Status for the two hard drives HD 1 and HD 2 at the right side of the window Normally when both hard drives are functioning without failure the text OK displays to the right of the hard drive number and no other text displays in the window However if a hard drive has failed the message FAIL displays to the ...

Page 458: ...n the Administrator console go to the server to replace the drive Press the red release button to release the handle on the carrier and then extend the handle fully and pull the carrier out towards you Replace the failed drive with your spare replacement drive NOTE Contact Technical Support if you have any questions about replacing a failed hard drive ...

Page 459: ...urning your failed hard drive to 8e6 Power supply failure Step 1 Identify the failed power supply The administrator of the server is alerted to a power supply failure on the chassis by an audible alarm and an amber power supply LED or an unlit LED on the front and rear of the chassis NOTE A steady amber power supply LED also may indicate a disconnected or loose power supply cord Verify that the po...

Page 460: ...ly module towards you 3 Note that an audible alarm sounds and the LED is unlit when the power supply is disengaged Replace the failed power supply with your spare replacement power supply The alarm will turn off and the LED will be a steady green when the replacement power supply is securely locked in place Step 4 Contact Technical Support Contact Technical Support to order a new replacement power...

Page 461: ...rchandise Authorization number and for instructions on returning the unit to 8e6 A steady red LED on and not flashing indicates an over heating condition which may be caused by cables obstructing the airflow in the system or the ambient room temperature being too warm Check the routing of the cables and make sure all fans are present and operating normally The LED will remain steady as long as the...

Page 462: ...custom category Includes the ALLOW and BLOCK library categories maintained by an administrator and include URLs URL keywords and search engine keywords to be passed or blocked Group administrators manage the ALLOW and BLOCK custom library categories for their own group filter setting A setting made for a service port A service port with a filter setting uses filter settings created for library cat...

Page 463: ...ified in the library category invisible mode The ProxyBlocker uses the invisible mode to filter all connections on the Ethernet between client PCs and the Internet without stopping each IP packet on the same Ethernet segment The unit will only intercept a session if an inappropriate request was submitted by a client keyword A word or term used for accessing Internet content A keyword can be part o...

Page 464: ...ess that occurs when the Proxy Blocker attempts to resolve the IP address of the authenti cation server with the machine name of that server This continuous and regulated automated procedure ensures the connection between the two servers is maintained net use A command that is used for connecting a computer to or disconnecting a computer from a shared resource or displaying information about compu...

Page 465: ...ers and other smart devices that are linked directly to each other Using this feature of the ProxyBlocker groups and or individual client machines can be set up to block the use of P2P services specified in the library category profile string The string of characters that define a filtering profile A profile string can consist of the following components category codes service port numbers and red...

Page 466: ...network search engine A program that searches Web pages for specified keywords and returns a list of the pages or services where the keywords were found service port Service ports can be set up to blocked Examples of these ports include File Transfer Protocol FTP Hyper Text Transfer Protocol HTTP Network News Transfer Protocol NNTP Secured HTTP Transmission HTTPS and Other ports such as Secure She...

Page 467: ... address used for communi cating with all users who log on the network VLAN Virtual Local Area Network is a network of computers that may be located on different segments of a LAN but communicate as if they were on the same physical LAN segment warn setting A setting assigned to a library category or uncategorized URLs when creating a rule or when setting up a filtering profile This designation in...

Page 468: ...APPENDICES SECTION APPENDIX H 454 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE ...

Page 469: ... window 255 Admin Audit Trail window 109 Administrator menu 81 Administrator window 81 alert box terminology 4 Alert menu 112 Alert window 113 always allowed 21 definition 448 authentication 136 Authentication menu 136 B backup procedures 141 Backup Restore menu 140 Backup Restore window 140 block page 11 16 17 65 79 132 custom 408 route table 79 Block Page Authentication window 60 Block Page Cust...

Page 470: ...inimum filtering level 238 Category Weight System menu 269 Category Weight System window 269 checkbox terminology 4 Common Customization window 169 Configuration window 251 contact e mail addresses 113 Control menu 53 CPU Usage diagnostic tool 98 Ctrl key 47 Current memory usage diagnostic tool 98 custom categories 19 delete 389 Custom Categories menu 371 custom category definition 448 Customizati...

Page 471: ...l group 224 filter setting 21 definition 448 Filter window 54 filtering 398 category codes 398 hierarchy diagram 24 profile components 18 profile types 15 rules 22 search engine keyword 226 static profiles 16 URL keyword 227 Firefox 10 frame terminology 5 FTP Change Log FTP Setup 110 proxy setting 252 report configuration 295 G global administrator 1 2 add account 81 definition 448 global filterin...

Page 472: ...ogy 5 group create IP group 246 delete profile 354 global 13 IP 14 245 types of 13 group administrator 1 2 definition 449 Group Details window 315 group name definition 449 Group Profile window 328 Group screen 36 H Hardware Failure Detection window 151 Help screen 37 Help Topics 38 HTTPS 10 50 login 31 port numbers 397 proxy environment 134 HTTPS Filtering 57 I Individual IP 363 individual IP mem...

Page 473: ... in 10 Java Virtual Machine 10 JavaScript 10 K keyword definition 449 search engine 8e6 supplied category 286 search engine custom category 386 update 253 URL 8e6 supplied category 282 URL custom category 383 L LAN Settings window 73 LDAP definition 449 LED indicators 438 library full URL update 254 lookup 265 368 manual updates 253 patch update 254 search engine keywords 8e6 supplied category 286...

Page 474: ...ow 265 368 Library screen 36 Library Update Log window 257 list box terminology 5 Listening Device 131 Local Patch window 119 145 254 lock page 155 Lock Page Customization window 172 lock profile 16 profile type 17 log backup restore 147 emergency patch update 263 ER 434 library update 257 library update message 400 patch updates 124 ProxyBlocker log transfer 291 realtime traffic usage 101 log off...

Page 475: ...dow 316 359 Minimum Filtering Categories categories profile 238 minimum filtering level 20 238 bypass options 242 definition 450 Minimum Filtering Level window 238 categories profile 238 port profile 241 Mode menu 130 N name resolution definition 450 NAT definition 450 navigation panel 40 terminology 5 navigation tips 36 net use definition 450 NetBIOS definition 450 Network Address Translation NAT...

Page 476: ...tion 61 definition 451 global group 228 Google Toolbar popup blocking 426 Mozilla Firefox popup blocking 428 override popup blockers 423 profile type 17 Windows XP SP2 popup blocking 429 Yahoo Toolbar popup blocking 424 Override Account window 228 318 P P2P definition 451 password expiration 33 86 global and NT LDAP group administrator 82 override account 318 unlock IP address 91 unlock username 9...

Page 477: ... Product Warranties section 393 profile global group 218 group 328 individual IP member 365 minimum filtering level 238 sub group 360 Profile Control window 184 profile string definition 451 elements 397 protocol definition 451 Proxy Environment Settings window 134 proxy server 134 definition 451 pull down menu terminology 6 Q Quick Start Guide 31 quota definition 451 format 399 Quota Block Page C...

Page 478: ... redirect URL global group 223 refresh the GUI 47 Regional Setting window 77 Report Configuration window 291 Reporting screen 36 requirements environment 10 Reset menu 148 Reset window 148 restore download a file 143 perform a restoration 145 settings 140 Routing table diagnostic tool 97 rule 20 definition 452 Rules window 213 S Safari 10 screen terminology 6 search engine definition 452 search en...

Page 479: ...ion 452 SMTP Server Settings window 116 SNMP definition 452 SNMP window 149 Source mode 54 Stand Alone mode 54 static filtering profiles 16 Sub Group IP Group window 357 Sub Group Profile window 360 sub group 312 356 add to master IP group 352 copy 362 definition 452 delete 361 paste 355 sub topic 42 terminology 7 System Command window 94 System Performance diagnostic tool 98 system requirements 1...

Page 480: ...veler 2 254 274 400 definition 453 tree 43 44 terminology 8 Troubleshooting Mode window 103 U update add patch to server 119 emergency patches 263 library categories 257 patches 124 Updates menu 250 Upload Download IP Profile window 349 UPS 50 URL Keyword Filter Control global group filter option 227 URL keyword filtering 227 URL Keywords window 282 8e6 supplied category 282 custom category 383 UR...

Page 481: ... window 166 Warn Page Customization window 179 warn setting 21 definition 453 Web access logging 25 Web based authentication block page authentication 61 white list definition 453 wildcard 266 277 280 369 373 376 window terminology 8 workstation requirements 10 X X Strikes Blocking global group filter option 225 X Strikes Blocking window 153 ...

Page 482: ...INDEX 468 8E6 TECHNOLOGIES PROXYBLOCKER USER GUIDE ...

Reviews: