8e6 Technologies ProxyBlocker Network Card User Manual


 
8E6 TECHNOLOGIES, PROXYBLOCKER USER GUIDE v
CONTENTS
INTRODUCTORY SECTION ...............................................1
8e6 ProxyBlocker ........................................................................1
About this User Guide ................................................................1
How to Use this User Guide .......................................................3
Conventions ......................................................................................3
Terminology ......................................................................................4
Overview ......................................................................................9
Environment Requirements .....................................................10
Workstation Requirements ..............................................................10
Network Requirements ....................................................................10
Chapter 1: Filtering Operations ...............................................11
Invisible Mode .................................................................................11
Global Group ............................................................................13
Static Filtering Profiles ..............................................................16
Master IP Group Filtering Profile.........................................16
IP Sub-Group Filtering Profile .............................................16
Individual IP Member Filtering Profile .................................16
Global Filtering Profile.........................................................17
Override Account Profile .....................................................17
Time Profile.........................................................................17
Lock Profile .........................................................................17
8e6 Supplied Categories.....................................................19
Custom Categories .............................................................19
Rules ........................................................................................20
Minimum Filtering Level ............................................................20
Filter Settings ............................................................................21
Filtering Rules .................................................................................22
Filtering Levels Applied ............................................................22
Chapter 2: Logging and Blocking ............................................25
Web Access Logging ......................................................................25
How IM and P2P Blocking Works .............................................26