beautypg.com

8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Page 216

background image

A

PPENDIX

A: A

UTHENTICATION

O

PERATIONS

T

IER

1: S

INGLE

S

IGN

-O

N

A

UTHENTICATION

202

8

E

6 T

ECHNOLOGIES

, R3000 I

NTERNET

F

ILTER

A

UTHENTICATION

U

SER

G

UIDE

4. Upon creating the IPC share, the software in the R3000

queries the network authentication server with the user's
login name and password sent by the workstation.

5. Once the user is successfully authenticated, the R3000

matches the user’s login name or group name with a
stored list of profile settings in the R3000. As a result of
this process, the user is assigned the appropriate level of
filtering.

6. The matched profile is set for the user's IP address. The

IPC connection is completed and maintained with peri-
odic “keep-alives.”

7. When the user logs off, changes IP addresses, loses the

network connection, or in any way causes the IPC
connection to be altered or deactivated, the R3000
senses this change and returns the IP address to the
configured global filtering level.

WARNING: Authentication will fail if a Network Address Transla-
tion (NAT) device is set up between the authentication server and
end user clients. Authentication may also fail if network connec-
tions are overloaded, causing a severe delay in the transportation
of SMB traffic. This can be a problem in any network, but is most
prevalent in WAN links, or in trunk links that are overloaded.