CONTENTS
vi 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
R3000 Authentication Protocols ...................................................... 23
R3000 Authentication Tiers and Options ........................................ 23
R3000 authentication tiers ........................................................ 23
R3000 authentication options . .................................................. 24
Authentication Solution Compatibility .............................................. 25
Authentication System Deployment Options ................................... 26
Ports for Authentication System Access ......................................... 27
Configuring the R3000 for Authentication ....................................... 28
Configuration procedures ......................................................... 28
System section.................................................................... 28
Group section ..................................................................... 31
C
HAPTER
2: N
ETWORK
S
ETUP
........................................ 32
Environment Requirements .....................................................32
Workstation Requirements .............................................................. 32
Administrator ............................................................................ 32
End User ................................................................................... 33
Network Requirements .................................................................... 33
Set up the Network for Authentication ....................................34
Specify the operation mode ............................................................ 35
Specify the subnet mask, IP address(es) ........................................ 37
Invisible mode ........................................................................... 38
Router or firewall mode ............................................................ 38
Enable authentication, specify criteria ............................................. 39
Net use based authentication ................................................... 41
Web-based authentication . ....................................................... 42
Enter network settings for authentication ........................................ 45
Create an SSL certificate ................................................................ 47
Create, Download a Self-Signed Certificate ............................. 48
Create, Upload a Third Party Certificate ................................... 50
Create a Third Party Certificate........................................... 50
Upload a Third Party Certificate ......................................... 52
Download a Third Party Certificate .................................... 53
View log results ............................................................................... 54
Specify block page settings ............................................................. 57
Block Page Authentication ........................................................ 58
Block page ......................................................................... 59
User/Machine frame ..................................................... 60
Standard Links.............................................................. 60