8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Size:
6.79 Mb
Download

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Fig. 5-24Range to Detect Settings window, main window

4.Click Start the Setup Wizard to display Step 1 of the Range to Detect Setup Wizard:

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

189

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Range to Detect Setup Wizard

Fig. 5-25Range to Detect Setup Wizard, Step 1

1.Enter the IP address and specify theNetmask, or enter theIndividual IP address of the source IP address(es) to be filtered.

2.Click Next to go to Step 2 of the Wizard:

190

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Fig. 5-26Range to Detect Setup Wizard, Step 2

3.An entry for this step of the Wizard is optional. If there are destination IP address(es) to be filtered, enter the IP address and specify theNetmask, or enter theIndividual IP address.

4.Click Next to go to Step 3 of the Wizard:

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

191

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Fig.5-27Range to Detect Setup Wizard, Step 3

5.An entry for this step of the Wizard is optional. If there are source IP address(es) to be ignored, enter the IP address and specify theNetmask, or enter theIndividual IP address.

6.Click Next to go to Step 4 of the Wizard:

192

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Fig.5-28Range to Detect Setup Wizard, Step 4

7.An entry for this step of the Wizard is optional. If there are destination IP address(es) to be ignored, enter the IP address and specify theNetmask, or enter theIndividual IP address.

8.Click Next to go to Step 5 of the Wizard:

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

193

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Fig.5-29Range to Detect Setup Wizard, Step 5

9.An entry for this step of the Wizard is optional. If there are ports to be excluded from filtering, enter each port number in the Individual Port field, and clickAdd.

10.Click Next to go to the final step of the Wizard:

194

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Fig.5-30Range to Detect Setup Wizard, Step 6

11. After review the contents in all list boxes, click Finish to accept all your entries.

As a result of these entries, the IP address(es) specified to be excluded will not be logged or filtered on the network.

Bypass Step 1B and go on to Step 2 to complete this process.

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

195

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

Step 1B: Block Web access via IP Sub-Groupprofile

NOTE: This step assumes that the IP Group andSub-Grouphave already been created.

1.Select the IP Sub-Groupfrom the tree.

2.Click Sub Group Profile in the pop-upmenu to display theSub Group Profile window:

Fig. 5-31Sub Group Profile window, Category tab

3.In the Category Profile page, create a custom profile by selecting categories to block, pass, or white list, and indicating whether uncategorized sites should pass or be blocked.

4.Click Apply.

196

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

5.Click the Redirect URL tab to display the Redirect URL page:

Fig. 5-32Sub Group Profile window, Redirect URL tab

6. Select “Default Block Page”, and then click Apply.

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE

197

CHAPTER 5: AUTHENTICATION DEPLOYMENT ACTIVATEAUTHENTICATION ON THENETWORK

7.Click the Filter Options tab to display the Filter Options page:

Fig. 5-33Sub Group Profile window, Filter Options tab

8. Select filter options to be enabled, and click Apply.

As a result of these entries, the machine will not be served the Authentication Request Form, and will use the default block page instead.

Go on to Step 2 to complete this process.

198

8E6 TECHNOLOGIES, R3000 ENTERPRISEFILTERAUTHENTICATIONUSERGUIDE