60
In addition to this, you may need to alter the sender and receiver of the email to be
different email addresses as same email addresses are commonly flagged as spoofing
techniques. Also note that when the data leaves Optinet to Black Box Network Services
Report Server, all data is encrypted. However, the transmission from Black Box Network
Services’ Report Server to the recipients is not encrypted. Nevertheless, this is the same
level of security as most common email messages sent over the Internet.
System Access tab
Optinet allows you to create multiple login accounts used to access the system. All
accounts are listed under the Manage -> System Access -> Logins menu. By default only
one account is present on the device (the admin account with a password of Black Box
Network Services).
Administrative login accounts can do anything that the default admin account can do. They
can view any report and can make any configuration changes. Another access level exists
(Read-Only) which allows users to view reports and configuration settings. However, users
with Read-Only access cannot make configuration or administrative changes to the device.
The Add/Edit Login Detail field (Manage -> System Access -> Logins -> Admin) allows you
to customize all logins with User Name, Password, First Name, Last Name, Email Address,
Admin Level (if you would like to create a login that does not have Admin Level, uncheck
the box), and Activate Login (the login will not be accessible until this option is checked).
Don’t forget to Save your changes after creating or modifying a login.
We strongly recommend that you create a new administrative login, and change the
default login password to limit access to the management interface. Select the Manage
-> System Access -> Logins link to make these changes.
Applications tab
The Applications tab is designed for expert use. This menu and submenus allow you to
customize applications and redefine default signature sets for a more tailored environment.
The default application sets provided should be sufficient for most environments.
Nonetheless, if you would like to customize signature definitions as well as Traffic Flow Rule
Sets (TFRS), you can do so under the Applications tab. The three options available under
the Applications tab are Traffic Flow Rule Sets, Applications Sets, and Applications.
Traffic Flow Rule Sets
Traffic Flow Rule Sets (TFRS) are the basic traffic identification and control engine within
Optinet. By default, TFRS define content rules and implement restrictions on identified
traffic. Optinet ships with 12 default TFRS (for more information see previous section on
Traffic Flow Rules Sets); however, you can customize TFRS using the Traffic Flow Rule Set
Manager.
For example, suppose you had a group of users that needed a variety of functions not
available in the default TFRS. Case in point would be the need to filter Web traffic (Web
Filter), deny IM Client communications (Deny IM), and block HTTPS traffic (SSL Block).