ملخص المحتوى في الصفحة رقم 1
| Enterprise Filter
8e6R R3000
USER
GUIDE
for Authentication
Model: R3000
Release 1.10.10 / Version No.: 1.01
ملخص المحتوى في الصفحة رقم 2
ii 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
ملخص المحتوى في الصفحة رقم 3
R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE © 2006 8e6 Technologies All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01, published September 2006 To be used with R3000 User Guide version 1.01 for software release 1.10.10 Printed in the United States of America This document may not, in whole or in part, be copied, photo- copied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written con- sent from 8e6 Technologies
ملخص المحتوى في الصفحة رقم 4
iv 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
ملخص المحتوى في الصفحة رقم 5
CONTENTS CHAPTER 1: INTRODUCTION ..........................................1 About this User Guide ................................................................1 How to Use this User Guide .......................................................2 Conventions ......................................................................................2 Terminology ......................................................................................3 Filtering Elements ................................
ملخص المحتوى في الصفحة رقم 6
CONTENTS R3000 Authentication Tiers .............................................................23 Tier 1: Single Sign-On Authentication .............................................25 Net use based authentication process .....................................25 Re-authentication process ..................................................26 Authentication methods ............................................................27 SMB protocol............................................................
ملخص المحتوى في الصفحة رقم 7
CONTENTS Authentication Solution Compatibility ..............................................53 Configuring the R3000 for Authentication .......................................54 Configuration procedures .........................................................54 System section....................................................................54 Group section .....................................................................57 CHAPTER 2: NETWORK SETUP ....................................58 E
ملخص المحتوى في الصفحة رقم 8
CONTENTS Enable, Disable Features....................................................91 Authentication Form Customization ..........................................93 Preview Sample Authentication Request Form ..................95 Block Page Customization ........................................................97 Preview Sample Block Page ..............................................99 CHAPTER 3: NT AUTHENTICATION SETUP ..................101 Join the NT Domain ..................................
ملخص المحتوى في الصفحة رقم 9
CONTENTS User Objects ...........................................................................130 Address Info ...........................................................................131 Account Info ............................................................................134 SSL Settings ...........................................................................135 Alias List . ................................................................................137 Default Rule ............
ملخص المحتوى في الصفحة رقم 10
CONTENTS Step 7: Disable filter options ...................................................170 Step 8: Attempt to access Web content . ................................171 Test net use based authentication settings ...................................173 Activate Authentication on the Network ...............................174 Activate Web-based authentication for an IP Group .....................175 Step 1: Create a new IP Group, “webauth” ............................175 Step 2: Set “webauth” to
ملخص المحتوى في الصفحة رقم 11
CONTENTS User/Group File Format and Rules ........................................209 Username Formats .......................................................................209 Rule Criteria ..................................................................................210 File Format: Rules and Examples .................................................212 NT User List Format and Rules . .............................................213 NT Group List Format and Rules .........................
ملخص المحتوى في الصفحة رقم 12
CONTENTS If pop-up blocking is enabled ..................................................237 Add override account to the white list .....................................237 Google Toolbar Pop-up Blocker ....................................................239 If pop-up blocking is enabled ..................................................239 Add override account to the white list .....................................239 AdwareSafe Pop-up Blocker ...................................................
ملخص المحتوى في الصفحة رقم 13
CHAPTER 1: INTRODUCTION ABOUT THIS USER GUIDE CHAPTER 1: INTRODUCTION The R3000 Authentication User Guide contains information about setting up authentication on the network. About this User Guide This user guide addresses the network administrator desig- nated to configure and manage the R3000 server on the network. Chapter 1 provides information on how to use this user guide, and also includes an overview of filtering compo- nents and authentication operations. Chapters 2, 3, and 4 descri
ملخص المحتوى في الصفحة رقم 14
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE blocker software installed; a glossary on authentication terms, and an index. How to Use this User Guide Conventions The following icons are used throughout this user guide: NOTE: The “note” icon is followed by italicized text providing additional information about the current subject. TIP: The “tip” icon is followed by italicized text giving you hints on how to execute a task more efficiently. WARNING: The “warning” icon is followed by it
ملخص المحتوى في الصفحة رقم 15
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE Terminology The following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box that opens in response to an entry you made in a dialog box, window, or screen. This box often contains a button (usually labeled “OK”) for you to click in order to confirm or execute a command. • button - an object in a dialog box, window, or screen that can be clicked with your mo
ملخص المحتوى في الصفحة رقم 16
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • dialog box - a box that opens in response to a command made in a window or screen, and requires your input. You must choose an option by clicking a button (such as “Yes” or “No”, or “Next” or “Cancel”) to execute your command. As dictated by this box, you also might need to make one or more entries or selections prior to clicking a button. • field - an area in a dialog box, window, or screen that either accommodates your data en
ملخص المحتوى في الصفحة رقم 17
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • pop-up box or pop-up window - a box or window that opens after you click a button in a dialog box, window, or screen. This box or window may display infor- mation, or may require you to make one or more entries. Unlike a dialog box, you do not need to choose between options. • pull-down menu - a field in a dialog box, window, or screen that contains a down-arrow to the right. When you click the arrow, a menu of items displays from
ملخص المحتوى في الصفحة رقم 18
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • sub-topic - a subset of a main topic that displays as a menu item for the topic. The menu of subtopics opens when a pertinent topic link in the left panel—the control panel—of a screen is clicked. If a sub-topic is selected, the window for that sub-topic displays in the right panel of the screen, or a pop-up window or an alert box opens, as appropriate. • text box - an area in a dialog box, window, or screen that accommodates you
ملخص المحتوى في الصفحة رقم 19
CHAPTER 1: INTRODUCTION HOW TO USE THIS USER GUIDE • tree - a tree displays in the control panel of a screen, and is comprised of a hierarchical list of items. An entity associated with a branch of the tree is preceded by a plus (+) sign when the branch is collapsed. By double-clicking the item, a minus (-) sign replaces the plus sign, and any entity within that branch of the tree displays. An item in the tree is selected by clicking it. • window - a window displays on a screen, an
ملخص المحتوى في الصفحة رقم 20
CHAPTER 1: INTRODUCTION FILTERING ELEMENTS Filtering Elements Filtering operations include the following elements: groups, filtering profiles and their components, and rules for filtering. Group Types In the Group section of the Administrator console, group types are structured in a tree format in the control panel. There are four group types in the tree list: • Global Group • IP groups • NT domain groups • LDAP domain groups NOTE: If authentication is enabled, the global administrator— wh