M86 Security M86 Web Filter User manual

M86 Web Filter
USER GUIDE
Software Version: 4.0.10
Document Version: 06.08.10

II M86 SECURITY USER GUIDE
M86 WEB FILTER USER GUIDE
© 2010 M86 Security
All rights reserved.
828 W. Taft Ave., Orange, CA 92865, USA
Version 1.01, published June 2010 for software release 4.0.10
Printed in the United States of America
This document may not, in whole or in part, be copied, photo-
copied, reproduced, translated, or reduced to any electronic
medium or machine readable form without prior written con-
sent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied war-
ranties of merchantability and fitness for a particular purpose.
M86 Security shall not be liable for any error or for incidental
or consequential damages in connection with the furnishing,
performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product,
the information described in this documentation is subject to
change without notice.
The latest version of this document can be obtained from
http://www.m86security.com/support/R3000/documenta-
tion.asp
Trademarks
Other product names mentioned in this manual may be trade-
marks or registered trademarks of their respective companies
and are the sole property of their respective manufacturers.
Part# R3000-UG_v1.01-1006

M86 SECURITY USER GUIDE iii
CONTENTS
I
NTRODUCTORY
S
ECTION
.................................................. 1
Web Filter ..................................................................................... 1
About this User Guide ................................................................1
How to Use this User Guide .......................................................3
Conventions ...................................................................................... 3
Terminology ...................................................................................... 4
Overview ...................................................................................... 9
Environment Requirements ..................................................... 10
Workstation Requirements .............................................................. 10
Administrator ............................................................................ 10
End User ................................................................................... 11
Network Requirements .................................................................... 11
Chapter 1: Filtering Operations ............................................... 12
Operational Modes .......................................................................... 12
Invisible Mode ........................................................................... 13
Router Mode ............................................................................. 15
Firewall Mode ........................................................................... 16
Group Types ................................................................................... 18
Global Group ............................................................................ 18
IP Groups . ................................................................................ 19
Filtering Profile Types ..................................................................... 20
Static Filtering Profiles . ............................................................. 22
Master IP Group Filtering Profile......................................... 22
IP Sub-Group Filtering Profile ............................................. 22
Individual IP Member Filtering Profile ................................. 22
Active Filtering Profiles . ............................................................ 23
Global Filtering Profile......................................................... 23
Override Account Profile ..................................................... 23
Time Profile ......................................................................... 23
Lock Profile ......................................................................... 23
Filtering Profile Components ........................................................... 24
Library Categories . ................................................................... 25

CONTENTS
iv M86 SECURITY USER GUIDE
M86 Supplied Categories.................................................... 25
Custom Categories ............................................................. 25
Service Ports . ........................................................................... 26
Rules ........................................................................................ 26
Minimum Filtering Level ............................................................ 26
Filter Settings ............................................................................ 27
Filtering Rules ................................................................................. 28
Filtering Levels Applied ............................................................ 28
Chapter 2: Logging and Blocking ............................................ 31
Web Access Logging ...................................................................... 31
Instant Messaging, Peer-to-Peer Blocking ...................................... 31
How IM and P2P Blocking Works ............................................. 31
IM Blocking.......................................................................... 31
P2P Blocking....................................................................... 32
Setting up IM and P2P .............................................................. 33
Using IM and P2P ..................................................................... 33
Block IM, P2P for All Users ................................................ 34
Block IM for All Users ................................................... 34
Block P2P for All Users................................................. 34
Block Specified Entities from Using IM, P2P ...................... 35
Block IM for a Specific Entity ........................................ 35
Block P2P for a Specific Entity ..................................... 35
Chapter 3: Synchronizing Multiple Units ................................ 36
Web Filter Synchronization ............................................................. 36
Synchronization Setup .................................................................... 38
Setting up a Source Server ...................................................... 38
Setting up a Target Server ....................................................... 38
Types of Synchronization Processes .............................................. 39
Filtering Profile Synchronization Process ................................. 39
Library Synchronization Process .............................................. 40
Delays in Synchronization ............................................................... 41
Synchronized, Non-Synchronized Items ......................................... 42
Synchronize All Items . .............................................................. 43
Synchronized Items (All) ..................................................... 43
Functionally Synchronized Items ........................................ 43
Non-synchronized Items .................................................... 44
Synchronize Only Library Items ................................................ 45
Synchronized Items (Library Only)...................................... 45
Functionally Synchronized Items ........................................ 45

CONTENTS
M86 SECURITY USER GUIDE v
Non-synchronized Items ..................................................... 45
Server Maintenance Procedures ..................................................... 47
Source Server Failure Scenarios .............................................. 47
Establish Backup Procedures ................................................... 47
Use a Backup File to Set up a Source Server .......................... 48
Set up a Target Server as a Source Server ........................ 48
Set up a Replacement Target Server ................................. 49
Set up a New Source Server from Scratch ............................... 49
Set up a Target Server as a Source Server ........................ 49
Chapter 4: Getting Started ....................................................... 50
Initial Setup ..................................................................................... 50
Access the Administrator Console .................................................. 50
Log On ...................................................................................... 50
Last Library Update message ............................................. 52
Navigation Tips ......................................................................... 54
Access Main Sections ......................................................... 54
Help Features ..................................................................... 56
Access Help Topics ...................................................... 56
Tooltips ......................................................................... 57
Screen and Window Navigation ......................................... 59
Topic Links.................................................................... 59
Select Sub-topics.......................................................... 60
Navigate a Tree List...................................................... 61
Tree List Topics and Sub-topics ................................... 62
Navigate a Window with Tabs ...................................... 63
Console Tips and Shortcuts ............................................... 64
Navigation Path ............................................................ 64
Refresh the Console ..................................................... 64
Select Multiple Items..................................................... 65
Copy and Paste Text .................................................... 65
Calculate IP Ranges without Overlaps ......................... 66
Re-size the User Interface ............................................ 67
Log Off ...................................................................................... 68
G
LOBAL
A
DMINISTRATOR
S
ECTION
.................................. 69
Introduction ............................................................................... 69
Chapter 1: System screen ........................................................ 70
Control ............................................................................................. 72

CONTENTS
vi M86 SECURITY USER GUIDE
Filter window ............................................................................. 72
Local Filtering...................................................................... 73
Disable Local Filtering Options ..................................... 73
Enable Local Filtering Options...................................... 74
HTTP Filtering ..................................................................... 74
Enable HTTP Packet Splitting Detection ...................... 74
Disable HTTP Packet Splitting Detection ..................... 74
HTTPS Filtering .................................................................. 75
Service Control.................................................................... 76
Enable Pattern Blocking ............................................... 76
Disable Pattern Blocking............................................... 77
Target(s) Filtering................................................................ 77
Disable Filtering on Target Servers .............................. 77
Enable Filtering on Target Servers ............................... 77
Block Page Authentication window ........................................... 78
Enter, Edit Block Page Options .......................................... 79
Block page .......................................................................... 80
Options page....................................................................... 82
Option 2 ........................................................................ 83
Option 3 ........................................................................ 84
ShutDown window . ................................................................... 85
Shut Down the Server ......................................................... 85
Reboot window . ........................................................................ 86
Reboot the Server ............................................................... 86
Network ........................................................................................... 88
LAN Settings window ................................................................ 88
Specify LAN Settings ......................................................... 89
NTP Servers window . ............................................................... 90
Specify Network Time Protocol Servers ............................. 91
Add an NTP Server....................................................... 91
Remove an NTP Server................................................ 91
Regional Setting window . ......................................................... 92
Specify the Time Zone, Language Set................................ 92
Block Page Route Table window .............................................. 93
Add a Router ...................................................................... 94
Remove a Router ................................................................ 94
Administrator ................................................................................... 95
Administrator window ............................................................... 95
View Administrator Accounts .............................................. 96
Add an Administrator Account............................................. 96
Edit an Administrator Account ............................................ 97

CONTENTS
M86 SECURITY USER GUIDE vii
Delete an Administrator Account......................................... 97
Secure Logon .................................................................................. 98
Logon Settings window ............................................................. 98
Enable, Disable Password Expiration ................................. 99
Enable, Disable Account Lockout .................................... 100
Logon Management ................................................................ 102
View User Account Status, Unlock Username ................. 103
View Account Status................................................... 103
Unlock a Username .................................................... 104
View Locked IP Address, Unlock IP Address.................... 104
View Locked IPs ......................................................... 104
Unlock an IP Address ................................................. 104
View Admin, Sub Admin User Interface Access .............. 105
Diagnostics .................................................................................... 106
System Command window ..................................................... 106
Perform a Diagnostic Test, View Data ............................. 107
Command Selections ........................................................ 108
Ping............................................................................. 108
Trace Route ................................................................ 108
Process list ................................................................. 108
TOP CPU processes ..................................................109
NIC configuration ........................................................ 109
Active connections...................................................... 109
Routing table............................................................... 109
Current memory usage ............................................... 110
CPU usage ................................................................. 110
System performance................................................... 110
Recent logins .............................................................. 110
System uptime ............................................................ 111
df(disk usage) ............................................................. 111
dmesg(print kernel ring buffer).................................... 111
View Log File window . ............................................................ 112
View Log Results .............................................................. 112
Troubleshooting Mode window ............................................... 114
Use the Troubleshooting Mode ........................................ 115
Active Profile Lookup window ................................................. 116
Verify Whether a Profile is Active ..................................... 117
Admin Audit Trail window ....................................................... 120
Admin Audit Trail............................................................... 120
Specify FTP Criteria....................................................121
FTP the Log on Demand ............................................121

CONTENTS
viii M86 SECURITY USER GUIDE
View ................................................................................. 122
View the Log of Administrator Changes .....................122
Alert ............................................................................................... 123
Alert Settings window ............................................................. 123
Enable the Alert Feature .................................................. 125
Modify Alert Settings ......................................................... 125
Disable the Alert Feature .................................................. 125
SMTP Server Settings window . .............................................. 126
Enter, Edit SMTP Server Settings ..................................... 126
Verify SMTP Settings ........................................................ 127
Software Update ........................................................................... 128
Local Software Update window .............................................. 128
Read Information about a Software Update...................... 129
Select and Apply a Software Update ................................ 129
Undo an Applied Software Update ................................... 132
Software Update Log window ................................................. 132
View Log Contents ............................................................ 133
Download Log, View, Print Contents................................. 133
Download the Log....................................................... 133
View the Contents of the Log...................................... 134
Save, Print the Log File Contents............................... 136
Synchronization ............................................................................. 137
Setup window . ........................................................................ 138
Using Only One Web Filter on the Network ..................... 139
Using More than One Web Filter on the Network ............. 139
Set up a Web Filter to be a Source Server................. 139
Sync All Target Servers with the Same Settings ........ 142
Set up a Web Filter to be a Target Server.................. 143
Status window . ....................................................................... 145
View the Sync Status of Targets from the Source ........... 146
View Items in the Queue............................................. 146
View Items Previously Synced to the Server .............. 147
Place Items in Queue for Syncing..................................... 148
View the Sync Status of the Target Server ....................... 148
Mode ............................................................................................. 150
Operation Mode window ......................................................... 150
Set the Operation Mode ................................................... 151
Specify the Listening Device ............................................. 151
Specify the Block Page Device .........................................151
Invisible Option: Specify the Block Page Delivery.............152
ICAP Option: Specify ICAP Server Settings ..................... 153

CONTENTS
M86 SECURITY USER GUIDE ix
Mobile Options: Specify the Mobile Client Control ........... 155
Apply Operation Mode Settings ........................................ 155
Proxy Environment Settings window ...................................... 155
Use a Local Proxy Server ................................................. 156
Use Proxy Port 80 ............................................................. 156
Authentication ............................................................................... 157
Backup/Restore ............................................................................. 158
Backup/Restore window ......................................................... 158
Backup Procedures........................................................... 159
Perform a Backup on Demand ......................................... 160
Schedule a Backup .......................................................... 161
Configure FTP Server Settings................................... 161
Create a Backup Schedule.........................................162
Remove a Backup Schedule ...................................... 165
Download a File ............................................................... 166
Perform a Restoration ...................................................... 167
Upload a File to the Server......................................... 167
Restore Configurations to the Server ......................... 168
Remove a Backup File ...................................................... 168
View Backup and Restoration Details .............................. 169
Reset ............................................................................................. 170
Reset window ......................................................................... 170
Reset All Server Settings .................................................. 170
Radius Authentication Settings ..................................................... 171
Radius Authentication Settings window .................................. 171
Enable Radius................................................................... 172
Specify Radius Authentication Settings ...................... 172
Apply Settings............................................................. 173
Disable Radius .................................................................. 173
SNMP ............................................................................................ 174
SNMP window ........................................................................ 174
Enable SNMP.................................................................... 174
Specify Monitoring Settings .............................................. 175
Set up Community Token for Public Access............... 175
Create, Build the Access Control List ......................... 175
Maintain the Access Control List ................................ 175
Hardware Failure Detection .......................................................... 176
Hardware Failure Detection window ....................................... 176
View the Status of the Hard Drives ................................... 176
X Strikes Blocking ......................................................................... 177
X Strikes Blocking window ...................................................... 177

CONTENTS
xM86 SECURITY USER GUIDE
Configuration..................................................................... 178
Set up Blocking Criteria .............................................. 178
Reset All Workstations................................................ 179
Lock Page................................................................... 180
Overblocking or Underblocking................................... 181
Email Alert......................................................................... 182
Set up Email Alert Criteria .......................................... 182
Set up Email Alert Recipients ..................................... 183
Remove Email Alert Recipients .................................. 184
Logon Accounts ................................................................ 184
Set up Users Authorized to Unlock Workstations ....... 184
Deactivate an Authorized Logon Account................... 185
Delete a Logon Account ............................................. 185
Categories......................................................................... 186
Set up Categories to Receive Strikes or No Strikes ... 186
Go to X Strikes Unlock Workstation GUI .......................... 187
Re-login window ......................................................... 187
X Strikes Unlock Workstation ........................................... 188
Unlock a Workstation.................................................. 188
Set up an Email Address to Receive Alerts ................ 190
Remove an Email Address from the Alert List............ 190
Close the Pop-up Window .......................................... 190
Warn Option Setting ......................................................................191
Warn Option Setting window ..................................................191
Specify Interval for Re-displaying the Warn page ............. 192
Customization ............................................................................... 193
Common Customization window . ...........................................194
Enable, Disable Features ................................................. 195
Lock Page Customization window .......................................... 197
Edit Entries, Setting .......................................................... 198
Preview Sample Lock Page ............................................. 199
Block Page Customization window ......................................... 200
Add, Edit Entries ............................................................... 201
Preview Sample Block Page ............................................ 202
Warn Page Customization window . ........................................ 204
Add, Edit Entries .............................................................. 205
Preview Sample Warning Page .......................................206
Profile Control window ............................................................ 208
Edit Entries........................................................................ 209
Quota Block Page Customization window . ............................. 210
Add, Edit Entries ............................................................... 210

CONTENTS
M86 SECURITY USER GUIDE xi
Preview Sample Quota Block Page .................................. 211
Quota Notice Page Customization window ............................. 213
Add, Edit Entries ............................................................... 213
Preview Sample Quota Notice Page................................. 214
CMC Management ........................................................................ 216
Software Update Management window .................................. 216
View Software Update Information ................................... 217
Apply or Undo a Software Update .................................... 218
Status window . ....................................................................... 219
View Filtering Status Information ...................................... 219
Quota Setting ................................................................................ 221
Quota Setting window ............................................................. 221
Configure Quota Hit Settings ........................................... 222
Reset Quotas ................................................................... 223
Reset Quotas Now...................................................... 223
Set up a Schedule to Automatically Reset Quotas..... 223
Delete a Quota Reset Time from the Schedule ..........224
Quota Notice page ............................................................ 224
Quota Block page ............................................................. 226
SSL Certificate .............................................................................. 227
SSL Certificate window ........................................................... 227
Generate an SSL Certificate for the Web Filter ................228
Chapter 2: Policy screen ........................................................ 229
Global Group ................................................................................. 231
Range to Detect window ......................................................... 231
Add a Segment to the Network ......................................... 232
Range to Detect Setup Wizard ................................... 234
Range to Detect Advanced Settings........................... 239
Modify a Segment of the Network .................................... 240
Remove a Segment from the Network ..............................240
Rules window . ........................................................................ 241
View Criteria for a Rule ..................................................... 241
Add a Rule ........................................................................ 242
Modify a Rule .................................................................... 244
Copy a Rule ...................................................................... 244
Remove a Rule ................................................................. 245
Global Group Profile window .................................................. 245
Category Profile ............................................................... 246
Create, Edit a List of Selected Categories..................246
Port.................................................................................... 248

CONTENTS
xii M86 SECURITY USER GUIDE
Create, Edit a List of Service Ports............................. 249
Default Redirect URL ........................................................ 249
Create, Edit the Redirect URL .................................... 250
Filter Options..................................................................... 250
Create, Edit the Filter Options .................................... 250
Override Account window . ...................................................... 254
Add an Override Account ................................................. 255
Category Profile .......................................................... 256
Redirect URL .............................................................. 259
Filter Options .............................................................. 260
Edit an Override Account .................................................. 262
Change the Password ................................................ 262
Modify an Override Account ....................................... 263
Delete an Override Account .............................................. 263
Minimum Filtering Level window ............................................. 264
Minimum Filtering Categories .......................................... 265
Create, Edit Minimum Filtering Categories.................266
Port ................................................................................... 267
Create, Edit a List of Service Ports............................. 267
Minimum Filtering Bypass Options.................................... 268
Specify Minimum Filtering Bypass Options ................ 269
Refresh All .............................................................................. 269
Refresh All Main Branches................................................ 269
IP ................................................................................................... 270
Add Group .............................................................................. 270
Add a Master IP Group ..................................................... 270
Refresh ................................................................................... 271
Refresh IP Groups ............................................................ 271
Chapter 3: Library screen ....................................................... 272
Updates ......................................................................................... 274
Configuration window ............................................................. 274
Set a Time for Updates to be Retrieved............................ 274
Optional: Specify a Proxy Server ..................................... 275
Select the Log Level.......................................................... 275
Manual Update window . ......................................................... 276
Specify the Type of On Demand Update .......................... 276
Additional Language Support window . ................................... 278
Select Additional Languages............................................. 278
Library Update Log window .................................................... 279
View the Library Update Process...................................... 279

CONTENTS
M86 SECURITY USER GUIDE xiii
Download Log, View, Print Contents ................................ 280
Download the Log....................................................... 280
View the Contents of the Log...................................... 280
Save, Print the Log File Contents............................... 283
Emergency Update Log window ............................................. 284
View the Emergency Software Update Process ...............284
Download the Software Update Log File .......................... 285
Library Lookup .............................................................................. 286
Library Lookup window ........................................................... 286
URL Lookup, Removal ...................................................... 286
Perform a URL Check................................................. 286
Remove a URL ........................................................... 287
Submit an Email to the Administrator ......................... 288
Search Engine Keyword Lookup, Removal....................... 288
Perform a Search Engine Keyword Check .................288
Remove a Search Engine Keyword............................ 288
Reload the Library ............................................................ 289
Customer Feedback Module ......................................................... 289
Customer Feedback Module window ...................................... 289
Disable Customer Feedback Module ................................ 290
Enable Customer Feedback Module................................. 290
Category Weight System .............................................................. 293
Category Weight System window ........................................... 293
View the Current Selections .............................................294
Method for Weighting Library Categories..........................294
Weighting Library Categories ........................................... 295
NNTP Newsgroup ......................................................................... 296
NNTP Newsgroup window ...................................................... 296
Add a Newsgroup to the Library........................................ 296
Remove a Newsgroup from the Library ........................... 297
Pattern Detection Whitelist ............................................................ 297
Pattern Detection Whitelist window ........................................ 297
Create, Maintain a Whitelist of IP Addresses.................... 298
Category Groups ........................................................................... 299
Library Details window ............................................................ 300
View Library Details .......................................................... 300
URLs window .......................................................................... 301
View a List of URLs in the Library Category .................... 302
Add or Remove URLs, Reload the Library ....................... 303
Add a URL to the Library Category............................. 303
Add a Wildcard URL to the Library Category.............. 304

CONTENTS
xiv M86 SECURITY USER GUIDE
Remove a URL from the Library Category ................. 305
Reload the Library ...................................................... 305
URL Keywords window ........................................................... 306
View a List of URL Keywords ........................................... 307
Add or Remove URL Keywords ........................................ 307
Add a URL Keyword to the Library Category.............. 307
Remove a URL Keyword from the Library .................. 307
Upload a List of URL Keywords to the Library ................. 308
Upload a List of URL Keyword Additions.................... 308
Upload a List of URL Keyword Deletions....................309
Reload the Library............................................................. 309
Search Engine Keywords window . ......................................... 310
View a List of Search Engine Keywords ........................... 311
Add or Remove Search Engine Keywords ........................ 311
Add a Search Engine Keyword to the Library............. 311
Remove a Search Engine Keyword from the Library.. 312
Upload a List of Search Engine Keywords........................ 312
Upload a List of Search Engine Keyword Additions ... 312
Upload a List of Search Engine Keyword Deletions ... 313
Reload the Library............................................................. 313
Chapter 4: Reporting screen .................................................. 314
Report Configuration ..................................................................... 315
Report Configuration window ................................................. 315
Specify the Reporting Device............................................ 315
M86 Enterprise Reporter .................................................. 316
Edit ER Server Information ......................................... 316
Execute Log Transfer Now ......................................... 317
View Transfer Activity to the ER .................................317
Other Device ..................................................................... 317
Enter or Edit Server Information ................................. 318
View Transfer Activity to the Reporting Device........... 319
Real Time Probe ........................................................................... 320
Real Time Probe window ........................................................ 320
Configuration..................................................................... 320
Enable Real Time Probes........................................... 320
Set up Real Time Probes............................................ 321
Exclude an IP Address from Real Time Probing ........ 321
Remove IPs from the White List ................................. 321
Report Recipients ............................................................. 322
Specify Email File Criteria........................................... 322

CONTENTS
M86 SECURITY USER GUIDE xv
Set up Email Addresses to Receive Reports.............. 322
Remove Email Addresses .......................................... 323
Logon Accounts ................................................................ 323
Set up Users Authorized to Create Probes................. 323
Deactivate an Authorized Logon Account................... 324
Delete a Logon Account ............................................. 324
Go to Real Time Probe Reports GUI ............................... 325
Re-login window ......................................................... 325
Real Time Probe Reports ................................................. 326
Create a Real Time Probe.......................................... 327
View Real Time Probe Details .................................... 330
Shadow Log Format ...................................................................... 334
Shadow Log Format window .................................................. 334
Specify the Shadow Log Format ....................................... 334
Auto-detect option....................................................... 335
Post 2.0.10 log format option...................................... 335
Post 2.0 log format option........................................... 336
Post 1.9 log format option........................................... 336
Pre 1.9 log format option ............................................ 336
Apply Setting ..................................................................... 336
G
ROUP
A
DMINISTRATOR
S
ECTION
................................. 337
Introduction ............................................................................. 337
Chapter 1: Policy screen ........................................................ 338
IP ................................................................................................... 339
Refresh ................................................................................... 339
Refresh the Master IP Group, Member ............................. 339
Master IP Group ............................................................................ 340
Group Details window ............................................................. 340
Change the Group Administrator Password...................... 340
Members window .................................................................... 341
Add the IP Address of the Member .................................. 342
Remove a Member from the Group .................................. 342
Override Account window . ...................................................... 343
Add an Override Account .................................................. 344
Category Profile .......................................................... 345
Redirect URL .............................................................. 348
Filter Options .............................................................. 349
Edit an Override Account .................................................. 351

CONTENTS
xvi M86 SECURITY USER GUIDE
Change the Password ................................................ 351
Modify an Override Account ....................................... 351
Delete an Override Account ............................................. 352
Group Profile window ............................................................. 352
Category Profile ................................................................ 352
Create, Edit a List of Selected Categories..................353
Redirect URL .................................................................... 356
Create, Edit the Redirect URL .................................... 356
Filter Options .................................................................... 357
Create, Edit the Filter Options .................................... 357
Exception URL window ........................................................... 360
Valid URL entries ............................................................. 361
Add URLs to Block URL or ByPass URL frame ............... 362
Remove URLs from Block URL or ByPass URL frame .... 364
Apply Settings ................................................................... 365
Time Profile window ............................................................... 365
Add a Time Profile ............................................................ 366
Category Profile .......................................................... 371
Redirect URL .............................................................. 372
Filter Options .............................................................. 373
Exception URL............................................................ 374
Modify a Time Profile ....................................................... 375
Delete a Time Profile......................................................... 375
Upload/Download IP Profile window ....................................... 376
Upload IP Profiles ............................................................. 376
Download Profile .............................................................. 378
Add Sub Group ....................................................................... 379
Add an IP Sub Group ........................................................ 379
Add Individual IP ..................................................................... 380
Add an Individual IP Member ............................................ 380
Delete Group .......................................................................... 381
Delete a Master IP Group Profile ...................................... 381
Paste Sub Group .................................................................... 381
Paste a Copied IP Sub Group........................................... 381
Sub Group ..................................................................................... 382
Sub Group (IP Group) window ............................................... 382
View IP Sub-Group Details ............................................... 382
Add IP Sub-Group Details................................................. 383
Members window .................................................................... 384
Modify Sub-Group Members ............................................ 385
Sub Group Profile window ......................................................385

CONTENTS
M86 SECURITY USER GUIDE xvii
Exception URL window ........................................................... 386
Time Profile window ............................................................... 386
Delete Sub Group ................................................................... 386
Delete an IP Sub-Group.................................................... 386
Copy Sub Group ..................................................................... 387
Copy an IP Sub-Group...................................................... 387
Individual IP ................................................................................... 388
Member window ..................................................................... 388
Enter the IP Address of the Member ................................ 389
Individual IP Profile window ....................................................389
Exception URL window ........................................................... 389
Time Profile window ............................................................... 389
Delete Individual IP ................................................................. 390
Delete an Individual IP Member ........................................ 390
Chapter 2: Library screen ....................................................... 391
Library Lookup .............................................................................. 392
Library Lookup window ........................................................... 392
Look up a URL ................................................................. 393
Look up a Search Engine Keyword .................................. 394
Custom Categories ....................................................................... 395
Add Category .......................................................................... 396
Add a Custom Library Category........................................ 396
Refresh ................................................................................... 397
Refresh the Library............................................................ 397
Custom library category ................................................................ 398
Library Details window ............................................................ 399
View, Edit Library Details ..................................................399
URLs window .......................................................................... 400
View a List of URLs in the Library Category .................... 401
Add or Remove URLs or Wildcard URLs ......................... 402
Add a URL to the Library Category............................. 402
Add a Wildcard URL to the Library Category.............. 403
Remove a URL from the Library Category ................. 404
Upload a Master List to the Library .................................. 405
Upload a Master List of URLs..................................... 405
Upload a Master List of Wildcard URLs...................... 407
Reload the Library............................................................. 408
URL Keywords window ........................................................... 409
View a List of URL Keywords............................................ 410
Add or Remove URL Keywords ........................................ 410

CONTENTS
xviii M86 SECURITY USER GUIDE
Add a URL Keyword to the Library Category.............. 410
Remove a URL Keyword from the Library .................. 410
Upload a List of URL Keywords to the Library ................. 411
Reload the Library............................................................. 411
Search Engine Keywords window . ......................................... 412
View a List of Search Engine Keywords ........................... 413
Add or Remove Search Engine Keywords ........................ 413
Add a Search Engine Keyword to the Library............. 413
Remove a Search Engine Keyword............................ 413
Upload a Master List of Search Engine Keywords ........... 414
Reload the Library............................................................. 414
Delete Category ...................................................................... 414
Delete a Custom Category................................................414
T
ECHNICAL
S
UPPORT
/ P
RODUCT
W
ARRANTIES
............. 415
Technical Support ................................................................... 415
Hours ............................................................................................. 415
Contact Information ....................................................................... 415
Domestic (United States) ........................................................ 415
International ............................................................................ 415
E-Mail ..................................................................................... 416
Office Locations and Phone Numbers .................................... 416
M86 Corporate Headquarters (USA).................................416
M86 Taiwan....................................................................... 416
Support Procedures ...................................................................... 417
Product Warranties ................................................................. 418
Standard Warranty ........................................................................ 418
Technical Support and Service .....................................................419
Extended Warranty (optional) ....................................................... 420
Extended Technical Support and Service ..................................... 420
A
PPENDICES
S
ECTION
................................................... 421
Appendix A .............................................................................. 421
Filtering Profile Format and Rules ................................................. 421
Rule Criteria ............................................................................ 422
Appendix B .............................................................................. 425
Create a Custom Block Page ........................................................ 425

CONTENTS
M86 SECURITY USER GUIDE xix
Part I: Modify the Web Filter ................................................... 425
1. Enable block page redirection....................................... 425
Set up for each sub-group .......................................... 425
2. Exclude filtering <server for block page> IP.................. 426
Part II: Customize the Block Page ..........................................426
1. Set up a Web server ..................................................... 426
2. Create a customized block page................................... 426
Show M86’s information in the block page (optional) . 427
Implement the “further option” (optional) .................... 427
Customized block page examples.............................. 428
Part III: Restart the Web Filter ................................................ 428
Reference . .............................................................................. 429
HTML ................................................................................ 429
CGI written in Perl ............................................................ 431
Embed data in query string......................................... 431
Use Java Script to post form data............................... 432
CGI written in C ................................................................ 434
Appendix C .............................................................................. 440
Override Pop-up Blockers ............................................................. 440
Yahoo! Toolbar Pop-up Blocker .................................................... 441
If Pop-up Blocking is Enabled ................................................. 441
Add Override Account to the White List .................................. 441
Google Toolbar Pop-up Blocker ....................................................443
If Pop-up Blocking is Enabled ................................................. 443
Add Override Account to the White List .................................. 443
AdwareSafe Pop-up Blocker ......................................................... 444
If Pop-up Blocking is Enabled ................................................. 444
Temporarily Disable Pop-up Blocking ..................................... 444
Mozilla Firefox Pop-up Blocker ..................................................... 445
Add Override Account to the White List .................................. 445
Windows XP SP2 Pop-up Blocker ................................................ 447
Set up Pop-up Blocking .......................................................... 447
Use the Internet Options dialog box.................................. 447
Use the IE Toolbar ........................................................... 448
Temporarily Disable Pop-up Blocking ..................................... 448
Add Override Account to the White List .................................. 449
Use the IE Toolbar ............................................................ 449
Use the Information Bar ................................................... 450
Set up the Information Bar.......................................... 450
Access your Override Account ................................... 450

CONTENTS
xx M86 SECURITY USER GUIDE
Appendix D .............................................................................. 452
Mobile Client ................................................................................. 452
Environment Requirements . ................................................... 453
Workstation Requirements................................................ 453
Network Requirement ...................................................... 454
Remote Filtering Components .......................................... 454
Work Flow Overview ............................................................... 454
Mobile Client Installed on a Mobile PC ............................. 454
Network Operations Overview ................................................ 455
Mobile Client on the Network ............................................ 455
Mobile Client ............................................................... 455
Enterprise Reporter .................................................... 455
Mobile Server Section . ........................................................... 456
Initial Setup ....................................................................... 456
Configure the Web Filter to use the Mobile Mode ............ 457
Add MAC Addresses to the Master IP Group ................... 458
Select MAC Addresses for a Sub Group........................... 459
View Sub Group MAC Addresses .....................................460
Add a MAC Address to an Individual Member .................. 461
Upload MAC Address File for IP Group ...........................462
Troubleshoot MAC Addresses ......................................... 463
Mobile Client Section .............................................................. 464
Download and Install the Deployment Kit ........................ 465
Access the Mobile Client Deployment Tool window ......... 468
Configure a New Package Set ......................................... 469
Specify Package criteria .............................................470
Configure Network Settings........................................ 471
Optional: Specify URL for Mobile Client Updates ....... 474
Optional: Set up Application Options..........................475
Save configuration settings, download files................ 479
Edit a Package Configuration ........................................... 483
Edit default configuration settings............................... 484
View Package Configuration contents .............................. 485
MCU file preparations ...................................................... 486
Step 1: Install MCU on end user workstations............ 486
Step 2: Choose a deployment host for updates.......... 487
Step 3: Post the latest files for MCU........................... 489
MC Deployment to Windows Computers ......................... 491
Deployment to a group ............................................... 491
Installation on a single computer ................................494
MC Deployment to Macintosh OS X Computers............... 494
Other manuals for M86 Web Filter
1
Table of contents
Other M86 Security Firewall manuals
Popular Firewall manuals by other brands

Dell
Dell NSA E5500 Getting started guide

D-Link
D-Link DFL-210 - NetDefend - Security Appliance quick guide

Barracuda
Barracuda Link Balancer Installation

Cisco
Cisco 5505 - ASA Firewall Edition Bundle Hardware installation guide

Nokia
Nokia IP740 - Remote Access Server Product guide

Cisco
Cisco ASA 5512-X quick start guide