beautypg.com

Tier 2 implementation in an environment – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Page 224

background image

A

PPENDIX

A: A

UTHENTICATION

O

PERATIONS

T

IER

2: T

IME

-

BASED

, W

EB

A

UTHENTICATION

210

8

E

6 T

ECHNOLOGIES

, R3000 I

NTERNET

F

ILTER

A

UTHENTICATION

U

SER

G

UIDE

Tier 2 implementation in an environment

In an environment where Tier 2 time-based profiles have
been implemented, end users receive filtering profiles after
correctly entering their credentials into a Web-based
Authentication Request Form. A profile remains active for a
configurable amount of time even if the user logs out of the
workstation, changes IP addresses, etc.

Tier 2 time-based profiles do not call for the R3000 to main-
tain a connection with the client machine, so the R3000
cannot detect when the user logs off of a workstation. In
order to remove the end user’s profile, one of two scripts
detailed in this sub-section should be inserted into the
network’s login and/or logoff script.

The Tier 2 Script should be used if Tier 2 is the only tier
implemented in an environment. The Tier 1 and Tier 2 Script
should be used if Tier 2 is implemented along with Tier 1 in
an environment. Since both sets of scripts use the NET USE
command, the client machine must already have the ability
to connect to the R3000 via NET USE in order for the profile
to be removed in either environment.