Version 1.01, published February 2011 for software release
3.0.00
Printed in the United States of America
This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic
medium or machine readable form without prior written consent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose.
M86 Security shall not be liable for any error or for incidental
or consequential damages in connection with the furnishing,
performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product,
the information described in this documentation is subject to
change without notice.
The latest version of this document can be obtained from
http://www.m86security.com/support/wfr/documentation.asp
Trademarks
Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies
and are the sole property of their respective manufacturers.
The M86 Security Web Filtering and Reporting Suite (WFR)
consists of the M86 Web Filter and M86 Security Reporter,
consolidated into one unit.
M86 Web Filter offers an enhanced solution for Internet
filtering on a network. The Web Filter tracks each user’s
online activity, and can be configured to block specific Web
sites or service ports, thereby protecting your organization
against lost productivity, network bandwidth issues, and
possible legal problems that can result from the misuse of
Internet resources.
Data from the Web Filter is fed into the Security Reporter
(SR), giving you the ability to interrogate massive datasets
through flexible drill-down technology, until the desired view
is obtained. This “view” can then be memorized and saved
to a user-defined report menu for repetitive, scheduled
execution and distribution. The SR also provides real time
graphical snapshots of network Internet traffic, supported by
remediation tools to manage and control user-generated
Web threats. Simply by drilling down into the easy-to-read
dashboard of gauges, you can target and halt the source of
the threat.
WFR SUITE OVERVIEW
Using the WFR Suite, threats to your network are quickly
identified, thus arming you with the capability to take immediate action to secure your network.
NOTE: The SR application can be configured to accept logs from
a M86 Secure Web Gateway (SWG) and generate security
reports. See the M86 Secure Web Gateway User Guide at http://
www.m86security.com/support/Secure-Web-Gateway/Documentation.asp for information on the SWG.
M86 SECURITY USER GUIDE1
WFR SUITE OVERVIEWHOWTO USETHIS USER GUIDE
How to Use this User Guide
Organization
This User Guide is organized into the following portions:
•WFR Suite Overview - This portion introduces the WFR
product and explains how to use the WFR console and
this user guide, and provides information on how to
contact M86 Security technical support.
• Web Filter (WF) - Refer to this portion for information on
configuring and maintaining the Web Filter application.
• Security Reporter (SR) - Refer to this portion for infor-
mation on configuring and using the SR application to
generate reports.
•WFR Appendices - Appendix I explains how to disable
pop-up blocking software. Appendix II provides information on how to perform hardware maintenance and troubleshoot RAID on the 300 series and 500 series WFR
chassis.
•Index - The index lists subjects and the first page
numbers where they appear in this user guide.
2M86 SECURITY USER GUIDE
Conventions
The following icons are used throughout this user guide:
NOTE: The “note” icon is followed by italicized text providing
additional information about the current topic.
TIP: The “tip” icon is followed by italicized text giving you hints on
how to execute a task more efficiently.
WARNING: The “warning” icon is followed by italicized text
cautioning you about making entries in the application, executing
certain processes or procedures, or the outcome of specified
actions.
IMPORTANT: The "important" icon is followed by italicized text
informing you about important information or procedures to follow
to ensure maximum uptime on the WFR Server.
WFR SUITE OVERVIEWHOWTO USETHIS USER GUIDE
M86 SECURITY USER GUIDE3
WFR SUITE OVERVIEWCOMPONENTSAND ENVIRONMENT
Components and Environment
Components
Hardware
•High performance server equipped with RAID
•Two or four high-capacity hard drives
•Optional: One or more attached “NAS” storage devices
•Administrator User Interface (UI) console utilized by an
authorized administrator to configure and maintain the
WFR server
•MySQL database
4M86 SECURITY USER GUIDE
Environment
Network Requirements
• Power connection protected by an Uninterruptible Power
Supply (UPS)
• HTTPS connection to M86 Security’s software update
server
•SR must be be fully configured, and the Structured Query
Language (SQL) server must be installed on the network
and connected to the Web access logging device(s) (e.g.
Web Filter(s) and Secure Web Gateway—the latter
device, if an SWG will be used with the SR)
• High speed access to the WFR server by authorized
client workstations
•Internet connectivity for downloading Java virtual
machine, if not already installed
WFR SUITE OVERVIEWCOMPONENTSAND ENVIRONMENT
•Port 1443 must be available for the Web Filter user inter-
face to use, and ports 8443 and 8843 must be available
for the SR user interface to use
NOTE: Administrators must be set up with software installation
privileges in order to install Java used for accessing the Web
Filter user interface.
Administrator Workstation Requirements
System requirements for the administrator include the
following:
•Windows XP, Vista, or 7 operating system running:
• Internet Explorer (IE) 7.0 or 8.0
• Firefox 3.6
•Macintosh OS X Version 10.5 or 10.6 running:
M86 SECURITY USER GUIDE5
WFR SUITE OVERVIEWCOMPONENTSAND ENVIRONMENT
• Safari 4.0
• Firefox 3.6
•JavaScript enabled
•Java Virtual Machine
•Java Plug-in (minimum version 1.6.0_17, maximum
version 1.6.0_21)
NOTE: Java 1.6.0_22 and later are incompatible with this software release.
TIP: See http://www.m86security.com/software/8e6/hlp/ifr/
files/5help_java.html for information about identifying the
version of Java on your machine and downloading the latest
version.
•Pop-up blocking software, if installed, must be disabled
•Session cookies from the WFR server must be allowed in
order for the Administrator consoles to function properly
NOTES: Information about disabling pop-up blocking software
can be found in WFR Appendix I: Disable Pop-up Blocking Software.
End User Workstation Requirements
System requirements for the end user include the following:
•Windows XP, Vista, or 7 operating system running:
• Internet Explorer (IE) 7.0 or 8.0
• Firefox 3.6
•Macintosh OS X Version 10.5 or 10.6 running:
• Safari 4.0
• Firefox 3.6
•JavaScript enabled
•Pop-up blocking software, if installed, must be disabled
6M86 SECURITY USER GUIDE
WFR SUITE OVERVIEWHOWTO USETHE WFR ONTHE WEB
How to Use the WFR on the Web
Initial Setup
To initially set up your M86 Web Filter and Reporter (WFR)
server, the administrator installing the unit should follow the
instructions in the M86 WFR Installation Guide, the booklet
packaged with your WFR unit. This guide explains how to
perform the initial configuration of the server so that it can
be accessed via an IP address or host name on your
network.
NOTE: If you do not have the M86 WFR Installation Guide,
contact M86 Security immediately to have a copy sent to you.
WARNING: In order to prevent data from being lost or corrupted
while the WFR server is running, the server should be connected
to a UPS or other battery backup system. Once you turn on the
WFR server, DO NOT interrupt the initial boot-up process. This
process may take from five to 10 minutes per drive. If the process
is interrupted, damage to key files may occur.
Access the WFR Welcome Window
After the WFR unit is set up on the network, the designated
global administrator of the server should be able to access
the unit via its URL on the Internet, using the user name and
password registered during the Wizard hardware installation procedures.
1. Launch an Internet browser window supported by the
WFR.
2. In the address line of the browser window, type in
“https://” and the WFR server’s IP address or host name,
and use port number “:1443” for a secure network
connection.
For example, if your IP address is 210.10.131.34, type in
https://210.10.131.34:1443. Using a host name
M86 SECURITY USER GUIDE7
WFR SUITE OVERVIEWHOWTO USETHE WFR ONTHE WEB
example, if the host name is logo.com, type in https://logo.com:1443.
With a secure connection, the first time you attempt to
access the WFR’s user interface in your browser you will
be prompted to accept the security certificate. In order to
accept the security certificate for your browser, follow the
instructions at: http://www.m86security.com/software/
8e6/docs/ig/misc/sec-cert-wfr3.0.pdf
3. Click Go to open the Welcome window of the WFR user
interface:
Fig. 1:1-1 WFR Welcome window
Using this portal you can click the icon corresponding to
Web Filter or Security Reporter to access the user interface of that application, as described in the following
sections of this user guide.
However, by logging into the SR Report Manager as the
global administrator—as described on the next page—
you will have access to the Web Filter, SR Report
Manager and SR System Configuration administrator
console on the WFR server, without needing to use this
WFR Welcome portal to individually log into the two main
applications.
8M86 SECURITY USER GUIDE
WFR SUITE OVERVIEWHOWTO USETHE WFR ONTHE WEB
Single Sign-On Access
Access all applications from the SR UI
Single Sign-On (SSO) access eliminates the process of
choosing either the Web Filter or SR application from the
WFR Welcome window, and then logging in to each application separately.
To enable SSO, be sure the same username and password
combination set up in the wizard hardware installation
process is saved in the Web Filter (System > Administrator—‘Admin’ account type profile). Also be sure the host
name for the WFR is entered in the hosts file.
To use the single sign-on option:
1. Log in to SR using the Wizard username and password.
2. Go to the navigation links at the top of the Report
Manager panel and select:
• Administration >System Configuration to access
the SR administrator console
• Administration >Web Filter > (IP address) to
access the Web Filter user interface
M86 SECURITY USER GUIDE9
WFR SUITE OVERVIEWHOWTO USETHE WFR ONTHE WEB
Default Usernames and Passwords
Without setting up single sign-on access for the global
administrator account, default usernames and passwords
for WFR applications are as follows:
ApplicationUsernamePassword
Web Filteradminuser3
Security Reporteradmintestpass
Note that since the default username for both the Web Filter
and Security Reporter are identical (admin), but the passwords are dissimilar, the SSO feature will not function.
Thus, in order to use SSO, M86 recommends setting up an
administrator account in the Web Filter that matches the
global administrator account set up in the SR (Administration > Admin Profiles).
Technical Support / Product Warranties
For technical assistance or warranty repair, please visit
http://www.m86security.com/support/ .
10M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONWEB FILTER
W
EB
F
ILTER INTRODUCTORY
S
ECTION
Web Filter
M86 Security’s Web Filter tracks each user’s online activity,
and can be configured to block specific Web sites, service
ports, and pattern and file types, and lock out an end user
from Internet access, thereby protecting your organization
against lost productivity, network bandwidth issues, and
possible legal problems that can result from the misuse of
Internet resources.
The Web Filter provides an extensive library filtering category database, user authentication, implementation of time
and quota filtering profiles, and tools for tailoring a user’s
filtering profile to comply with your organization’s Internet
usage policy, based on the end user’s Internet usage habits.
About this Portion of the User Guide
The Web Filter portion of the user guide primarily addresses
the network administrator designated to configure and
manage the server on the network. This administrator is
referred to as the “global administrator” throughout this
portion of the user guide. In part, this portion of the user
guide also addresses administrators who manage user
groups on the network. These administrators are referred to
as “group administrators” throughout this portion of the user
guide.
See the M86 Web Filter Authentication User Guide at
http://www.m86security.com/support/wf/documentation.asp for information on authentication.
This portion of the user guide is organized into the following
sections:
M86 SECURITY USER GUIDE11
WEB FILTER INTRODUCTORY SECTIONABOUTTHIS PORTIONOFTHE USER GUIDE
• Web Filter Introductory Section - This section is
comprised of an overview on filtering, Web access
logging, instant messaging and peer-to-peer blocking,
and synchronizing multiple Web Filter units. This section
also provides information on how to use this portion of
the user guide to help you configure the Web Filter.
• WF Global Administrator Section - This section
includes information for the global administrator—who
has all rights and permissions on the Web Filter—to
create group administrator accounts, and to configure
the Web Filter for filtering the entire network.
• WF Group Administrator Section - This section
includes information for administrators authorized by the
global administrator to manage profiles of designated
groups and their associated users on the Web Filter.
Group administrators also have rights to access certain
library category functions.
• Web Filter Appendices Section - Appendix A includes
formats and rules used in the filtering profile file.
Appendix B includes information on creating a customized block page. Appendix C provides tips on how to
override pop-up windows with pop-up blocker software
installed. Appendix D explains how to install, configure,
and use the Mobile Client. Appendix E features a glossary of technical terminology used in this portion of the
user guide.
12M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONABOUTTHIS PORTIONOFTHE USER GUIDE
Terminology
The following terms are used throughout this user guide.
Sample images (not to scale) are included for each item.
• alert box - a message box
that opens in response to
an entry you made in a
dialog box, window, or
screen. This box often
contains a button (usually labeled “OK”) for you to click in
order to confirm or execute a command.
• button - an object in a dialog box,
window, or screen that can be clicked
with your mouse to execute a command.
• checkbox - a small square in a dialog
box, window, or screen used for indicating whether or not you wish to select an option. This
object allows you to toggle between two choices. By
clicking in this box, a check mark or an “X” is placed, indicating that you selected the option. When this box is not
checked, the option is not selected.
• dialog box - a box that
opens in response to a
command made in a
window or screen, and
requires your input. You
must choose an option by clicking a button (such as
“Yes” or “No”, or “Next” or “Cancel”) to execute your
command. As dictated by this box, you also might need
to make one or more entries or selections prior to clicking
a button.
• field - an area in a dialog box,
window, or screen that either
accommodates your data entry, or displays pertinent
information. A text box is a type of field.
M86 SECURITY USER GUIDE13
WEB FILTER INTRODUCTORY SECTIONABOUTTHIS PORTIONOFTHE USER GUIDE
• frame - a boxed-in area in a dialog
box, window, or screen that
includes a group of objects such as
fields, text boxes, list boxes,
buttons, radio buttons, checkboxes, and/or tables. Objects within a frame belong to a
specific function or group. A frame often is labeled to indicate its function or purpose.
• grid - an area in
a frame that
displays rows
and columns of
data, as a result of various processes. This data can be
reorganized in the Administrator console, by changing
the order of the columns.
• list box - an area in a dialog box,
window, or screen that accommodates and/or displays entries of
items that can be added or removed.
• navigation panel - the panel that
displays at the left of a screen. This
panel can contain links that can be
clicked to open windows or dialog boxes
at the right of the screen. One or more
tree lists also can display in this panel.
When an item in the tree list is clicked,
the tree list opens to reveal items that
can be selected.
14M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONABOUTTHIS PORTIONOFTHE USER GUIDE
• pop-up box or pop-up
window - a box or window
that opens after you click a
button in a dialog box,
window, or screen. This box
or window may display information, or may require you
to make one or more entries.
Unlike a dialog box, you do not need to choose between
options.
• pull-down menu - a field in a
dialog box, window, or screen
that contains a down-arrow to the right. When you click
the arrow, a menu of items displays from which you make
a selection.
• radio button - a small, circular object in
a dialog box, window, or screen used
for selecting an option. This object allows you to toggle
between two choices. By clicking a radio button, a dot is
placed in the circle, indicating that you selected the
option. When the circle is empty, the option is not
selected.
• screen - a main
object of an application that
displays across
your monitor. A
screen can
contain panels,
windows, frames,
fields, tables, text
boxes, list boxes, icons, buttons, and radio buttons.
M86 SECURITY USER GUIDE15
WEB FILTER INTRODUCTORY SECTIONABOUTTHIS PORTIONOFTHE USER GUIDE
• sub-topic - a subset
of a main topic that
displays as a menu
item for the topic. The
menu of sub-topics
opens when a pertinent topic link in the left panel—the navigation panel—of
a screen is clicked. If a sub-topic is selected, the window
for that sub-topic displays in the right panel of the screen,
or a pop-up window or an alert box opens, as appropriate.
• text box - an area in a dialog box, window, or screen that
accommodates your data entry. A text box is a type of
field. (See “field”.)
• topic - a
topic
displays as
a link in the
left panel—
the navigation panel—
of a screen.
By clicking
the link for a
topic, the
window for that topic displays in the right panel of the
screen, or a menu of sub-topics opens.
16M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONABOUTTHIS PORTIONOFTHE USER GUIDE
• tree - a tree displays in the navigation panel of a screen, and is
comprised of a hierarchical list of
items. An entity associated with a
branch of the tree is preceded by a
plus (+) sign when the branch is
collapsed. By double-clicking the
item, a minus (-) sign replaces the
plus sign, and any entity within that
branch of the tree displays. An item
in the tree is selected by clicking it.
• window - a window displays on
a screen, and can contain
frames, fields, text boxes, list
boxes, buttons, checkboxes,
and radio buttons. A window for
a topic or sub-topic displays in
the right panel of the screen.
Other types of windows include
pop-up windows, login
windows, or ones from the
system such as the Save As or
Choose file windows.
M86 SECURITY USER GUIDE17
WEB FILTER INTRODUCTORY SECTIONOVERVIEW
Overview
The Web Filter’s Administrator console is used by the global
administrator—and group administrator, as required—to
configure the Web Filter to perform the following basic functions:
• filter URLs (Web addresses) on the Internet
• log traffic on the Internet
and, if applicable for your organization:
• block instant messaging and peer-to-peer services
• authenticate users via the existing authentication system
on the network
NOTE: See the M86 Web Filter Authentication User Guide at
http://www.m86security.com/support/wf/documentation.asp
for information on setting up and using authentication.
• synchronize multiple Web Filter units so that all servers
will be updated with the same user profile and library
configurations
To help you become familiar with the Web Filter and how it
functions on the network, Chapter 1 of this section of the
User Guide provides an overview on filtering. Chapter 2
gives insight into Web site access logging, and instant
messaging and peer-to-peer setup procedures. Chapter 3
features information on synchronizing multiple Web Filter
units. Chapter 4 includes details on getting started, with log
in and log out procedures, and tips on navigating the Administrator console.
18M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Chapter 1: Filtering Operations
Operational Modes
Based on the setup of your network, the Web Filter can be
configured to use one of these operational modes for
filtering the network:
• invisible mode
• router mode
• firewall mode
M86 SECURITY USER GUIDE19
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Invisible Mode
If the Web Filter is set up in the invisible mode, the unit will
filter all connections on the Ethernet between client PCs and
the Internet, without stopping each IP packet on the same
Ethernet segment. The unit will only intercept a session if an
inappropriate request was submitted by a client. In this
scenario, the Web Filter returns a message to the client and
server to deny the request, and a block page displays to
deny the client access to the site or service.
Figure 1:1-1 depicts the invisible mode that removes the
Web Filter from any inclusion in the network connection
path.
Fig. 1:1-1 Pass-by filtering diagram
20M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
When users (Client PCs) make Internet requests, the traffic
flows (1) through the network path without interruption. The
Web Filter captures the request as the user’s request (2)
leaves the network. The Web Filter then determines the
action (3) to either block or pass the request. If the Web
Filter determines to block the user’s request, a block
message (4) is sent to the user plus a terminate message
(4) is sent to the Internet server.
A Web Filter set up in the invisible mode can also work in the
router mode. Figure 1:1-2 illustrates an example of a
monitor mode setup, with the Web Filter connected to the
managed switching hub. In this setup, the Web Filter port is
configured with the port monitoring function enabled, so that
the Web Filter’s port mirrors the port connected to the
router.
Fig. 1:1-2 Invisible mode diagram, with port monitoring
In the invisible mode, the Web Filter performs as a standalone server that can be connected to any network environment.
M86 SECURITY USER GUIDE21
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Router Mode
If the Web Filter is set up in the router mode, the unit will act
as an Ethernet router, filtering IP packets as they pass from
one card to another. While all original packets from client
PCs are allowed to pass, if the Web Filter determines that a
request is inappropriate, a block page is returned to the
client to replace the actual requested Web page or service.
Since only outgoing packets need to be routed—and not
return packets—the Web Filter only appears in the outgoing
path of the network.
Figure 1:1-3 illustrates an example of the router mode
setup, in which the Web Filter is set up to act as the Internet
router.
Fig. 1:1-3 Router mode diagram
As previously mentioned, a Web Filter set up in the router
mode can also work in the invisible mode. The router mode
setup also will work in the firewall mode.
22M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
WARNING: M86 recommends contacting one of our solutions
engineers if you need assistance with router mode setup procedures.
Firewall Mode
The firewall mode is a modification of the router mode. With
the Web Filter set up in this mode, the unit will filter all
requests. If the request is appropriate, the original packet
will pass unchanged. If the request is inappropriate, the
original packet will be blocked from being routed through.
Using the firewall mode, while the outgoing request is
delayed slightly—to allow filtering to take place before the
packet leaves the gateway router of the network—return
traffic remains unaffected.
Fig. 1:1-4 Firewall mode diagram, with firewall and cache setup
M86 SECURITY USER GUIDE23
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
The firewall mode cannot be used with any other mode
(invisible or router).
Figure 1:1-4 illustrates an example of a firewall mode setup
in which requests are never sent to the caching server. In
this scenario the local caching proxy will not affect the Web
Filter—even if the server contains unfiltered, “bad” cached
pages—since no request can pass until it is filtered.
Figure 1:1-5 illustrates an example of a firewall mode setup
in which requests are always sent to the caching server. In
this scenario the Web Filter will be affected if the caching
proxy server contains unfiltered, “bad” cached pages. M86
recommends that cached content is cleared or expired after
installing the Web Filter.
WARNING: Contact a solutions engineer at M86 Security for
setup procedures if you wish to use the firewall mode.
Fig. 1:1-5 Firewall mode diagram, with filtering and cache setup
24M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Group Types
After the operational filtering mode is configured on the Web
Filter, the group type(s) that will be used on the Web Filter
must be set up so that filtering can take place.
In the Policy section of the Administrator console, group
types are structured in a tree format in the navigation panel.
The global administrator can access the Global Group and
IP groups in the tree. The group administrator can only
access the designated IP group to be maintained.
NOTES: If authentication is enabled, the global administrator can
also access the LDAP branch of the tree.
If multiple Web Filter units are set up on the network and the
synchronization feature is used, a Web Filter that is set up to
receive profile changes will only display the Global Group type in
the tree list. (See Chapter 3: Synchronizing Multiple Units for
more information on synchronization.)
Global Group
The first group that must be set up is the global group,
represented in the tree structure by the global icon.
The filtering profile created for the global group represents
the default profile to be used by all groups that do not have
a filtering profile, and all users who do not belong to a group.
M86 SECURITY USER GUIDE25
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
IP Groups
The IP group type is represented in the tree by the IP icon
. A master IP group is comprised of sub-group members
and/or individual IP members .
The global administrator adds master IP groups, adds and
maintains override accounts at the global level, and establishes and maintains the minimum filtering level.
The group administrator of a master IP group adds subgroup and individual IP members, override account, time
profiles and exception URLs, and maintains filtering profiles
of all members in the master IP group.
Fig. 1:1-6 IP diagram with a sample master IP group and its members
26M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Filtering Profile Types
A filtering profile is used by all users who are set up to be
filtered on the network. This profile consists of rules that
dictate whether a user has access to a specified Web site or
service on the Internet.
The following types of filtering profiles can be created,
based on the setup in the tree menu of the Policy section of
the console:
Global Group
• global filtering profile - the default filtering profile positioned at the base of the hierarchical tree structure, used
by end users who do not belong to a group.
IP group (master group)
•master group filtering profile - used by end users who
belong to the master group.
•master time profile - used by master group users at a
specified time.
IP group member
• sub-group filtering profile - used by a sub-group
member.
•individual filtering profile - used by an individual IP
group member.
•time profile - used by a sub-group/individual IP group
member at a specified time.
Other filtering profiles
•authentication profile - used by LDAP group members.
This type of profile includes the workstation profile.
NOTE: For information about authentication filtering profiles, see
the M86 Web Filter Authentication User Guide.
M86 SECURITY USER GUIDE27
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
•override account profile - set up in either the Global
Group section or the master IP group section of the
console.
•lock profile - set up under X Strikes Blocking in the Filter
Options section of the profile.
•Radius profile - used by end users on a Radius
accounting server if the Radius server is connected to
the Web Filter and the Radius authentication feature
enabled.
•TAR profile - used by the Threat Analysis Reporter
(TAR) module if an end user is locked out by TAR when
attempting to access blocked content in a library category.
28M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Static Filtering Profiles
Static filtering profiles are based on fixed IP addresses and
include profiles for master IP groups and their members.
Master IP Group Filtering Profile
The master IP group filtering profile is created by the global
administrator and is maintained by the group administrator.
This filtering profile is used by members of the group—
including sub-group and individual IP group members—and
is customized to allow/deny users access to URLs, or warn
users about accessing specified URLs, to redirect users to
another URL instead of having a block page display, and to
specify usage of appropriate filter options.
IP Sub-Group Filtering Profile
An IP sub-group filtering profile is created by the group
administrator. This filtering profile applies to end users in an
IP sub-group and is customized for sub-group members.
Individual IP Member Filtering Profile
An individual IP member filtering profile is created by the
group administrator.This filtering profile applies to a specified end user in a master IP group.
M86 SECURITY USER GUIDE29
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Active Filtering Profiles
Active filtering profiles include the Global Group Profile,
Override Account profile, Time Profile, and Lock profile.
NOTE: For information about authentication filtering profiles, see
the M86 Web Filter Authentication User Guide.
Global Filtering Profile
The global filtering profile is created by the global administrator. This profile is used as the default filtering profile. The
global filtering profile consists of a customized profile that
contains a list of library categories to block, open, add to a
white list, or assign a warn setting, and service ports that are
configured to be blocked. A URL can be specified for use
instead of the standard block page when users attempt to
access material set up to be blocked. Various filter options
can be enabled.
Override Account Profile
If any user needs access to a specified URL that is set up to
be blocked, the global administrator or group administrator
can create an override account for that user. This account
grants the user access to areas set up to be blocked on the
Internet.
Time Profile
A time profile is a customized filtering profile set up to be
effective at a specified time period for designated users.
Lock Profile
This filtering profile blocks the end user from Internet access
for a set period of time, if the end user’s profile has the X
Strikes Blocking filter option enabled and he/she has
received the maximum number of strikes for inappropriate
Internet usage.
30M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Filtering Profile Components
Filtering profiles are comprised of the following components:
• library categories - used when creating a rule, minimum
filtering level, or filtering profile for the global group or any
entity
• service ports - used when setting up filter segments on
the network, creating the global group (default) filtering
profile, or establishing the minimum filtering level
• rules - specify which library categories should be
blocked, left open (a set number of minutes in which that
category remains open can be defined), assigned a warn
setting, or white listed
• filter options - specify which features will be enabled: X
Strikes Blocking, Google/Bing/Yahoo!/Ask/AOL Safe
Search Enforcement, Search Engine Keyword Filter
Control, URL Keyword Filter Control
• minimum filtering level - takes precedence over
filtering profiles of entities who are using a filtering profile
other than the global (default) filtering profile
• filter settings - used by service ports, filtering profiles,
rules, and the minimum filtering level to indicate whether
users should be granted or denied access to specified
Internet content
M86 SECURITY USER GUIDE31
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Library Categories
A library category contains a list of Web site addresses and
keywords for search engines and URLs that have been set
up to be blocked or white listed. Library categories are used
when creating a rule, the minimum filtering level, or a
filtering profile.
M86 Supplied Categories
M86 furnishes a collection of library categories, grouped
under the heading “Category Groups” (excluding the
“Custom Categories” group). Updates to these categories
are provided by M86 on an ongoing basis, and administrators also can add or delete individual URLs within a specified library category.
Custom Categories
Custom library categories can be added by either global or
group administrators. As with M86 supplied categories,
additions and deletions can be made within a custom category. However, unlike M86 supplied categories, a custom
category can be deleted.
NOTE: M86 cannot provide updates to custom categories. Maintaining the list of URLs and keywords is the responsibility of the
global or group administrator.
32M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Service Ports
Service ports are used when setting up filter segments on
the network (the range of IP addresses/netmasks to be
detected by the Web Filter), the global (default) filtering
profile, and the minimum filtering level.
When setting up the range of IP addresses/netmasks to be
detected, service ports can be set up to be open (ignored).
When creating the global filtering profile and the minimum
filtering level, service ports can be set up to be blocked or
filtered.
Examples of service ports that can be set up include File
Transfer Protocol (FTP), Hyper Text Transfer Protocol
(HTTP), Network News Transfer Protocol (NNTP), Secured
HTTP Transmission (HTTPS), and Secure Shell (SSH).
Rules
A rule is comprised of library categories to block, leave
open, assign a warn setting, or include in a white list.
Access to an open library category can be restricted to a set
number of minutes. Each rule that is created by the global
administrator is assigned a number. A rule is selected when
creating a filtering profile for an entity.
Minimum Filtering Level
The minimum filtering level consists of library categories set
up at the global level to be blocked or opened, and service
ports set up to be blocked or filtered. If the minimum filtering
level is created, it applies to all users in IP groups, and takes
precedence over filtering settings made for group and user
filtering profiles.
The minimum filtering level does not apply to any user who
does not belong to a group, and to groups that do not have
a filtering profile established.
M86 SECURITY USER GUIDE33
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
NOTE: If the minimum filtering level is not set up, global (default)
filtering settings will apply instead.
If an override account is established at the IP group level for
a member of a master IP group, filtering settings made for
that end user will override the minimum filtering level if the
global administrator sets the option to allow the minimum
filtering level to be bypassed. An override account established at the global group level will automatically bypass the
minimum filtering level.
Filter Settings
Categories and service ports use the following settings to
specify how filtering will be executed:
• block - if a category or a service port is given a block
setting, users will be denied access to the URL set up as
“blocked”
• open - if a category or the filter segment detected on the
network is given an open (pass) setting, users will be
allowed access to the URL set up as “opened”
NOTE: Using the quota feature, access to an open category can
be restricted to a defined number of minutes.
•always allowed - if a category is given an always
allowed setting, the category is included in the user’s
white list and takes precedence over blocked categories
NOTE: A category that is allowed will override any blocked
settings except if the minimum filtering level is set to block that
category.
•warn - If a category is given a warn setting, a warning
page displays for the end user to warn him/her that
accessing the intended URL may be against established
policies and to proceed at his/her own risk
34M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
• filter - if a service port is given a filter setting, that port will
use filter settings created for library categories (block or
open settings) to determine whether users should be
denied or allowed access to that port
• ignore - if the filter segment detected on the network has
a service port set up to be ignored, that service port will
be bypassed
Filtering Rules
Filtering Levels Applied
1. The global (default) filtering profile applies to any user
who does not belong to a master IP group.
2. If the minimum filtering level is defined, it applies to all
master IP groups and members assigned filtering
profiles. The minimum filtering level combines with the
user’s profile to guarantee that categories blocked in the
minimum filtering level are blocked in the user’s profile.
3. For master IP group members:
a. A master IP group filtering profile takes precedence
over the global profile.
b. A master IP group time profile takes precedence over
the master IP group profile.
4. For IP sub-group members:
a. An IP sub-group filtering profile takes precedence over
the master IP group’s time profile.
b. An IP sub-group time profile takes precedence over
the IP sub-group profile.
5. For individual IP members:
a. An individual IP member filtering profile takes prece-
dence over the IP sub-group’s time profile.
M86 SECURITY USER GUIDE35
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
b. An individual IP member time profile takes precedence
over the individual IP member profile.
6. An authentication (LDAP) profile—this includes a workstation profile—takes precedence over an individual IP
member’s time profile.
NOTE: A Radius profile is another type of authentication profile
and is weighted the same as LDAP authentication profiles in the
precedence hierarchy.
7. A Threat Analysis Reporter (TAR) profile is a type of
lockout profile used by the TAR module in the SR application. The TAR low level lockout profile takes precedence over an authentication profile or a time profile
profile, locking out the end user from library categories
specified in the lockout profile in the TAR module.
8. An override account profile takes precedence over a TAR
lockout profile. This account may override the minimum
filtering level—if the override account was set up in the
master IP group tree, and the global administrator allows
override accounts to bypass the minimum filtering level,
or if the override account was set up in the Global Group
tree.
NOTE: An override account set up in the master group section of
the console takes precedence over an override account set up in
the Global Group section of the console.
9. An X Strikes lockout profile takes precedence over all
filtering profiles. This profile is set up under Filter
Options, by enabling the X Strikes Blocking feature.
36M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 1: FILTERING OPERATIONS
Fig. 1:1-7 Sample filtering hierarchy diagram
M86 SECURITY USER GUIDE37
WEB FILTER INTRODUCTORY SECTIONCHAPTER 2: LOGGINGAND BLOCKING
Chapter 2: Logging and Blocking
Web Access Logging
One of the primary functions of the Web Filter is to log the
activity of users on the Internet. Information captured in the
log can be transferred to a reporting appliance, to be viewed
on a PC monitor or output to a printer.
Log files from the Web Filter are transferred to the SR where
they are “normalized” and then inserted into a MySQL database. The SR Report Manager accesses that database to
generate queries and reports.
Instant Messaging, Peer-to-Peer Blocking
The Web Filter has options for blocking and/or logging the
use of Instant Messaging and Peer-to-Peer services, and
makes use of Intelligent Footprint Technology (IFT) for
greatly increasing management and control of these
popular—yet potentially harmful—applications. This section
explains how to set up and use IM and P2P.
How IM and P2P Blocking Works
IM Blocking
Instant Messaging (IM) involves direct connections between
workstations either locally or across the Internet. Using this
feature of the Web Filter, groups and/or individual client
machines can be set up to block the use of IM services
specified in the library category.
When the IM module is loaded on the server, the Web Filter
compares packets on the network with IM libraries stored on
the Web Filter. If a match is found, the Web Filter checks the
user’s profile to see whether the user’s connection to the IM
38M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 2: LOGGINGAND BLOCKING
service should be blocked, and then performs the appropriate action.
WARNING: The following items are known issues pertaining to
the IM module:
• IM can only block by destination IP address if network traffic is
being tunneled, sent through a Virtual Private Network (VPN),
or encrypted.
• IM will not be blocked if a client-side VPN is set up to proxy
traffic through a remote IP address outside the connection
protected by the Web Filter.
• Some versions of the AOL client create a network interface that
send a network connection through a UDP proxy server, which
prevents blocking IM.
P2P Blocking
Peer-to-Peer (P2P) involves communication between
computing devices—desktops, servers, and other smart
devices—that are linked directly to each other. Using this
feature of the Web Filter, groups and/or individual client
machines can be set up to block the use of P2P services
specified in the library category.
When the P2P module is loaded on the server, the Web
Filter compares packets on the network with the P2P library
stored on the Web Filter. If a match is found, the Web Filter
checks the user’s profile to see whether the user’s connection to the P2P service should be blocked, and then
performs the appropriate action.
M86 SECURITY USER GUIDE39
WEB FILTER INTRODUCTORY SECTIONCHAPTER 2: LOGGINGAND BLOCKING
Setting up IM and P2P
IM and P2P are set up in the System and Library sections of
the Administrator console.
1. In the System section, activate Pattern Blocking in the
Filter window.
2. In the Library section, note the services set up to be
blocked, as defined at: http://www.m86security.com/software/8e6/hlp/ifr/files/1system_im_block.html.
NOTE: Please contact an M86 technical support representative
or a solutions engineer if access is needed to one or more P2P
services blocked by M86's supplied library category for P2P.
3. In the Manual Update to M86 Supplied Categories
window (accessible via Library > Updates > Manual
Update), IM pattern files can be updated on demand.
Using IM and P2P
To solely log IM and/or P2P user activity, the Pattern
Blocking setting needs to be enabled in the Filter window.
To additionally block specified groups and/or users from
using components and features of IM and/or P2P, settings
need to be made in the Policy section of the Administrator
console.
If applying M86’s supplied IM and/or P2P library category to
an entity’s profile, all IM and/or P2P services included in that
category will be blocked.
NOTE: If IM and/or P2P was set up to be blocked while a user’s
IM and/or P2P session was in progress, the user will not be
blocked from using that service until he/she logs off the server
and back on again.
40M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 2: LOGGINGAND BLOCKING
Block IM, P2P for All Users
Block IM for All Users
To block IM for all users on the network:
• the Pattern Blocking option in the Filter window must be
activated
• the global filtering profile must have both CHAT and
specified individual Instant Messaging library categories
(such as IMGEN, IMGCHAT, IMGTALK, ICQAIM,
IMMSN, IMMYSP, and/or IMYAHOO) set up to be
blocked
• the minimum filtering level profile must have both CHAT
and specified individual Instant Messaging library categories set up to be blocked.
Block P2P for All Users
To block P2P for all users on the network:
• the Pattern Blocking option in the Filter window must be
activated
• the global filtering profile must have the PR2PR library
category set up to be blocked
• the minimum filtering level profile must have the PR2PR
library category set up to be blocked.
M86 SECURITY USER GUIDE41
WEB FILTER INTRODUCTORY SECTIONCHAPTER 2: LOGGINGAND BLOCKING
Block Specified Entities from Using IM, P2P
Block IM for a Specific Entity
To block IM for a specified group or user:
• the Pattern Blocking option in the Filter window must be
activated
• the CHAT and specified individual Instant Messaging
library categories must both be set up to be blocked for
that entity
• the global filtering profile should not have IM blocked,
unless blocking all IM traffic with the Range to Detect
feature is desired
• the minimum filtering level profile should not have IM
blocked, unless blocking all IM traffic with the Range to
Detect feature is desired.
Block P2P for a Specific Entity
To block P2P for a specified group or user:
• the Pattern Blocking option in the Filter window must be
activated
• the PR2PR library category must be set up to be blocked
for that entity
• the global filtering profile should not have P2P blocked,
unless blocking all P2P traffic with the Range to Detect
feature is desired
• the minimum filtering level profile should not have P2P
blocked, unless blocking all P2P traffic with the Range to
Detect feature is desired.
42M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Chapter 3: Synchronizing Multiple Units
Web Filter Synchronization
The Web Filter can function in one of three modes—“Stand
Alone” mode, “Source” mode, or “Target” mode—based on
the setup within your organization. In a multi-Web Filter
environment, all Web Filters should be set up with the same
user profile data, so that no matter which Web Filter a user’s
PC accesses on the network, that user’s Internet usage is
appropriately filtered and blocked. The act of configuring
multiple Web Filters to share the same user profile information is known as synchronization.
The synchronization feature allows an administrator to
control multiple Web Filters without the need to configure
each one independently. Web Filter synchronization uses a
source/target configuration, in which one Web Filter is
designated as the source server on which all configuration
entries are made. All other Web Filters on the network are
configured as target servers to the source Web Filter unit,
receiving updates from the source server.
M86 SECURITY USER GUIDE43
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
FUNCTIONAL MODES
Stand Alone Mode
In the Stand Alone mode, the Web Filter functions as the
only Internet filter on the network. This mode is used if there
is only one Web Filter on the network. Synchronization does
not occur in this mode.
Source Mode
The Source mode is used in synchronization. In this mode
the Web Filter is configured to not only function as a content
filter, but also to act as a Centralized Management Console
for all other Web Filters on the network. Whenever a filtering
configuration change is made on the source Web Filter, that
change is sent to all target Web Filters that have been identified by the source unit via the Synchronization Setup
window of the Web Filter console. This means that all
filtering configuration should be made on the source Web
Filter. This also means that any user-level filter authentication should be performed on the source Web Filter so that
these filtering changes can be disseminated to all Web Filter
target units.
NOTE: If the failover detection synchronization feature is
enabled, if a target server fails, the source server can be set up to
detect the failed server and perform filtering for that server.
Target Mode
As in the Source mode, the Target mode is used in synchronization. In this mode, filtering information from the source
server will be uploaded to the target server. The only
synchronization setup that needs to be made on the target
server is to ensure that network interfaces are configured for
network communication.
44M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Synchronization Setup
To set up synchronization on a Web Filter, a selection must
be made in Setup window from the System section of the
Web Filter console to specify whether the Web Filter will
function as a source server or as a target server. This selection affects the contents that display in the Setup window.
NOTE: This version of synchronization only supports the use of
unique IP addresses throughout a network.
Setting up a Source Server
When setting up an Web Filter to function as a source
server, an IP address must be entered for each target Web
Filter unit. This entry identifies the location of each target
unit on the network.
NOTE: If synchronizing from a WFR to a standalone Web Filter
server, please consult the chart at http://
www.m86security.com/software/8e6/hlp/ifr/files/
1system_sync_versions.html for software version compatibility
between the two products.
WARNING: If an Web Filter is set up in the Source mode with a
Network Address Translation (NAT) device between the source
and target server(s), be sure that ports 26262, 26268, and 88 are
open on the source server. This setup is required so that the
source server can communicate with the target server(s).
Setting up a Target Server
When setting up a Web Filter to function as a target server,
the IP address of the source server must be entered to identify the source server on the network. This IP address is
used for security purposes, as the target server will only
acknowledge and apply changes it receives from the designated source server. Additionally, this IP address is used by
the target server to identify the source server from which it
M86 SECURITY USER GUIDE45
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
should receive its running filter configuration in the event of
a reboot.
WARNING: If a Web Filter server is set up in the Target mode
with a NAT device between the target and source server, be sure
that ports 26262 and 26268 are open on the target server. This
setup is required so that the target server can communicate with
the source server.
Types of Synchronization Processes
Synchronization involves two types of processes: filtering
profile synchronization, and library synchronization.
Filtering Profile Synchronization Process
In the filtering profile synchronization process, if a filtering
change is made on the source server—whether the update
is a global, IP, LDAP, minimum filtering bypass activation, or
user profile update—the change is applied locally. Once
locally applied on the source server, this update is sent to all
target Web Filters. Each target server will then immediately
apply this filtering change. The result is that profile updates
occur on all Web Filter units in near real time.
In the event that a target server is unable to communicate
with the source server, the target server will continue to run
the last known configuration it received from the source
server. The only exception to this scenario is that active
profiles—such as LDAP or override accounts—will not run
on the target server, since active profiles are timed out after
a specified period of time. However, all IP based filters—
such as the minimum filtering level, and the global rule that
was last received from the source server—will be applied.
When the target server resumes communication with the
source server, it will actively download and apply the latest
running configuration from the source server.
46M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
If the target server is rebooted for any reason (loss of power
etc.) upon bootup, the target server will actively download
and apply the current running configuration from the source
server. It will then also receive future changes made on the
source server.
Library Synchronization Process
In the library synchronization process, if a library change is
made on the source server, the change is applied locally.
Once locally applied on the source server, this update will
be placed in a queue for submission to target Web Filters.
The source server will then send the information in the
queue to all target servers. Each target server will receive
this information and apply the update.
On the source server, a separate queue exists for each
identified target server. A queue is used as a repository in
the event of a communication failure between the source
server and target server. Information remains in this queue
and is submitted to the target server once communications
are re-established. The use of queues ensures that if a
target server is taken offline for a period of time, when it is
brought back online, it will be updated with the latest
changes from the source server.
M86 SECURITY USER GUIDE47
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Delays in Synchronization
When a filtering profile is applied to the source server, there
is a slight delay in the time it takes to apply the profile to the
target server. This delay is caused by the amount of time it
takes the source server to process the change, prepare the
update for submission, send the update, and finally to activate the update on the target server. In practice, this should
only be matter of seconds. In essence, filtering profiles are
shared in near real time with this factor being the only delay.
The delay in activating a library change can take a little
longer than in activating a filtering profile change. This is
due to the fact that the library on the Web Filter is loaded
into the physical memory. When a change is made to the
library, a new library must be loaded into memory with the
changes. So the delay between the library change taking
place is the net of the amount of time it takes the source
server to prepare the update for submission, and then the
amount of time it takes for the update to be sent, received,
and processed by the target server. Once processed, the
new library is loaded into memory and activated, while the
old version of the library is removed from memory. The total
time of this process will vary depending upon custom library
entries, but the entire procedure should take approximately
one minute.
48M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Synchronized, Non-Synchronized Items
It is important to note that while some items are synchronized to the target Web Filters, they do not become permanent configurations on the target Web Filter. These items
are in essence functionally synchronized, since they are
configurations that the target Web Filters will read from the
source Web Filter upon load. These items will then be
updated on an as needed basis from the source Web Filter.
For purpose of differentiation, these items will be referred to
as functionally synchronized for purposes of this user guide.
These functionally synchronized items will be available for
use on the target Web Filter.
The following options are available for synchronization:
Synchronize all items (both profile and library changes), and
synchronize only library items.
As you will see by the lists on the following pages, static
configuration options—such as library changes—will be
synchronized. All active options—such as profile changes—
will be functionally synchronized. One time configuration
options on the Web Filter—such as reporting configurations,
or IP addresses—will not be synchronized.
M86 SECURITY USER GUIDE49
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Synchronize All Items
The following lists show which items will be synchronized
when the option to synchronize all items is selected.
Synchronized Items (All)
• M86 Library additions/deletions
• Custom library creations
• Custom library additions/deletions
• Search Engine keyword additions/deletions
• Keywords in URL additions/deletions
•Approved Content settings in the Global Group profile
Functionally Synchronized Items
• Common Customization, Block Page Authentication
settings, Authentication Form Customization, Lock Page
Customization, Warn Page Customization, Profile
Control settings, Quota Block Page Customization,
Quota Notice Page Customization
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Server Maintenance Procedures
Source Server Failure Scenarios
In the event that the source Web Filter unit should fail, the
target servers will continue to run using the last known
configuration loaded from the source server. However, all
dynamic authentication-based profiles will eventually timeout, since the source Web Filter server can no longer verify
user credentials. When this occurs, the information on the
server can no longer be trusted. In most cases, the failure of
the source server can be quickly repaired, though it is
possible the source server will be down for an extended
period of time due to detailed troubleshooting that needs to
be performed, or that the source server will need to be
replaced due to hardware failure.
In cases in which the source Web Filter server is out of
commission for an extended period of time, this server
should be replaced as soon as possible so that individual
user authentication can be executed, and the ability to
control the filtering cluster is continually enabled. In cases in
which the Web Filter will not be immediately replaced, one
of the target Web Filter servers should be designated as the
new source server.
Establish Backup Procedures
To prevent down time during a source server failure, M86
recommends establishing backup and restore procedures.
It is important that regular backups of the source Web Filter
server are saved using the Backup/Restore window in the
System section of the Web Filter console. Once a backup is
created, it can be downloaded to another machine for safekeeping. A backup should be created and downloaded
whenever a change is made to filtering settings on the
source Web Filter.
54M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Use a Backup File to Set up a Source Server
In the event of a source server failure, the global administrator should designate a target server as the new source
server.
Set up a Target Server as a Source Server
1. Log in to the console of the target server designated as
the new source server.
2. In the System section of the console, go to the Backup/
Restore window and create a backup of the current
running configuration on that server.
3. Download the server’s configuration to a safe storage
place until it is needed.
4. In the LAN Settings window (accessible via System >
Network), set up IP addresses to be the same as on the
source server that is being replaced.
5. Go to the Reboot window (accessible via System >
Control) and reboot the server.
6. Once the Web Filter is rebooted, reconnect to the
console and access the Backup/Restore window.
7. Upload the last good configuration from the failed source
server to the new source server. When the configuration
file is uploaded and available in the Web Filter console,
that file should be used for restoring configuration
settings.
8. After the restoration of configuration settings is applied
and a quick reload takes place, this Web Filter will now
function as the source server in the Web Filter cluster.
M86 SECURITY USER GUIDE55
WEB FILTER INTRODUCTORY SECTIONCHAPTER 3: SYNCHRONIZING MULTIPLE UNITS
Set up a Replacement Target Server
Once the original source server is replaced or repaired, it
can then be configured to replace the empty spot created by
the movement of the target server to the position of source
server. Configure this Web Filter so that the IP addresses
are that of the target server which became the source
server. Upload the running target configuration, which was
downloaded prior to converting the target server to a source
server. Use this configuration to create a duplicate of the
target server that was moved. Once this step is complete,
the cluster is whole again and should operate normally.
Set up a New Source Server from Scratch
In the event that you do not have a reliable backup file that
can be used for establishing a new source server, you must
recreate the settings on the new source server.
Set up a Target Server as a Source Server
1. Log in to the console of the target server designated as
the new source server.
2. In the System section of the console, access the Reset
window and click Reset to remove all settings on the
server.
3. Enter all settings from the failed source server on this
“new” server. In the Setup window (accessible via
System > Synchronization), specify that this is a source
server.
4. Apply all software updates that were applied on the failed
source server.
5. In the Policy section of the console, enter all groups and
filtering profiles.
6. Make all necessary settings in all sections and windows
of the console.
56M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Chapter 4: Getting Started
Using the Administrator Console
Access the Web Filter Login window
The Web Filter user interface is accessible in one of two
ways:
•by clicking the WF icon in the WFR Welcome window
(see Access the Web Filter from the WFR Portal)
•by launching an Internet browser window supported by
the Web Filter and then entering the Web Filter’s URL in
the Address field (see Enter Web Filter’s URL in the
Address field)
Access the Web Filter from the WFR Portal
Click the WF icon in the WFR Welcome window:
Fig. 1:4-1 Web Filter icon in WFR Welcome window
Clicking the WF icon opens a separate browser window/tab
containing the Web Filter Login window (see Fig. 1:4-2).
M86 SECURITY USER GUIDE57
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Enter Web Filter’s URL in the Address field
1. Launch an Internet browser window supported by the
Web Filter.
2. In the address line of the browser window, type in
“https://” and the Web Filter server’s IP address or host
name, and use port number “:1443” for a secure network
connection, plus “/login.jsp”.
For example, if your IP address is 210.10.131.34, type in
https://210.10.131.34:1443/login.jsp. Using a host
name example, if the host name is logo.com, type in
https://logo.com:1443/login.jsp.
With a secure connection, the first time you attempt to
access the Web Filter’s user interface in your browser
you will be prompted to accept the security certificate. In
order to accept the security certificate, follow the instructions at: http://www.m86security.com/software/8e6/
docs/ig/misc/sec-cert-wf4.1.pdf
3. After accepting the security certificate, click Go to open
the Web Filter login window (see Fig. 1:4-2).
58M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Log In
1. In the Login window, enter your Username and Pass-
word:
Fig. 1:4-2 Web Filter Login window
TIP: The default Username is admin and the Password is user3.
To change this username and password, go to the Administrator
window (see the Administrator window of the System screen in
the WF Global Administrator Section) and create a global administrator account.
NOTE: See Chapter 1: System screen in the WF Global Administrator Section for information on logging into the Web Filter user
interface if your password has expired.
2. Click LOGIN to access the Welcome screen of the Web
Filter Administrator console:
M86 SECURITY USER GUIDE59
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Fig. 1:4-3 Welcome screen
On this screen, the Web Filter Version Number displays
in the Product frame, and dates for the Last Software
Update and Last Library Update display in the Web Filter
Status frame.
The following information displays at the bottom of the
Administrator console: Host Name, LAN IP address used
for sending block pages, and software Version number.
Last Library Update message
If it has been more than seven days since the Web Filter last
received updates to library categories, upon logging into the
Administrator console a pop-up dialog box opens and
displays the following message: ”Libraries were last
updated more than 7 days ago. Do you want to update your
libraries now?” Click either Yes or No to perform the
following actions:
•Yes - clicking this button closes the dialog box and opens
an alert box indicating that it will take a few minutes to
perform the library update. Click OK to close the alert box
and to execute the command to update the libraries.
60M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
After the libraries are updated, today’s date will appear
as the Last Library Update on the welcome screen.
NOTE: Refer to the Library screen’s Manual Update to M86
Supplied Categories window—in the Web Filter Global Group
Section—for information about updating library categories on
demand.
•No - clicking this button closes the dialog box and
displays the welcome screen with the Last Library
Update and the following message below in purple
colored text: “Libraries were last updated 7 days ago.
Please use the Weekly Update option”:
Fig. 1:4-4 Welcome screen, Last Library Update text
Click the checkbox “Do not show “Old Library Warning”
dialog box in future” to disable the Last Library Update
message pop-up box. After the libraries are updated, the
welcome screen will appear as in Fig. 1:4:3 with today’s
date as the Last Library Update in black text.
M86 SECURITY USER GUIDE61
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Navigation Tips
Access Main Sections
The Administrator console is organized into six sections,
each accessible by clicking the corresponding link in the
navigation toolbar at the top of the screen:
• Home - clicking this link displays the Welcome screen of
the Administrator console.
• Policy - clicking this link displays the main screen for the
Policy section. Windows in the Policy section are used
for creating and managing master IP groups, subgroups, and individual IP filtering profiles, or for setting
up LDAP domains, groups, and individual users, and
their filtering profiles.
• Library - clicking this link displays the main screen for
the Library section. Library section windows are used for
adding and maintaining library categories. Library categories are used when creating or modifying a filtering
profile.
• Reporting - clicking this link displays the main screen for
the Reporting section. The Reporting section contains
windows used for configuring reports on users’ Internet
activities.
• System - clicking this link displays the main screen for
the System section. This section is comprised of
windows used by the global administrator for configuring
and maintaining the server to authenticate users, and to
filter or block specified Internet content for each user
based on the applied filtering profile.
62M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
• Help - clicking this link displays the Help screen. This
screen includes navigation tips and a link to a page
where you can access the latest user guides (in the .pdf
format) for this application:
Fig. 1:4-5 Help screen
•Logout - click this link to log out of this application. When
your session has been terminated, the login window redisplays.
Note that on each screen, in the right side of the navigation
path bar beneath the banner, the following displays:
X Strikes Blocking icon - If the X Strikes Blocking
feature is enabled, this icon can be clicked by authorized users to access the X Strikes Unlock Workstation
window where workstations are unlocked.
Real Time Probe icon - If the Real Time Probe feature
is enabled, this icon can be clicked by authorized
users to access the Real Time Probe reporting tool.
• system time - The system time displays using the
YYYY/MM/DD HH:MM:SS date and time format
M86 SECURITY USER GUIDE63
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Help Features
Help features provide information about how to use
windows in the Administrator console. Such features
include help topics and tooltips.
Access Help Topics
Each of the main section screens contains a link beneath
the banner. When that link is clicked, a separate browser
window opens with Help Topics for that section:
Fig. 1:4-6 Help Topics window
1. Click a link to go to a specified topic.
2. To view Help Topics for another section, click the tab for
that section: Policy, Library, Reporting, System, or Help.
3. Click Close Window to close the Help Topics window.
64M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Tooltips
In any window that features the icon in the navigation
path bar beneath the banner, additional information about
that window can be obtained by hovering over that icon with
your mouse, or by pressing the F1 key on your keyboard.
• Hover Display
The yellow tooltip box displays when you hover over the
icon with your mouse:
Fig. 1:4-7 Tooltip mouseover effect
To close the tooltip box, move the mouse away from the
icon.
M86 SECURITY USER GUIDE65
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
• Help pop-up box
The Help pop-up box opens when you press the F1 key
on your keyboard:
Fig. 1:4-8 Help pop-up box
Click OK to close the pop-up box.
66M86 SECURITY USER GUIDE
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Screen and Window Navigation
All screens are divided into two panels: a navigation panel
to the left, and a window in the panel to the right. Windows
display in response to a selection made in the navigation
panel.
In the Administrator console, screens and windows use
different navigation formats, based on the contents of a
given screen or window. Screens can contain topic links and
sub-topic menus, and/or tree lists with topics and sub-topic
menus. Windows can contain tabs that function as subwindows.
Topic Links
In Library, Reporting, and System screens, the navigation
panel contains topic links. By clicking a topic link, the
window for that topic displays in the right panel:
Fig. 1:4-9 Selected topic and its corresponding window
M86 SECURITY USER GUIDE67
WEB FILTER INTRODUCTORY SECTIONCHAPTER 4: GETTING STARTED
Select Sub-topics
Some topics in Library and System screens consist of more
than one window. For these topics, clicking a topic link
opens a menu of sub-topics:
Fig. 1:4-10 Sub-topics menu
When a sub-topic from this menu is selected, the window for
that sub-topic displays in the right panel of the screen.
68M86 SECURITY USER GUIDE
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.