M86 Security IR Web Filter User manual

M86 IR Web Filter
USER GUIDE
Software Version: 4.0.10
Document Version: 06.08.10

II M86 SECURITY USER GUIDE
M86 IR WEB FILTER USER GUIDE
© 2010 M86 Security
All rights reserved.
828 W. Taft Ave., Orange, CA 92865, USA
Version 1.01, published June 2010 for software release 4.0.10
Printed in the United States of America
This document may not, in whole or in part, be copied, photo-
copied, reproduced, translated, or reduced to any electronic
medium or machine readable form without prior written con-
sent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied war-
ranties of merchantability and fitness for a particular purpose.
M86 Security shall not be liable for any error or for incidental
or consequential damages in connection with the furnishing,
performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product,
the information described in this documentation is subject to
change without notice.
The latest version of this document can be obtained from
http://www.m86security.com/support/R3000/documenta-
tion.asp
Trademarks
Other product names mentioned in this manual may be trade-
marks or registered trademarks of their respective companies
and are the sole property of their respective manufacturers.
Part# IR-R3000-UG_v1.01-1006

M86 SECURITY USER GUIDE iii
CONTENTS
I
NTRODUCTORY
S
ECTION
.................................................. 1
Web Filter ..................................................................................... 1
About this User Guide ................................................................1
How to Use this User Guide .......................................................3
Conventions ...................................................................................... 3
Terminology ...................................................................................... 4
Overview ...................................................................................... 9
Environment Requirements ..................................................... 10
Workstation Requirements .............................................................. 10
Administrator ............................................................................ 10
End User ................................................................................... 11
Network Requirements .................................................................... 11
Chapter 1: Filtering Operations ............................................... 12
Operational Modes .......................................................................... 12
Invisible Mode ........................................................................... 13
Router Mode ............................................................................. 15
Firewall Mode ........................................................................... 16
Group Types ................................................................................... 18
Global Group ............................................................................ 18
IP Groups . ................................................................................ 19
Filtering Profile Types ..................................................................... 20
Static Filtering Profiles . ............................................................. 22
Master IP Group Filtering Profile......................................... 22
IP Sub-Group Filtering Profile ............................................. 22
Individual IP Member Filtering Profile ................................. 22
Active Filtering Profiles . ............................................................ 23
Global Filtering Profile......................................................... 23
Override Account Profile ..................................................... 23
Time Profile ......................................................................... 23
Lock Profile ......................................................................... 23
Filtering Profile Components ........................................................... 24
Library Categories . ................................................................... 25

CONTENTS
iv M86 SECURITY USER GUIDE
M86 Supplied Categories.................................................... 25
Custom Categories ............................................................. 25
Service Ports . ........................................................................... 26
Rules ........................................................................................ 26
Minimum Filtering Level ............................................................ 26
Filter Settings ............................................................................ 27
Filtering Rules ................................................................................. 28
Filtering Levels Applied ............................................................ 28
Chapter 2: Logging and Blocking ............................................ 31
Web Access Logging ...................................................................... 31
Instant Messaging, Peer-to-Peer Blocking ...................................... 31
How IM and P2P Blocking Works ............................................. 31
IM Blocking.......................................................................... 31
P2P Blocking....................................................................... 32
Setting up IM and P2P .............................................................. 33
Using IM and P2P ..................................................................... 33
Block IM, P2P for All Users ................................................ 34
Block IM for All Users ................................................... 34
Block P2P for All Users................................................. 34
Block Specified Entities from Using IM, P2P ...................... 35
Block IM for a Specific Entity ........................................ 35
Block P2P for a Specific Entity ..................................... 35
Chapter 3: Synchronizing Multiple Units ................................ 36
Web Filter Synchronization ............................................................. 36
Synchronization Setup .................................................................... 38
Setting up a Source Server ...................................................... 38
Setting up a Target Server ....................................................... 38
Types of Synchronization Processes .............................................. 39
Filtering Profile Synchronization Process ................................. 39
Library Synchronization Process .............................................. 40
Delays in Synchronization ............................................................... 41
Synchronized, Non-Synchronized Items ......................................... 42
Synchronize All Items . .............................................................. 43
Synchronized Items (All) ..................................................... 43
Functionally Synchronized Items ........................................ 43
Non-synchronized Items .................................................... 44
Synchronize Only Library Items ................................................ 45
Synchronized Items (Library Only)...................................... 45
Functionally Synchronized Items ........................................ 45

CONTENTS
M86 SECURITY USER GUIDE v
Non-synchronized Items ..................................................... 45
Server Maintenance Procedures ..................................................... 47
Source Server Failure Scenarios .............................................. 47
Establish Backup Procedures ................................................... 47
Use a Backup File to Set up a Source Server .......................... 48
Set up a Target Server as a Source Server ........................ 48
Set up a Replacement Target Server ................................. 49
Set up a New Source Server from Scratch ............................... 49
Set up a Target Server as a Source Server ........................ 49
Chapter 4: Getting Started ....................................................... 50
Initial Setup ..................................................................................... 50
Using the Administrator Console ..................................................... 50
Access the Web Filter Login window ........................................ 50
Access the Web Filter from the IR Portal ........................... 51
Enter Web Filter’s URL in the Address field........................ 51
Last Library Update message ............................................. 53
Navigation Tips ......................................................................... 55
Access Main Sections ......................................................... 55
Help Features ..................................................................... 57
Access Help Topics ...................................................... 57
Tooltips ......................................................................... 58
Screen and Window Navigation ......................................... 60
Topic Links.................................................................... 60
Select Sub-topics.......................................................... 61
Navigate a Tree List...................................................... 62
Tree List Topics and Sub-topics ................................... 63
Navigate a Window with Tabs ...................................... 64
Console Tips and Shortcuts ............................................... 65
Navigation Path ............................................................ 65
Refresh the Console ..................................................... 65
Select Multiple Items..................................................... 66
Copy and Paste Text .................................................... 66
Calculate IP Ranges without Overlaps ......................... 67
Re-size the User Interface ............................................ 68
Log Off ...................................................................................... 68
G
LOBAL
A
DMINISTRATOR
S
ECTION
.................................. 69
Introduction ............................................................................... 69

CONTENTS
vi M86 SECURITY USER GUIDE
Chapter 1: System screen ........................................................ 70
Control ............................................................................................. 72
Filter window ............................................................................. 72
Local Filtering...................................................................... 73
Disable Local Filtering Options ..................................... 73
Enable Local Filtering Options...................................... 74
HTTP Filtering ..................................................................... 74
Enable HTTP Packet Splitting Detection ...................... 74
Disable HTTP Packet Splitting Detection ..................... 74
HTTPS Filtering .................................................................. 75
Service Control.................................................................... 76
Enable Pattern Blocking ............................................... 76
Disable Pattern Blocking............................................... 77
Target(s) Filtering................................................................ 77
Disable Filtering on Target Servers .............................. 77
Enable Filtering on Target Servers ............................... 77
Block Page Authentication window ........................................... 78
Enter, Edit Block Page Options .......................................... 79
Block page .......................................................................... 80
Options page....................................................................... 82
Option 2 ........................................................................ 83
Option 3 ........................................................................ 84
ShutDown window . ................................................................... 85
Shut Down the Server ......................................................... 85
Reboot window . ........................................................................ 86
Reboot the Server ............................................................... 86
Network ........................................................................................... 88
LAN Settings window ................................................................ 88
Specify LAN Settings ......................................................... 89
NTP Servers window . ............................................................... 90
Specify Network Time Protocol Servers ............................. 91
Add an NTP Server....................................................... 91
Remove an NTP Server................................................ 91
Regional Setting window . ......................................................... 92
Specify the Time Zone, Language Set................................ 92
Block Page Route Table window .............................................. 93
Add a Router ...................................................................... 94
Remove a Router ................................................................ 94
Administrator ................................................................................... 95
Administrator window ............................................................... 95
View Administrator Accounts .............................................. 96

CONTENTS
M86 SECURITY USER GUIDE vii
Add an Administrator Account............................................. 96
Edit an Administrator Account ............................................ 97
Delete an Administrator Account......................................... 97
Secure Logon .................................................................................. 98
Logon Settings window ............................................................. 98
Enable, Disable Password Expiration ................................. 99
Enable, Disable Account Lockout .................................... 100
Logon Management ................................................................ 102
View User Account Status, Unlock Username ................. 103
View Account Status................................................... 103
Unlock a Username .................................................... 104
View Locked IP Address, Unlock IP Address.................... 104
View Locked IPs ......................................................... 104
Unlock an IP Address ................................................. 104
View Admin, Sub Admin User Interface Access .............. 105
Diagnostics .................................................................................... 106
System Command window ..................................................... 106
Perform a Diagnostic Test, View Data ............................. 107
Command Selections ........................................................ 108
Ping............................................................................. 108
Trace Route ................................................................ 108
Process list ................................................................. 108
TOP CPU processes ..................................................109
NIC configuration ........................................................ 109
Active connections...................................................... 109
Routing table............................................................... 109
Current memory usage ............................................... 110
CPU usage ................................................................. 110
System performance................................................... 110
Recent logins .............................................................. 110
System uptime ............................................................ 111
df(disk usage) ............................................................. 111
dmesg(print kernel ring buffer).................................... 111
View Log File window . ............................................................ 112
View Log Results .............................................................. 112
Troubleshooting Mode window ............................................... 114
Use the Troubleshooting Mode ........................................ 115
Active Profile Lookup window ................................................. 116
Verify Whether a Profile is Active ..................................... 117
Admin Audit Trail window ....................................................... 120
Admin Audit Trail............................................................... 120

CONTENTS
viii M86 SECURITY USER GUIDE
Specify FTP Criteria....................................................121
FTP the Log on Demand ............................................121
View ................................................................................. 122
View the Log of Administrator Changes .....................122
Alert ............................................................................................... 123
Alert Settings window ............................................................. 123
Enable the Alert Feature .................................................. 125
Modify Alert Settings ......................................................... 125
Disable the Alert Feature .................................................. 125
SMTP Server Settings window . .............................................. 126
Enter, Edit SMTP Server Settings ..................................... 126
Verify SMTP Settings ........................................................ 127
Software Update ........................................................................... 128
Local Software Update window .............................................. 128
Read Information about a Software Update...................... 129
Select and Apply a Software Update ................................ 129
Undo an Applied Software Update ................................... 132
Software Update Log window ................................................. 132
View Log Contents ............................................................ 133
Download Log, View, Print Contents................................. 133
Download the Log....................................................... 133
View the Contents of the Log...................................... 134
Save, Print the Log File Contents............................... 136
Synchronization ............................................................................. 137
Setup window . ........................................................................ 138
Using Only One Web Filter on the Network ..................... 139
Using More than One Web Filter on the Network ............. 139
Set up a Web Filter to be a Source Server................. 139
Sync All Target Servers with the Same Settings ........ 142
Set up a Web Filter to be a Target Server.................. 143
Status window . ....................................................................... 145
View the Sync Status of Targets from the Source ........... 146
View Items in the Queue............................................. 146
View Items Previously Synced to the Server .............. 147
Place Items in Queue for Syncing..................................... 148
View the Sync Status of the Target Server ....................... 148
Mode ............................................................................................. 150
Operation Mode window ......................................................... 150
Set the Operation Mode ................................................... 151
Specify the Listening Device ............................................. 151
Specify the Block Page Device .........................................151

CONTENTS
M86 SECURITY USER GUIDE ix
Invisible Option: Specify the Block Page Delivery.............152
ICAP Option: Specify ICAP Server Settings ..................... 153
Mobile Options: Specify the Mobile Client Control ........... 155
Apply Operation Mode Settings ........................................ 155
Proxy Environment Settings window ...................................... 155
Use a Local Proxy Server ................................................. 156
Use Proxy Port 80 ............................................................. 156
Authentication ............................................................................... 157
Backup/Restore ............................................................................. 158
Backup/Restore window ......................................................... 158
Backup Procedures........................................................... 159
Perform a Backup on Demand ......................................... 160
Schedule a Backup .......................................................... 161
Configure FTP Server Settings................................... 161
Create a Backup Schedule.........................................162
Remove a Backup Schedule ...................................... 165
Download a File ............................................................... 166
Perform a Restoration ...................................................... 167
Upload a File to the Server......................................... 167
Restore Configurations to the Server ......................... 168
Remove a Backup File ...................................................... 168
View Backup and Restoration Details .............................. 169
Reset ............................................................................................. 170
Reset window ......................................................................... 170
Radius Authentication Settings ..................................................... 171
Radius Authentication Settings window .................................. 171
Enable Radius................................................................... 172
Specify Radius Authentication Settings ...................... 172
Apply Settings............................................................. 173
Disable Radius .................................................................. 173
SNMP ............................................................................................ 174
SNMP window ........................................................................ 174
Enable SNMP.................................................................... 174
Specify Monitoring Settings .............................................. 175
Set up Community Token for Public Access............... 175
Create, Build the Access Control List ......................... 175
Maintain the Access Control List ................................ 175
Hardware Failure Detection .......................................................... 176
Hardware Failure Detection window ....................................... 176
X Strikes Blocking ......................................................................... 177
X Strikes Blocking window ...................................................... 177

CONTENTS
xM86 SECURITY USER GUIDE
Configuration..................................................................... 178
Set up Blocking Criteria .............................................. 178
Reset All Workstations................................................ 179
Lock Page................................................................... 179
Overblocking or Underblocking................................... 180
Email Alert ........................................................................ 182
Set up Email Alert Criteria .......................................... 182
Set up Email Alert Recipients ..................................... 183
Remove Email Alert Recipients .................................. 183
Logon Accounts ............................................................... 184
Set up Users Authorized to Unlock Workstations ....... 184
Deactivate an Authorized Logon Account................... 185
Delete a Logon Account ............................................. 185
Categories......................................................................... 186
Set up Categories to Receive Strikes or No Strikes ... 186
Go to X Strikes Unlock Workstation GUI .......................... 187
Re-login window ......................................................... 187
X Strikes Unlock Workstation ........................................... 188
Unlock a Workstation.................................................. 188
Set up an Email Address to Receive Alerts ................ 190
Remove an Email Address from the Alert List............ 190
Close the Pop-up Window .......................................... 190
Warn Option Setting ......................................................................191
Warn Option Setting window ..................................................191
Specify Interval for Re-displaying the Warn page ............. 192
Customization ............................................................................... 192
Common Customization window . ...........................................193
Enable, Disable Features ................................................. 194
Lock Page Customization window .......................................... 196
Edit Entries, Setting .......................................................... 197
Preview Sample Lock Page ............................................. 198
Block Page Customization window ......................................... 199
Add, Edit Entries ............................................................... 200
Preview Sample Block Page ............................................ 201
Warn Page Customization window . ........................................ 203
Add, Edit Entries .............................................................. 204
Preview Sample Warning Page .......................................205
Profile Control window ............................................................ 207
Edit Entries........................................................................ 208
Quota Block Page Customization window . ............................. 209
Add, Edit Entries ............................................................... 209

CONTENTS
M86 SECURITY USER GUIDE xi
Preview Sample Quota Block Page .................................. 210
Quota Notice Page Customization window ............................. 212
Add, Edit Entries ............................................................... 212
Preview Sample Quota Notice Page................................. 213
CMC Management ........................................................................ 215
Software Update Management window .................................. 215
View Software Update Information ................................... 216
Apply or Undo a Software Update .................................... 217
Status window . ....................................................................... 218
View Filtering Status Information ...................................... 218
Quota Setting ................................................................................ 220
Quota Setting window ............................................................. 220
Configure Quota Hit Settings ........................................... 221
Reset Quotas ................................................................... 222
Reset Quotas Now...................................................... 222
Set up a Schedule to Automatically Reset Quotas..... 222
Delete a Quota Reset Time from the Schedule ..........223
Quota Notice page ............................................................ 223
Quota Block page ............................................................. 225
SSL Certificate .............................................................................. 226
SSL Certificate window ........................................................... 226
Generate an SSL Certificate for the IR ............................ 227
Chapter 2: Policy screen ........................................................ 228
Global Group ................................................................................. 230
Range to Detect window ......................................................... 230
Add a Segment to the Network ......................................... 231
Range to Detect Setup Wizard ................................... 233
Range to Detect Advanced Settings........................... 238
Modify a Segment of the Network .................................... 239
Remove a Segment from the Network ..............................239
Rules window . ........................................................................ 240
View Criteria for a Rule ..................................................... 240
Add a Rule ........................................................................ 241
Modify a Rule .................................................................... 243
Copy a Rule ...................................................................... 243
Remove a Rule ................................................................. 244
Global Group Profile window .................................................. 244
Category Profile ............................................................... 245
Create, Edit a List of Selected Categories..................245
Port.................................................................................... 247

CONTENTS
xii M86 SECURITY USER GUIDE
Create, Edit a List of Service Ports............................. 248
Default Redirect URL ........................................................ 248
Create, Edit the Redirect URL .................................... 249
Filter Options..................................................................... 249
Create, Edit the Filter Options .................................... 249
Override Account window . ...................................................... 253
Add an Override Account ................................................. 254
Category Profile .......................................................... 255
Redirect URL .............................................................. 258
Filter Options .............................................................. 259
Edit an Override Account .................................................. 261
Change the Password ................................................ 261
Modify an Override Account ....................................... 262
Delete an Override Account .............................................. 262
Minimum Filtering Level window ............................................. 263
Minimum Filtering Categories .......................................... 264
Create, Edit Minimum Filtering Categories.................265
Port ................................................................................... 266
Create, Edit a List of Service Ports............................. 266
Minimum Filtering Bypass Options.................................... 267
Specify Minimum Filtering Bypass Options ................ 268
Refresh All .............................................................................. 268
Refresh All Main Branches................................................ 268
IP ................................................................................................... 269
Add Group .............................................................................. 269
Add a Master IP Group ..................................................... 269
Refresh ................................................................................... 270
Refresh IP Groups ............................................................ 270
Chapter 3: Library screen ....................................................... 271
Updates ......................................................................................... 273
Configuration window ............................................................. 273
Set a Time for Updates to be Retrieved............................ 273
Optional: Specify a Proxy Server ..................................... 274
Select the Log Level.......................................................... 274
Manual Update window . ......................................................... 275
Specify the Type of On Demand Update .......................... 275
Additional Language Support window . ................................... 277
Select Additional Languages............................................. 277
Library Update Log window .................................................... 278
View the Library Update Process...................................... 278

CONTENTS
M86 SECURITY USER GUIDE xiii
Download Log, View, Print Contents ................................ 279
Download the Log....................................................... 279
View the Contents of the Log...................................... 279
Save, Print the Log File Contents............................... 282
Emergency Update Log window ............................................. 283
View the Emergency Software Update Process ...............283
Download the Software Update Log File .......................... 284
Library Lookup .............................................................................. 285
Library Lookup window ........................................................... 285
URL Lookup, Removal ...................................................... 285
Perform a URL Check................................................. 285
Remove a URL ........................................................... 286
Submit an Email to the Administrator ......................... 287
Search Engine Keyword Lookup, Removal....................... 287
Perform a Search Engine Keyword Check .................287
Remove a Search Engine Keyword............................ 287
Reload the Library ............................................................ 288
Customer Feedback Module ......................................................... 288
Customer Feedback Module window ...................................... 288
Disable Customer Feedback Module ................................ 289
Enable Customer Feedback Module................................. 289
Category Weight System .............................................................. 292
Category Weight System window ........................................... 292
View the Current Selections .............................................293
Method for Weighting Library Categories..........................293
Weighting Library Categories ........................................... 294
NNTP Newsgroup ......................................................................... 295
NNTP Newsgroup window ...................................................... 295
Add a Newsgroup to the Library........................................ 295
Remove a Newsgroup from the Library ........................... 296
Pattern Detection Whitelist ............................................................ 296
Pattern Detection Whitelist window ........................................ 296
Create, Maintain a Whitelist of IP Addresses.................... 297
Category Groups ........................................................................... 298
Library Details window ............................................................ 299
View Library Details .......................................................... 299
URLs window .......................................................................... 300
View a List of URLs in the Library Category .................... 301
Add or Remove URLs, Reload the Library ....................... 302
Add a URL to the Library Category............................. 302
Add a Wildcard URL to the Library Category.............. 303

CONTENTS
xiv M86 SECURITY USER GUIDE
Remove a URL from the Library Category ................. 304
Reload the Library ...................................................... 304
URL Keywords window ........................................................... 305
View a List of URL Keywords ........................................... 306
Add or Remove URL Keywords ........................................ 306
Add a URL Keyword to the Library Category.............. 306
Remove a URL Keyword from the Library .................. 306
Upload a List of URL Keywords to the Library ................. 307
Upload a List of URL Keyword Additions.................... 307
Upload a List of URL Keyword Deletions....................308
Reload the Library............................................................. 308
Search Engine Keywords window . ......................................... 309
View a List of Search Engine Keywords ........................... 310
Add or Remove Search Engine Keywords ........................ 310
Add a Search Engine Keyword to the Library............. 310
Remove a Search Engine Keyword from the Library.. 311
Upload a List of Search Engine Keywords........................ 311
Upload a List of Search Engine Keyword Additions ... 311
Upload a List of Search Engine Keyword Deletions ... 312
Reload the Library............................................................. 312
Chapter 4: Reporting screen .................................................. 313
Report Configuration ..................................................................... 314
Report Configuration window ................................................. 314
Execute Log Transfer Now................................................ 314
Real Time Probe ........................................................................... 315
Real Time Probe window ........................................................ 315
Configuration..................................................................... 315
Enable Real Time Probes........................................... 315
Set up Real Time Probes............................................ 316
Exclude an IP Address from Real Time Probing ........ 316
Remove IPs from the White List ................................. 316
Report Recipients ............................................................. 317
Specify Email File Criteria........................................... 317
Set up Email Addresses to Receive Reports.............. 317
Remove Email Addresses .......................................... 318
Logon Accounts ................................................................ 318
Set up Users Authorized to Create Probes................. 318
Deactivate an Authorized Logon Account................... 319
Delete a Logon Account ............................................. 319
Go to Real Time Probe Reports GUI ............................... 320

CONTENTS
M86 SECURITY USER GUIDE xv
Re-login window ......................................................... 320
Real Time Probe Reports ................................................. 321
Create a Real Time Probe.......................................... 322
View Real Time Probe Details .................................... 325
Usage Graphs ............................................................................... 329
Usage Graphs window ........................................................... 329
Select a Graph to View .................................................... 330
Recent Trend .............................................................. 330
Daily Peaks................................................................. 331
Shadow Log Format ...................................................................... 332
Shadow Log Format window .................................................. 332
Specify the Shadow Log Format ....................................... 332
Auto-detect option....................................................... 333
Post 2.0.10 log format option...................................... 333
Post 2.0 log format option........................................... 334
Post 1.9 log format option........................................... 334
Pre 1.9 log format option ............................................ 334
Apply Setting ..................................................................... 334
G
ROUP
A
DMINISTRATOR
S
ECTION
................................. 335
Introduction ............................................................................. 335
Chapter 1: Policy screen ........................................................ 336
IP ................................................................................................... 337
Refresh ................................................................................... 337
Refresh the Master IP Group, Member ............................. 337
Master IP Group ............................................................................ 338
Group Details window ............................................................. 338
Change the Group Administrator Password...................... 338
Members window .................................................................... 339
Add the IP Address of the Member .................................. 340
Remove a Member from the Group .................................. 340
Override Account window . ...................................................... 341
Add an Override Account .................................................. 342
Category Profile .......................................................... 343
Redirect URL .............................................................. 346
Filter Options .............................................................. 347
Edit an Override Account .................................................. 349
Change the Password ................................................ 349
Modify an Override Account ....................................... 349

CONTENTS
xvi M86 SECURITY USER GUIDE
Delete an Override Account ............................................. 350
Group Profile window ............................................................. 350
Category Profile ................................................................ 350
Create, Edit a List of Selected Categories..................351
Redirect URL .................................................................... 354
Create, Edit the Redirect URL .................................... 354
Filter Options .................................................................... 355
Create, Edit the Filter Options .................................... 355
Exception URL window ........................................................... 358
Valid URL entries ............................................................. 359
Add URLs to Block URL or ByPass URL frame ............... 360
Remove URLs from Block URL or ByPass URL frame .... 362
Apply Settings ................................................................... 363
Time Profile window ............................................................... 363
Add a Time Profile ............................................................ 364
Category Profile .......................................................... 369
Redirect URL .............................................................. 370
Filter Options .............................................................. 371
Exception URL............................................................ 372
Modify a Time Profile ....................................................... 373
Delete a Time Profile......................................................... 373
Upload/Download IP Profile window ....................................... 374
Upload IP Profiles ............................................................. 374
Download Profile .............................................................. 376
Add Sub Group ....................................................................... 377
Add an IP Sub Group ........................................................ 377
Add Individual IP ..................................................................... 378
Add an Individual IP Member ............................................ 378
Delete Group .......................................................................... 379
Delete a Master IP Group Profile ...................................... 379
Paste Sub Group .................................................................... 379
Paste a Copied IP Sub Group........................................... 379
Sub Group ..................................................................................... 380
Sub Group (IP Group) window ............................................... 380
View IP Sub-Group Details ............................................... 380
Add IP Sub-Group Details................................................. 381
Members window .................................................................... 382
Modify Sub-Group Members ............................................ 383
Sub Group Profile window ......................................................383
Exception URL window ........................................................... 384
Time Profile window ............................................................... 384

CONTENTS
M86 SECURITY USER GUIDE xvii
Delete Sub Group ................................................................... 384
Delete an IP Sub-Group.................................................... 384
Copy Sub Group ..................................................................... 385
Copy an IP Sub-Group...................................................... 385
Individual IP ................................................................................... 386
Member window ..................................................................... 386
Enter the IP Address of the Member ................................ 387
Individual IP Profile window ....................................................387
Exception URL window ........................................................... 387
Time Profile window ............................................................... 387
Delete Individual IP ................................................................. 388
Delete an Individual IP Member ........................................ 388
Chapter 2: Library screen ....................................................... 389
Library Lookup .............................................................................. 390
Library Lookup window ........................................................... 390
Look up a URL ................................................................. 391
Look up a Search Engine Keyword .................................. 392
Custom Categories ....................................................................... 393
Add Category .......................................................................... 394
Add a Custom Library Category........................................ 394
Refresh ................................................................................... 395
Refresh the Library............................................................ 395
Custom library category ................................................................ 396
Library Details window ............................................................ 397
View, Edit Library Details ..................................................397
URLs window .......................................................................... 398
View a List of URLs in the Library Category .................... 399
Add or Remove URLs or Wildcard URLs ......................... 400
Add a URL to the Library Category............................. 400
Add a Wildcard URL to the Library Category.............. 401
Remove a URL from the Library Category ................. 402
Upload a Master List to the Library .................................. 403
Upload a Master List of URLs..................................... 403
Upload a Master List of Wildcard URLs...................... 405
Reload the Library............................................................. 406
URL Keywords window ........................................................... 407
View a List of URL Keywords............................................ 408
Add or Remove URL Keywords ........................................ 408
Add a URL Keyword to the Library Category.............. 408
Remove a URL Keyword from the Library .................. 408

CONTENTS
xviii M86 SECURITY USER GUIDE
Upload a List of URL Keywords to the Library ................. 409
Reload the Library............................................................. 409
Search Engine Keywords window . ......................................... 410
View a List of Search Engine Keywords ........................... 411
Add or Remove Search Engine Keywords ........................ 411
Add a Search Engine Keyword to the Library............. 411
Remove a Search Engine Keyword............................ 411
Upload a Master List of Search Engine Keywords ........... 412
Reload the Library............................................................. 412
Delete Category ...................................................................... 412
Delete a Custom Category................................................412
T
ECHNICAL
S
UPPORT
/ P
RODUCT
W
ARRANTIES
............. 413
Technical Support ................................................................... 413
Hours ............................................................................................. 413
Contact Information ....................................................................... 413
Domestic (United States) ........................................................ 413
International ............................................................................ 413
E-Mail ..................................................................................... 414
Office Locations and Phone Numbers .................................... 414
M86 Corporate Headquarters (USA).................................414
M86 Taiwan....................................................................... 414
Support Procedures ...................................................................... 415
Product Warranties ................................................................. 416
Standard Warranty ........................................................................ 416
Technical Support and Service .....................................................417
Extended Warranty (optional) ....................................................... 418
Extended Technical Support and Service ..................................... 418
A
PPENDICES
S
ECTION
................................................... 419
Appendix A .............................................................................. 419
Filtering Profile Format and Rules ................................................. 419
Rule Criteria ............................................................................ 420
Appendix B .............................................................................. 423
Create a Custom Block Page ........................................................ 423
Part I: Modify the Web Filter ................................................... 423
1. Enable block page redirection....................................... 423

CONTENTS
M86 SECURITY USER GUIDE xix
Set up for each sub-group .......................................... 423
2. Exclude filtering <server for block page> IP.................. 424
Part II: Customize the Block Page ..........................................424
1. Set up a Web server ..................................................... 424
2. Create a customized block page................................... 424
Show M86’s information in the block page (optional) . 425
Implement the “further option” (optional) .................... 425
Customized block page examples.............................. 426
Part III: Restart the Web Filter ................................................ 426
Reference . .............................................................................. 427
HTML ................................................................................ 427
CGI written in Perl ............................................................ 429
Embed data in query string.........................................429
Use Java Script to post form data............................... 430
CGI written in C ................................................................ 432
Appendix C .............................................................................. 438
Override Pop-up Blockers ............................................................. 438
Yahoo! Toolbar Pop-up Blocker .................................................... 439
If Pop-up Blocking is Enabled ................................................. 439
Add Override Account to the White List .................................. 439
Google Toolbar Pop-up Blocker .................................................... 441
If Pop-up Blocking is Enabled ................................................. 441
Add Override Account to the White List .................................. 441
AdwareSafe Pop-up Blocker ......................................................... 442
If Pop-up Blocking is Enabled ................................................. 442
Temporarily Disable Pop-up Blocking ..................................... 442
Mozilla Firefox Pop-up Blocker ..................................................... 443
Add Override Account to the White List .................................. 443
Windows XP SP2 Pop-up Blocker ................................................ 445
Set up Pop-up Blocking .......................................................... 445
Use the Internet Options dialog box.................................. 445
Use the IE Toolbar ........................................................... 446
Temporarily Disable Pop-up Blocking ..................................... 446
Add Override Account to the White List .................................. 447
Use the IE Toolbar ............................................................ 447
Use the Information Bar ................................................... 448
Set up the Information Bar.......................................... 448
Access your Override Account ................................... 448
Appendix D .............................................................................. 450

CONTENTS
xx M86 SECURITY USER GUIDE
Mobile Client ................................................................................. 450
Environment Requirements . ................................................... 451
Workstation Requirements................................................ 451
Network Requirement ...................................................... 452
Remote Filtering Components .......................................... 452
Work Flow Overview ............................................................... 452
Mobile Client Installed on a Mobile PC ............................. 452
Network Operations Overview ................................................ 453
Mobile Client on the Network ............................................ 453
Mobile Client ............................................................... 453
Enterprise Reporter .................................................... 453
Mobile Server Section . ........................................................... 454
Initial Setup ....................................................................... 454
Configure the Web Filter to use the Mobile Mode ............ 455
Add MAC Addresses to the Master IP Group ................... 456
Select MAC Addresses for a Sub Group........................... 457
View Sub Group MAC Addresses .....................................458
Add a MAC Address to an Individual Member .................. 459
Upload MAC Address File for IP Group ...........................460
Troubleshoot MAC Addresses ......................................... 461
Mobile Client Section .............................................................. 462
Download and Install the Deployment Kit ........................ 463
Access the Mobile Client Deployment Tool window ......... 466
Configure a New Package Set .........................................467
Specify Package criteria .............................................468
Configure Network Settings........................................ 469
Optional: Specify URL for Mobile Client Updates ....... 472
Optional: Set up Application Options..........................473
Save configuration settings, download files................ 477
Edit a Package Configuration ........................................... 481
Edit default configuration settings............................... 482
View Package Configuration contents .............................. 483
MCU file preparations ...................................................... 484
Step 1: Install MCU on end user workstations............ 484
Step 2: Choose a deployment host for updates.......... 485
Step 3: Post the latest files for MCU...........................487
MC Deployment to Windows Computers ......................... 489
Deployment to a group ............................................... 489
Installation on a single computer ................................492
MC Deployment to Macintosh OS X Computers...............492
Mobile Client Removal from Computers .......................... 493
Table of contents
Other M86 Security Network Hardware manuals
Popular Network Hardware manuals by other brands

E.F. Johnson Company
E.F. Johnson Company VR-CM50 installation guide

Patton electronics
Patton electronics 450RC24 user manual

Atlantic
Atlantic Cozytouch Bridge instructions

ZyXEL Communications
ZyXEL Communications NSA-220 Plus user guide

Freescale Semiconductor
Freescale Semiconductor SM700 quick start guide

Lorex
Lorex N863P Series Quick setup guide