Chapter 6: authentication deployment 152, Chapter 7: technical support 196 – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual
Page 9
C
ONTENTS
8
E
6 T
ECHNOLOGIES
, R3000 I
NTERNET
F
ILTER
A
UTHENTICATION
U
SER
G
UIDE
ix
Apply settings ......................................................................... 145
Create a Time Profile for the entity ............................................... 146
Add a Time Profile .................................................................. 146
Remove an entity’s profile from the tree ....................................... 151
Test Authentication Settings ................................................. 152
Test Web-based authentication settings ....................................... 154
Step 1: Create an IP Group, “test” .......................................... 154
Step 2: Create a Sub-Group, “workstation” . ........................... 155
Step 3: Set up “test” with a 32-bit net mask ............................ 156
Step 4: Give “workstation” a 32-bit net mask .......................... 157
Step 5: Block everything for the Sub-Group . .......................... 158
Step 6: Use Authentication Request Page for redirect URL . .. 159
Step 7: Disable filter options ................................................... 160
Step 8: Attempt to access Web content . ................................ 161
Test net use based authentication settings ................................... 163
Activate Authentication on the Network ............................... 164
Activate Web-based authentication for an IP Group ..................... 165
Step 1: Create a new IP Group, “webauth” ............................ 165
Step 2: Set “webauth” to cover users in range . ...................... 166
Step 3: Create an IP Sub-Group . ........................................... 167
Step 4: Block everything for the Sub-Group . .......................... 169
Step 5: Use Authentication Request Page for redirect URL . .. 170
Step 6: Disable filter options ................................................... 171
Step 7: Set Global Group to filter unknown traffic . ................. 172
Activate Web-based authentication for the Global Group ............. 177
Step 1: Exclude filtering critical equipment ............................. 177
Step 1A: Block Web access, logging via Range to Detect . .... 178
Range to Detect Settings .................................................. 178
Range to Detect Setup Wizard ......................................... 180
Step 1B: Block Web access via IP Sub-Group profile . ........... 186
Step 2: Modify the Global Group Profile . ................................ 189
Activate NT authentication ............................................................ 193
Step 1: Modify the 3-try login script ........................................ 193
Step 2: Modify the Global Group Profile ................................. 194