M86 Security Web Filter HL User manual

M86 Web Filter
USER GUIDE
Models: HL, SL, MSA / Software Version: 5.0.00
Document Version: 02.01.12

II M86 SECURITY USER GUIDE
M86 WEB FILTER USER GUIDE (HL, SL, MSA)
© 2012 M86 Security
All rights reserved.
Version 1.01, published February 2012 for software release
5.0.00
Printed in the United States of America
This document may not, in whole or in part, be copied, photo-
copied, reproduced, translated, or reduced to any electronic
medium or machine readable form without prior written con-
sent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied war-
ranties of merchantability and fitness for a particular purpose.
M86 Security shall not be liable for any error or for incidental
or consequential damages in connection with the furnishing,
performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product,
the information described in this documentation is subject to
change without notice.
The latest version of this document can be obtained from
http://www.m86security.com/support/R3000/documenta-
tion.asp
Trademarks
Other product names mentioned in this manual may be trade-
marks or registered trademarks of their respective companies
and are the sole property of their respective manufacturers.
Part# R3000-UG_v1.01-1202

M86 SECURITY USER GUIDE iii
CONTENTS
I
NTRODUCTORY
S
ECTION
.................................................. 1
Web Filter .....................................................................................1
About this User Guide ................................................................1
How to Use this User Guide .......................................................3
Conventions ......................................................................................3
Terminology ......................................................................................4
Overview ......................................................................................9
Environment Requirements .....................................................10
Workstation Requirements ..............................................................10
Administrator ............................................................................10
End User ...................................................................................11
Network Requirements ....................................................................11
Chapter 1: Filtering Operations ...............................................12
Operational Modes ..........................................................................12
Invisible Mode ...........................................................................13
Router Mode .............................................................................15
Firewall Mode ...........................................................................16
Group Types ...................................................................................18
Global Group ............................................................................18
IP Groups . ................................................................................19
Filtering Profile Types .....................................................................20
Static Filtering Profiles ..............................................................22
Master IP Group Filtering Profile.........................................22
IP Sub-Group Filtering Profile.............................................22
Individual IP Member Filtering Profile .................................22
Active Filtering Profiles .............................................................23
Global Filtering Profile.........................................................23
Override Account Profile .....................................................23
Time Profile.........................................................................23
Lock Profile .........................................................................23
Filtering Profile Components ...........................................................24
Library Categories . ...................................................................25

CONTENTS
iv M86 SECURITY USER GUIDE
M86 Supplied Categories....................................................25
Custom Categories .............................................................25
Service Ports . ...........................................................................26
Rules ........................................................................................26
Minimum Filtering Level ............................................................26
Filter Settings ............................................................................27
Filtering Rules .................................................................................28
Filtering Levels Applied ............................................................28
Chapter 2: Logging and Blocking ............................................31
Web Access Logging ......................................................................31
Instant Messaging, Peer-to-Peer Blocking ......................................31
How IM and P2P Blocking Works .............................................31
IM Blocking..........................................................................31
P2P Blocking.......................................................................32
Setting up IM and P2P ..............................................................33
Using IM and P2P .....................................................................33
Block IM, P2P for All Users ................................................34
Block IM for All Users ...................................................34
Block P2P for All Users.................................................34
Block Specified Entities from Using IM, P2P.......................34
Block IM for a Specific Entity........................................34
Block P2P for a Specific Entity .....................................35
Chapter 3: Synchronizing Multiple Units ................................36
Web Filter Synchronization .............................................................36
Synchronization Setup ....................................................................38
Setting up a Source Server ......................................................38
Setting up a Target Server .......................................................38
Types of Synchronization Processes ..............................................39
Filtering Profile Synchronization Process .................................39
Library Synchronization Process ..............................................40
Delays in Synchronization ...............................................................41
Synchronized, Non-Synchronized Items .........................................42
Synchronize All Items ...............................................................43
Synchronized Items (All) .....................................................43
Functionally Synchronized Items ........................................43
Non-synchronized Items .....................................................44
Synchronize Only Library Items ................................................45
Synchronized Items (Library Only)......................................45
Functionally Synchronized Items ........................................45

CONTENTS
M86 SECURITY USER GUIDE v
Non-synchronized Items .....................................................45
Server Maintenance Procedures .....................................................47
Source Server Failure Scenarios ..............................................47
Establish Backup Procedures ...................................................47
Use a Backup File to Set up a Source Server ..........................48
Set up a Target Server as a Source Server........................48
Set up a Replacement Target Server .................................49
Set up a New Source Server from Scratch ...............................49
Set up a Target Server as a Source Server........................49
Chapter 4: Getting Started .......................................................50
Initial Setup .....................................................................................50
Access the Administrator Console ..................................................50
Log On ......................................................................................50
Last Library Update message .............................................52
Navigation Tips .........................................................................54
Access Main Sections.........................................................54
Help Features .....................................................................56
Access Help Topics......................................................56
Tooltips.........................................................................57
Screen and Window Navigation .........................................59
Topic Links....................................................................59
Select Sub-topics..........................................................60
Navigate a Tree List......................................................61
Tree List Topics and Sub-topics...................................62
Navigate a Window with Tabs ......................................63
Console Tips and Shortcuts ...............................................64
Navigation Path ............................................................64
Refresh the Console.....................................................64
Select Multiple Items.....................................................65
Copy and Paste Text....................................................65
Calculate IP Ranges without Overlaps.........................66
Re-size the User Interface............................................67
Log Off ......................................................................................68
Technical Support / Product Warranties .........................................68
G
LOBAL
A
DMINISTRATOR
S
ECTION
.................................. 69
Introduction ...............................................................................69
Chapter 1: System screen ........................................................70

CONTENTS
vi M86 SECURITY USER GUIDE
Control .............................................................................................72
Filter window .............................................................................72
Local Filtering......................................................................73
Disable Local Filtering Options.....................................73
Enable Local Filtering Options......................................74
HTTP Filtering.....................................................................74
Enable HTTP Packet Splitting Detection......................74
Disable HTTP Packet Splitting Detection .....................74
HTTPS Filtering ..................................................................75
Service Control....................................................................76
Enable Pattern Blocking ...............................................76
Disable Pattern Blocking...............................................77
Target(s) Filtering................................................................77
Disable Filtering on Target Servers..............................77
Enable Filtering on Target Servers...............................77
Block Page Authentication window ...........................................78
Enter, Edit Block Page Options ..........................................79
Block page ..........................................................................80
Options page.......................................................................82
Option 2........................................................................83
Option 3........................................................................84
ShutDown window ....................................................................85
Shut Down the Server.........................................................85
Reboot window .........................................................................86
Reboot the Server...............................................................86
Network ...........................................................................................88
LAN Settings window ................................................................88
Specify LAN Settings .........................................................89
NTP Servers window ................................................................90
Specify Network Time Protocol Servers .............................91
Add an NTP Server.......................................................91
Remove an NTP Server................................................91
Regional Setting window . .........................................................92
Specify the Time Zone, Language Set................................92
Block Page Route Table window ..............................................93
Add a Router ......................................................................94
Remove a Router................................................................94
Administrator ...................................................................................95
Administrator window ...............................................................95
View Administrator Accounts ..............................................96
Add an Administrator Account.............................................96

CONTENTS
M86 SECURITY USER GUIDE vii
Edit an Administrator Account ............................................97
Delete an Administrator Account.........................................97
Secure Logon ..................................................................................98
Logon Settings window .............................................................98
Enable, Disable Password Expiration.................................99
Enable, Disable Account Lockout ....................................100
Logon Management ................................................................102
View User Account Status, Unlock Username .................103
View Account Status...................................................103
Unlock a Username....................................................104
View Locked IP Address, Unlock IP Address....................104
View Locked IPs.........................................................104
Unlock an IP Address.................................................104
View Admin, Sub Admin User Interface Access ..............105
Diagnostics ....................................................................................106
System Command window .....................................................106
Perform a Diagnostic Test, View Data .............................107
Command Selections........................................................108
Ping.............................................................................108
Trace Route................................................................108
Process list .................................................................108
TOP CPU processes ..................................................109
NIC configuration........................................................109
Active connections......................................................109
Routing table...............................................................109
Current memory usage...............................................110
CPU usage .................................................................110
System performance...................................................110
Recent logins..............................................................110
System uptime............................................................111
df(disk usage).............................................................111
dmesg(print kernel ring buffer)....................................111
View Log File window .............................................................112
View Log Results ..............................................................112
Troubleshooting Mode window ...............................................114
Use the Troubleshooting Mode ........................................115
Active Profile Lookup window .................................................116
Verify Whether a Profile is Active .....................................117
Admin Audit Trail window .......................................................120
Admin Audit Trail...............................................................120
Specify FTP Criteria....................................................121

CONTENTS
viii M86 SECURITY USER GUIDE
FTP the Log on Demand ............................................121
View .................................................................................122
View the Log of Administrator Changes .....................122
Alert ...............................................................................................123
Alert Settings window .............................................................123
Enable the Alert Feature ..................................................125
Modify Alert Settings.........................................................125
Disable the Alert Feature ..................................................125
SMTP Server Settings window ...............................................126
Enter, Edit SMTP Server Settings.....................................126
Verify SMTP Settings........................................................127
Software Update ...........................................................................128
Local Software Update window ..............................................128
Read Information about a Software Update......................129
Select and Apply a Software Update ...............................130
General Software Installation Procedures..................130
Enable/Disable Software Update Type Downloads....132
First Time LA/Beta Software Install Procedures.........133
Undo an Applied Software Update....................................134
Software Update Log window .................................................135
View Log Contents............................................................135
Download Log, View, Print Contents ................................136
Download the Log.......................................................136
View the Contents of the Log......................................137
Save, Print the Log File Contents...............................139
Synchronization .............................................................................140
Setup window . ........................................................................141
Using Only One Web Filter on the Network......................141
Using More than One Web Filter on the Network .............142
Set up a Web Filter to be a Source Server.................142
Sync All Target Servers with the Same Settings........145
Set up a Web Filter to be a Target Server..................145
Status window ........................................................................147
View the Sync Status of Targets from the Source ...........148
View Items in the Queue.............................................148
View Items Previously Synced to the Server..............149
Place Items in Queue for Syncing.....................................150
View the Sync Status of the Target Server .......................150
Mode .............................................................................................152
Operation Mode window .........................................................152
Set the Operation Mode ...................................................153

CONTENTS
M86 SECURITY USER GUIDE ix
Specify the Listening Device.............................................153
Specify the Block Page Device.........................................153
Invisible Option: Specify the Block Page Delivery.............154
ICAP Option: Specify ICAP Server Settings .....................155
Apply Operation Mode Settings ........................................156
Proxy Environment Settings window . .....................................157
Use a Local Proxy Server .................................................157
Use Proxy Port 80.............................................................158
Enable HTTPS Filtering ....................................................158
Authentication ...............................................................................158
Backup/Restore .............................................................................159
Backup/Restore window .........................................................159
Backup Procedures...........................................................160
Perform a Backup on Demand .........................................161
Schedule a Backup ..........................................................162
Configure FTP Server Settings...................................162
Create a Backup Schedule.........................................163
Remove a Backup Schedule ......................................166
Download a File ...............................................................167
Perform a Restoration ......................................................168
Upload a File to the Server.........................................168
Restore Configurations to the Server .........................169
Remove a Backup File......................................................169
View Backup and Restoration Details ..............................170
Reset .............................................................................................171
Reset window .........................................................................171
Reset All Server Settings..................................................171
Radius Authentication Settings .....................................................172
Radius Authentication Settings window ..................................172
Enable Radius...................................................................173
Specify Radius Authentication Settings......................173
Apply Settings.............................................................174
Disable Radius..................................................................174
SNMP ............................................................................................175
SNMP window ........................................................................175
Enable SNMP....................................................................175
Specify Monitoring Settings ..............................................176
Set up Community Token for Public Access...............176
Create, Build the Access Control List.........................176
Maintain the Access Control List ................................176
Hardware Failure Detection ..........................................................177

CONTENTS
xM86 SECURITY USER GUIDE
Hardware Failure Detection window .......................................177
View the Status of the Hard Drives ...................................177
X Strikes Blocking .........................................................................179
X Strikes Blocking window ......................................................179
Configuration.....................................................................180
Set up Blocking Criteria..............................................180
Reset All Workstations................................................181
Lock Page...................................................................181
Overblocking or Underblocking...................................182
Email Alert.........................................................................183
Set up Email Alert Criteria ..........................................184
Set up Email Alert Recipients.....................................185
Remove Email Alert Recipients..................................185
Logon Accounts ...............................................................186
Set up Users Authorized to Unlock Workstations.......186
Deactivate an Authorized Logon Account...................187
Delete a Logon Account .............................................187
Categories.........................................................................188
Set up Categories to Receive Strikes or No Strikes...188
Go to X Strikes Unlock Workstation GUI ..........................189
Re-login window .........................................................189
X Strikes Unlock Workstation ...........................................190
Unlock a Workstation..................................................190
Set up an Email Address to Receive Alerts................192
Remove an Email Address from the Alert List............192
Close the Window.......................................................192
Warn Option Setting ......................................................................193
Warn Option Setting window ..................................................193
Specify Interval for Re-displaying the Warn page.............194
Customization ...............................................................................195
Common Customization window . ...........................................196
Enable, Disable Features .................................................197
Lock Page Customization window ..........................................199
Edit Entries, Setting ..........................................................200
Preview Sample Lock Page .............................................201
Block Page Customization window .........................................202
Add, Edit Entries ...............................................................203
Preview Sample Block Page ............................................204
Warn Page Customization window .........................................206
Add, Edit Entries ..............................................................207
Preview Sample Warning Page .......................................208

CONTENTS
M86 SECURITY USER GUIDE xi
Profile Control window ............................................................210
Edit Entries........................................................................211
Quota Block Page Customization window ..............................212
Add, Edit Entries ...............................................................212
Preview Sample Quota Block Page..................................213
Quota Notice Page Customization window .............................215
Add, Edit Entries ...............................................................215
Preview Sample Quota Notice Page.................................216
CMC Management ........................................................................218
Software Update Management window ..................................218
View Software Update Information....................................218
Apply or Undo a Software Update ....................................220
Status window . .......................................................................221
View Filtering Status Information ......................................221
Quota Setting ................................................................................223
Quota Setting window .............................................................223
Configure Quota Hit Settings ...........................................224
Reset Quotas ...................................................................225
Reset Quotas Now......................................................225
Set up a Schedule to Automatically Reset Quotas.....225
Delete a Quota Reset Time from the Schedule..........226
Quota Notice page............................................................226
Quota Block page .............................................................228
UI SSL Certificate ..........................................................................229
UI SSL Certificate window ......................................................229
Generate an SSL Certificate for the Web Filter ................230
Chapter 2: Policy screen ........................................................231
Global Group .................................................................................233
Range to Detect window .........................................................233
Add a Segment to the Network.........................................234
Range to Detect Setup Wizard...................................236
Range to Detect Advanced Settings...........................241
Modify a Segment of the Network ....................................242
Remove a Segment from the Network..............................242
Rules window . ........................................................................243
View Criteria for a Rule.....................................................243
Add a Rule ........................................................................244
Modify a Rule....................................................................246
Copy a Rule ......................................................................246
Remove a Rule .................................................................247

CONTENTS
xii M86 SECURITY USER GUIDE
Global Group Profile window ..................................................247
Category Profile ...............................................................248
Create, Edit a List of Selected Categories..................248
Port....................................................................................250
Create, Edit a List of Service Ports.............................251
Default Redirect URL ........................................................251
Create, Edit the Redirect URL....................................252
Filter Options.....................................................................252
Create, Edit the Filter Options ....................................252
Override Account window .......................................................256
Add an Override Account .................................................257
Category Profile..........................................................258
Redirect URL..............................................................261
Filter Options ..............................................................262
Edit an Override Account..................................................264
Change the Password ................................................264
Modify an Override Account .......................................265
Delete an Override Account..............................................265
Approved Content Settings window ........................................266
Approved Content feature and VuSafe.............................266
Approved Content setup and configuration.......................267
Approved Content portal setup .........................................267
Approved Content Settings entries.............................268
Minimum Filtering Level window .............................................269
Minimum Filtering Categories ..........................................270
Create, Edit Minimum Filtering Categories.................271
Port ...................................................................................272
Create, Edit a List of Service Ports.............................272
Minimum Filtering Bypass Options....................................273
Specify Minimum Filtering Bypass Options ................274
Refresh All ..............................................................................274
Refresh All Main Branches................................................274
IP ...................................................................................................275
Add Group ..............................................................................275
Add a Master IP Group .....................................................275
Refresh ...................................................................................276
Refresh IP Groups ............................................................276
Chapter 3: Library screen .......................................................277
Updates .........................................................................................279
Configuration window .............................................................279

CONTENTS
M86 SECURITY USER GUIDE xiii
Set a Time for Updates to be Retrieved............................279
Optional: Specify a Proxy Server .....................................280
Select the Log Level..........................................................280
Manual Update window . .........................................................281
Specify the Type of On Demand Update ..........................281
Additional Language Support window . ...................................283
Select Additional Languages.............................................283
Library Update Log window ....................................................284
View the Library Update Process......................................284
Download Log, View, Print Contents ................................285
Download the Log.......................................................285
View the Contents of the Log......................................285
Save, Print the Log File Contents...............................288
Emergency Update Log window .............................................289
View the Emergency Software Update Process ...............289
Download the Software Update Log File ..........................290
Library Lookup ..............................................................................291
Library Lookup window ...........................................................291
URL Lookup, Removal......................................................291
Perform a URL Check.................................................291
Remove a URL...........................................................292
Submit an Email to the Administrator .........................293
Search Engine Keyword Lookup, Removal.......................293
Perform a Search Engine Keyword Check.................293
Remove a Search Engine Keyword............................293
Reload the Library ............................................................294
Customer Feedback Module .........................................................294
Customer Feedback Module window ......................................294
Disable Customer Feedback Module................................295
Enable Customer Feedback Module.................................295
Category Weight System ..............................................................298
Category Weight System window ...........................................298
View the Current Selections .............................................299
Method for Weighting Library Categories..........................299
Weighting Library Categories ...........................................300
NNTP Newsgroup .........................................................................301
NNTP Newsgroup window ......................................................301
Add a Newsgroup to the Library........................................301
Remove a Newsgroup from the Library ...........................302
Pattern Detection Whitelist ............................................................303
Pattern Detection Whitelist window ........................................303

CONTENTS
xiv M86 SECURITY USER GUIDE
Create, Maintain a Whitelist of IP Addresses ...................304
Category Groups ...........................................................................305
Library Details window ............................................................306
View Library Details ..........................................................306
URLs window ..........................................................................307
View a List of URLs in the Library Category ....................308
Add or Remove URLs, Reload the Library .......................309
Add a URL to the Library Category.............................309
Add a Wildcard URL to the Library Category..............310
Remove a URL from the Library Category .................311
Reload the Library ......................................................311
URL Keywords window ...........................................................312
View a List of URL Keywords ...........................................313
Add or Remove URL Keywords ........................................313
Add a URL Keyword to the Library Category..............313
Remove a URL Keyword from the Library..................313
Upload a List of URL Keywords to the Library .................314
Upload a List of URL Keyword Additions....................314
Upload a List of URL Keyword Deletions....................315
Reload the Library.............................................................315
Search Engine Keywords window . .........................................316
View a List of Search Engine Keywords ...........................317
Add or Remove Search Engine Keywords........................317
Add a Search Engine Keyword to the Library.............317
Remove a Search Engine Keyword from the Library..318
Upload a List of Search Engine Keywords........................318
Upload a List of Search Engine Keyword Additions ...318
Upload a List of Search Engine Keyword Deletions...319
Reload the Library.............................................................319
Chapter 4: Reporting screen ..................................................320
Report Configuration .....................................................................321
Report Configuration window .................................................321
Specify the Reporting Device............................................321
M86 Security Reporter or Enterprise Reporter .................322
Edit SR, ER Server Information..................................322
Execute Log Transfer Now.........................................323
View Transfer Activity to the SR, ER..........................323
Other Device.....................................................................323
Enter or Edit Server Information.................................324
View Transfer Activity to the Reporting Device...........325

CONTENTS
M86 SECURITY USER GUIDE xv
Real Time Probe ...........................................................................326
Real Time Probe window ........................................................326
Configuration.....................................................................326
Enable Real Time Probes...........................................326
Set up Real Time Probes............................................327
Exclude an IP Address from Real Time Probing ........327
Remove IPs from the White List.................................327
Report Recipients .............................................................328
Specify Email File Criteria...........................................328
Set up Email Addresses to Receive Reports..............328
Remove Email Addresses ..........................................329
Logon Accounts ................................................................329
Set up Users Authorized to Create Probes.................329
Deactivate an Authorized Logon Account...................330
Delete a Logon Account .............................................330
Go to Real Time Probe Reports GUI ...............................331
Re-login window .........................................................331
Real Time Probe Reports .................................................332
Create a Real Time Probe..........................................333
View Real Time Probe Details....................................336
Shadow Log Format ......................................................................340
Shadow Log Format window ..................................................340
Specify the Shadow Log Format.......................................340
Auto-detect option.......................................................341
Post 2.0.10 log format option......................................341
Post 2.0 log format option...........................................342
Post 1.9 log format option...........................................342
Pre 1.9 log format option ............................................342
Apply Setting.....................................................................342
G
ROUP
A
DMINISTRATOR
S
ECTION
................................. 343
Introduction .............................................................................343
Chapter 1: Policy screen ........................................................344
IP ...................................................................................................345
Refresh ...................................................................................345
Refresh the Master IP Group, Member.............................345
Master IP Group ............................................................................346
Group Details window .............................................................346
Change the Group Administrator Password......................346

CONTENTS
xvi M86 SECURITY USER GUIDE
Members window ....................................................................347
Add the IP Address of the Member ..................................348
Remove a Member from the Group ..................................348
Override Account window .......................................................349
Add an Override Account..................................................350
Category Profile..........................................................351
Redirect URL..............................................................354
Filter Options ..............................................................355
Edit an Override Account..................................................357
Change the Password ................................................357
Modify an Override Account .......................................357
Delete an Override Account .............................................358
Group Profile window .............................................................358
Category Profile ................................................................358
Create, Edit a List of Selected Categories..................359
Redirect URL ....................................................................362
Create, Edit the Redirect URL....................................362
Filter Options ....................................................................363
Create, Edit the Filter Options ....................................363
Exception URL window ...........................................................366
Valid URL entries .............................................................367
Add URLs to Block URL or ByPass URL frame ...............368
Status column messages and icons...........................369
Remove URLs from Block URL or ByPass URL frame ....371
Apply Settings...................................................................372
Time Profile window ...............................................................372
Add a Time Profile ............................................................373
Category Profile..........................................................378
Redirect URL..............................................................379
Filter Options ..............................................................380
Exception URL............................................................381
Approved Content.......................................................382
Modify a Time Profile .......................................................383
Delete a Time Profile.........................................................383
Approved Content Settings window ........................................384
Approved Content setup and configuration.......................384
Approved Content portal setup...................................385
Approved Content Settings entries.............................385
Upload/Download IP Profile window .......................................387
Upload IP Profiles .............................................................387
Download Profile ..............................................................389

CONTENTS
M86 SECURITY USER GUIDE xvii
Add Sub Group .......................................................................390
Add an IP Sub Group........................................................390
Add Individual IP .....................................................................391
Add an Individual IP Member............................................391
Delete Group ..........................................................................392
Delete a Master IP Group Profile......................................392
Paste Sub Group ....................................................................392
Paste a Copied IP Sub Group...........................................392
Sub Group .....................................................................................393
Sub Group (IP Group) window ...............................................393
View IP Sub-Group Details ...............................................393
Add IP Sub-Group Details.................................................394
Members window ....................................................................395
Modify Sub-Group Members ............................................396
Sub Group Profile window ......................................................396
Exception URL window ...........................................................397
Time Profile window ...............................................................397
Approved Content Settings window ........................................398
Delete Sub Group ...................................................................399
Delete an IP Sub-Group....................................................399
Copy Sub Group .....................................................................399
Copy an IP Sub-Group......................................................399
Individual IP ...................................................................................400
Member window .....................................................................400
Enter the IP Address of the Member ................................401
Individual IP Profile window ....................................................401
Exception URL window ...........................................................401
Time Profile window ...............................................................401
Approved Content Settings window ........................................402
Delete Individual IP .................................................................402
Delete an Individual IP Member........................................402
Chapter 2: Library screen .......................................................403
Library Lookup ..............................................................................404
Library Lookup window ...........................................................404
Look up a URL .................................................................405
Look up a Search Engine Keyword ..................................406
Custom Categories .......................................................................406
Add Category ..........................................................................407
Add a Custom Library Category........................................407
Refresh ...................................................................................408

CONTENTS
xviii M86 SECURITY USER GUIDE
Refresh the Library............................................................408
Custom library category ................................................................409
Library Details window ............................................................409
View, Edit Library Details..................................................410
URLs window ..........................................................................411
View a List of URLs in the Library Category ....................412
Add or Remove URLs or Wildcard URLs .........................413
Add a URL to the Library Category.............................413
Add a Wildcard URL to the Library Category..............414
Remove a URL from the Library Category .................415
Upload a Master List to the Library...................................415
Upload a Master List of URLs.....................................415
Upload a Master List of Wildcard URLs......................417
Reload the Library.............................................................419
URL Keywords window ...........................................................419
View a List of URL Keywords............................................420
Add or Remove URL Keywords ........................................420
Add a URL Keyword to the Library Category..............420
Remove a URL Keyword from the Library..................420
Upload a List of URL Keywords to the Library .................421
Reload the Library.............................................................421
Search Engine Keywords window . .........................................422
View a List of Search Engine Keywords ...........................423
Add or Remove Search Engine Keywords........................423
Add a Search Engine Keyword to the Library.............423
Remove a Search Engine Keyword............................423
Upload a Master List of Search Engine Keywords ...........424
Reload the Library.............................................................424
Delete Category ......................................................................424
Delete a Custom Category................................................424
A
PPENDICES
S
ECTION
................................................... 425
Appendix A ..............................................................................425
Filtering Profile Format and Rules .................................................425
Rule Criteria ............................................................................426
Appendix B ..............................................................................429
Create a Custom Block Page ........................................................429
Part I: Modify the Web Filter ...................................................429
1. Enable block page redirection.......................................429

CONTENTS
M86 SECURITY USER GUIDE xix
Set up for each sub-group..........................................429
2. Exclude filtering <server for block page> IP..................430
Part II: Customize the Block Page ..........................................430
1. Set up a Web server .....................................................430
2. Create a customized block page...................................430
Show M86’s information in the block page (optional).431
Implement the “further option” (optional) ....................431
Customized block page examples..............................432
Part III: Restart the Web Filter ................................................432
Reference ...............................................................................433
HTML ................................................................................433
CGI written in Perl ............................................................435
Embed data in query string.........................................435
Use Java Script to post form data...............................436
CGI written in C ................................................................438
Appendix C ..............................................................................444
Override Pop-up Blockers .............................................................444
Yahoo! Toolbar Pop-up Blocker ....................................................445
If Pop-up Blocking is Enabled .................................................445
Add Override Account to the White List ..................................445
Google Toolbar Pop-up Blocker ....................................................447
If Pop-up Blocking is Enabled .................................................447
Add Override Account to the White List ..................................447
AdwareSafe Pop-up Blocker .........................................................448
If Pop-up Blocking is Enabled .................................................448
Temporarily Disable Pop-up Blocking .....................................448
Mozilla Firefox Pop-up Blocker .....................................................449
Add Override Account to the White List ..................................449
Windows XP SP2 Pop-up Blocker ................................................451
Set up Pop-up Blocking ..........................................................451
Use the Internet Options dialog box..................................451
Use the IE Toolbar ...........................................................452
Temporarily Disable Pop-up Blocking .....................................452
Add Override Account to the White List ..................................453
Use the IE Toolbar............................................................453
Use the Information Bar ...................................................454
Set up the Information Bar..........................................454
Access your Override Account ...................................454
Appendix D ..............................................................................456

CONTENTS
xx M86 SECURITY USER GUIDE
Configure the Web Filter for Reporting .........................................456
Entries in the Web Filter Administrator console ......................456
Entries in the SR, ER Administrator console ..........................458
Appendix E ..............................................................................459
RAID and Hardware Maintenance ................................................459
Part 1: Hardware Components ...............................................459
Part 2: Server Interface ..........................................................459
LED indicators in SL and HL units ....................................459
Front control panels on SL and HL units ..........................461
Rear panels on HL units ...................................................463
Part 3: Troubleshooting . .........................................................464
Hard drive failure...............................................................464
Step 1: Review the notification email..........................464
Step 2: Verify the failed drive in the Admin console ...465
Step 3: Replace the failed hard drive..........................466
Step 4: Rebuild the hard drive....................................467
Step 5: Contact Technical Support.............................467
Power supply failure..........................................................467
Step 1: Identify the failed power supply......................467
Step 2: Unplug the power cord...................................467
Step 3: Replace the failed power supply ....................468
Step 4: Contact Technical Support.............................468
Fan failure ........................................................................469
Identify a fan failure ....................................................469
Appendix F ...............................................................................470
Glossary ........................................................................................470
I
NDEX
........................................................................... 477
This manual suits for next models
2
Table of contents
Other M86 Security Network Hardware manuals
Popular Network Hardware manuals by other brands

Riverbed
Riverbed SteelHead CX xx70 Series Upgrade and Maintenance Guide

Falcon
Falcon F3400 quick start guide

ATTO Technology
ATTO Technology iPBridge 1550 Specifications

Ubiquiti
Ubiquiti UF-OLT-4 quick start guide

E+E Elektronik
E+E Elektronik EE240 user manual

Schaltbau
Schaltbau CP Series Installation and maintenance instructions