Step 1: exclude filtering critical equipment – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Page 191

Advertising
background image

C

HAPTER

6: A

UTHENTICATION

D

EPLOYMENT

A

CTIVATE

A

UTHENTICATION

ON

THE

N

ETWORK

8

E

6 T

ECHNOLOGIES

, R3000 I

NTERNET

F

ILTER

A

UTHENTICATION

U

SER

G

UIDE

177

Activate Web-based authentication for the

Global Group

This selection of Web-based authentication creates more of
a

load on the R3000 than the IP Group selection, and

should only be used as an alternative to IP Group authenti-
cation.

Step 1: Exclude filtering critical equipment

This step involves the identification of equipment—such as

backup servers—you wish to be excluded from being
served the Authentication Request Form page.

For this step, you must choose one of two options:

Block Web access only – Select this option if you do not

want to log traffic for a machine that you set up to be
excluded from filtering on the network. Using this option,
you exclude the IP address of a machine via the Range
to Detect window. If you select this option, go to Step 1A.

Block Web access and log traffic – Select this option if

you wish to log traffic for a machine that you set up to be
excluded from filtering on the network. Using this option,
you create an IP profile for the machine via the Sub
Group

Profile window. If you select this option, go to Step

1B.

Advertising