Summary of the content on the page No. 1
| Enterprise Filter
8e6R R3000
USER
GUIDE
for Authentication
Model: R3000
Release 1.10.10 / Version No.: 1.01
Summary of the content on the page No. 2
ii 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
Summary of the content on the page No. 3
R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE © 2006 8e6 Technologies All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01, published September 2006 To be used with R3000 User Guide version 1.01 for software release 1.10.10 Printed in the United States of America This document may not, in whole or in part, be copied, photo- copied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written con- sent from 8e6 Technologies
Summary of the content on the page No. 4
iv 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
Summary of the content on the page No. 5
CONTENTS CHAPTER 1: INTRODUCTION ..........................................1 About this User Guide ................................................................1 How to Use this User Guide .......................................................2 Conventions ......................................................................................2 Terminology ......................................................................................3 Filtering Elements ................................
Summary of the content on the page No. 6
CONTENTS R3000 Authentication Tiers .............................................................23 Tier 1: Single Sign-On Authentication .............................................25 Net use based authentication process .....................................25 Re-authentication process ..................................................26 Authentication methods ............................................................27 SMB protocol............................................................
Summary of the content on the page No. 7
CONTENTS Authentication Solution Compatibility ..............................................53 Configuring the R3000 for Authentication .......................................54 Configuration procedures .........................................................54 System section....................................................................54 Group section .....................................................................57 CHAPTER 2: NETWORK SETUP ....................................58 E
Summary of the content on the page No. 8
CONTENTS Enable, Disable Features....................................................91 Authentication Form Customization ..........................................93 Preview Sample Authentication Request Form ..................95 Block Page Customization ........................................................97 Preview Sample Block Page ..............................................99 CHAPTER 3: NT AUTHENTICATION SETUP ..................101 Join the NT Domain ..................................
Summary of the content on the page No. 9
CONTENTS User Objects ...........................................................................130 Address Info ...........................................................................131 Account Info ............................................................................134 SSL Settings ...........................................................................135 Alias List . ................................................................................137 Default Rule ............
Summary of the content on the page No. 10
CONTENTS Step 7: Disable filter options ...................................................170 Step 8: Attempt to access Web content . ................................171 Test net use based authentication settings ...................................173 Activate Authentication on the Network ...............................174 Activate Web-based authentication for an IP Group .....................175 Step 1: Create a new IP Group, “webauth” ............................175 Step 2: Set “webauth” to
Summary of the content on the page No. 11
CONTENTS User/Group File Format and Rules ........................................209 Username Formats .......................................................................209 Rule Criteria ..................................................................................210 File Format: Rules and Examples .................................................212 NT User List Format and Rules . .............................................213 NT Group List Format and Rules .........................
Summary of the content on the page No. 12
CONTENTS If pop-up blocking is enabled ..................................................237 Add override account to the white list .....................................237 Google Toolbar Pop-up Blocker ....................................................239 If pop-up blocking is enabled ..................................................239 Add override account to the white list .....................................239 AdwareSafe Pop-up Blocker ...................................................
Summary of the content on the page No. 13
CHAPTER 1: INTRODUCTION ABOUT THIS USER GUIDE CHAPTER 1: INTRODUCTION The R3000 Authentication User Guide contains information about setting up authentication on the network. About this User Guide This user guide addresses the network administrator desig- nated to configure and manage the R3000 server on the network. Chapter 1 provides information on how to use this user guide, and also includes an overview of filtering compo- nents and authentication operations. Chapters 2, 3, and 4 descri
Summary of the content on the page No. 14
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE blocker software installed; a glossary on authentication terms, and an index. How to Use this User Guide Conventions The following icons are used throughout this user guide: NOTE: The “note” icon is followed by italicized text providing additional information about the current subject. TIP: The “tip” icon is followed by italicized text giving you hints on how to execute a task more efficiently. WARNING: The “warning” icon is followed by it
Summary of the content on the page No. 15
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE Terminology The following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box that opens in response to an entry you made in a dialog box, window, or screen. This box often contains a button (usually labeled “OK”) for you to click in order to confirm or execute a command. • button - an object in a dialog box, window, or screen that can be clicked with your mo
Summary of the content on the page No. 16
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • dialog box - a box that opens in response to a command made in a window or screen, and requires your input. You must choose an option by clicking a button (such as “Yes” or “No”, or “Next” or “Cancel”) to execute your command. As dictated by this box, you also might need to make one or more entries or selections prior to clicking a button. • field - an area in a dialog box, window, or screen that either accommodates your data en
Summary of the content on the page No. 17
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • pop-up box or pop-up window - a box or window that opens after you click a button in a dialog box, window, or screen. This box or window may display infor- mation, or may require you to make one or more entries. Unlike a dialog box, you do not need to choose between options. • pull-down menu - a field in a dialog box, window, or screen that contains a down-arrow to the right. When you click the arrow, a menu of items displays from
Summary of the content on the page No. 18
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • sub-topic - a subset of a main topic that displays as a menu item for the topic. The menu of subtopics opens when a pertinent topic link in the left panel—the control panel—of a screen is clicked. If a sub-topic is selected, the window for that sub-topic displays in the right panel of the screen, or a pop-up window or an alert box opens, as appropriate. • text box - an area in a dialog box, window, or screen that accommodates you
Summary of the content on the page No. 19
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • tree - a tree displays in the control panel of a screen, and is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign when the branch is collapsed. By double-clicking the item, a minus (-) sign replaces the plus sign, and any entity within that branch of the tree displays. An item in the tree is selected by clicking it. • window - a window displays on a screen, an
Summary of the content on the page No. 20
CHAPTER 1: INTRODUCTION FILTERING ELEMENTS Filtering Elements Filtering operations include the following elements: groups, filtering profiles and their components, and rules for filtering. Group Types In the Group section of the Administrator console, group types are structured in a tree format in the control panel. There are four group types in the tree list: • Global Group • IP groups • NT domain groups • LDAP domain groups NOTE: If authentication is enabled, the global administrator— wh