OST Administration Guide - Optenet Knowledge Base ::OKB

Transcription

OST Administration Guide - Optenet Knowledge Base ::OKB
OST
Administration Guide
© Copyright 2014 Optenet SA Ltd. All rights reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by
any means without the written permission of OPTENET S.A., or its suppliers or affiliate companies.
Version History
Doc Version
Product
Date
Summary of Changes
v1b6
OST-6.4.300
19-06-2014
English Edits
v1b5
OST-6.4.300
13-06-2014
6.4.300 content added
v1b4
OST-6.4.200
17-03-2014
v1b3
OST-6.4.200
13-03-2014
v1b2
OST-6.4.110
14-11-2013
v1b1
OST-6.4.110
08-09-2013
v1b0
OST-6.4.104
13-06-2013
Table of Contents
OST...................................................................................................................... III
ADMINISTRATION GUIDE ................................................................................... III
Table of Contents ................................................................................................................................. v
Table of Figures .................................................................................................................................. ix
CHAPTER 1: INTRODUCING OST ...................................................................1-1
Using this manual .............................................................................................................................1-2
Glossary ..............................................................................................................................................1-3
Administration settings ....................................................................................................................1-5
CHAPTER 2: GENERAL ...................................................................................2-1
Status ..................................................................................................................................................2-2
Service web/wap .............................................................................................................................2-2
Service AdsFree ..............................................................................................................................2-3
Service Antiphishing ......................................................................................................................2-4
Service Antispam In .......................................................................................................................2-5
Service Antispam Out.....................................................................................................................2-6
Service Antivirus ............................................................................................................................2-7
Service Firewall ..............................................................................................................................2-8
Monitoring .........................................................................................................................................2-9
Traffic history .................................................................................................................................2-9
Cache status .................................................................................................................................. 2-10
Active connections....................................................................................................................... 2-11
General management .................................................................................................................... 2-11
Administrators .............................................................................................................................. 2-12
Schedule tasks .............................................................................................................................. 2-15
Backups ........................................................................................................................................ 2-17
Host & Process Control ............................................................................................................... 2-18
Host location ................................................................................................................................ 2-22
Filtering Log Configuration ........................................................................................................ 2-23
Events ........................................................................................................................................... 2-28
Alerts ............................................................................................................................................ 2-30
Password Control ......................................................................................................................... 2-32
External Servers ........................................................................................................................... 2-33
Account Management ................................................................................................................... 2-45
Provisioning ................................................................................................................................. 2-45
Client users ................................................................................................................................... 2-48
External Servers ........................................................................................................................... 2-50
Service Packages.......................................................................................................................... 2-51
Filtering Policies ............................................................................................................................ 2-55
WebSafe Personal Operation Guide
v
Policies ......................................................................................................................................... 2-57
Source & Destination................................................................................................................... 2-58
Schedules ...................................................................................................................................... 2-61
Advanced Configuration .............................................................................................................. 2-62
CHAPTER 3: WEB PROXY...............................................................................3-1
Filtering Policies ...............................................................................................................................3-2
Profiles ................................................................................................................................................3-8
Advanced Configuration .............................................................................................................. 3-11
Cache Settings .............................................................................................................................. 3-11
Authentication Settings ............................................................................................................... 3-16
PAC file ........................................................................................................................................ 3-16
CHAPTER 4: FTP PROXY ................................................................................4-1
Filtering Policies ...............................................................................................................................4-1
Profiles ................................................................................................................................................4-4
Reports ...............................................................................................................................................4-6
Service Reports ...............................................................................................................................4-6
Monitor Reports ..............................................................................................................................4-8
CHAPTER 5: WEB/WAP ...................................................................................5-1
Filtering Policies ...............................................................................................................................5-1
Profiles ................................................................................................................................................5-5
Category Management.................................................................................................................. 5-10
Black- & Whitelists........................................................................................................................ 5-13
Reports ............................................................................................................................................ 5-14
Service Reports ............................................................................................................................ 5-14
Monitor Reports ........................................................................................................................... 5-17
Advanced Configuration .............................................................................................................. 5-18
CHAPTER 6: ADSFREE ...................................................................................6-1
Filtering Policies ...............................................................................................................................6-1
Profiles ................................................................................................................................................6-4
Reports ...............................................................................................................................................6-6
Service Reports ...............................................................................................................................6-6
Monitor Reports ..............................................................................................................................6-8
CHAPTER 7: AUTOMATIC NOTICES ..............................................................7-1
Filtering Policies ...............................................................................................................................7-1
Profiles ................................................................................................................................................7-5
Reports ...............................................................................................................................................7-6
Service Reports ...............................................................................................................................7-7
Monitor Reports ..............................................................................................................................7-8
Advanced Configuration .................................................................................................................7-9
Redirection ......................................................................................................................................7-9
vi
WebSafe Personal Operation Guide
Banners Insertion ......................................................................................................................... 7-10
Smart Banner................................................................................................................................ 7-11
CHAPTER 8: ANTI-PHISHING..........................................................................8-1
Filtering Policies ...............................................................................................................................8-1
Profiles ................................................................................................................................................8-7
Black- & Whitelists...........................................................................................................................8-9
Quarantine ...................................................................................................................................... 8-10
Reports ............................................................................................................................................ 8-12
Service Reports ............................................................................................................................ 8-12
Monitor Reports ........................................................................................................................... 8-14
Advanced configuration................................................................................................................ 8-16
CHAPTER 9: ANTISPAM IN .............................................................................9-1
Filtering Policies ...............................................................................................................................9-1
Profiles ................................................................................................................................................9-5
Black- & Whitelists........................................................................................................................ 9-10
Quarantine ...................................................................................................................................... 9-10
Reports ............................................................................................................................................ 9-11
Service Reports ............................................................................................................................ 9-11
Monitor Reports ........................................................................................................................... 9-13
Advanced Configuration .............................................................................................................. 9-13
Filter Settings ............................................................................................................................... 9-13
Security Settings .......................................................................................................................... 9-17
Notifications & Quarantine ......................................................................................................... 9-19
CHAPTER 10: ANTISPAM OUT .....................................................................10-1
Filtering Policies ............................................................................................................................ 10-1
Profiles ............................................................................................................................................. 10-5
Black- & Whitelists...................................................................................................................... 10-10
Quarantine .................................................................................................................................... 10-11
Reports .......................................................................................................................................... 10-11
Service Reports .......................................................................................................................... 10-11
Monitor Reports ......................................................................................................................... 10-13
Advanced Configuration ............................................................................................................ 10-13
Filter Settings ............................................................................................................................. 10-13
Security Settings ........................................................................................................................ 10-15
Notifications & Quarantine ....................................................................................................... 10-17
CHAPTER 11: ANTIVIRUS .............................................................................11-1
Filtering Policies ............................................................................................................................ 11-1
Profiles ............................................................................................................................................. 11-5
Quarantine ...................................................................................................................................... 11-5
Mail Quarantine ........................................................................................................................... 11-5
Reports ............................................................................................................................................ 11-7
WebSafe Personal Operation Guide
vii
Service Reports ............................................................................................................................ 11-7
Monitor Reports ........................................................................................................................... 11-8
Advanced Configuration ............................................................................................................ 11-10
CHAPTER 12: FIREWALL ..............................................................................12-1
Filtering Policies ............................................................................................................................ 12-1
Profiles ............................................................................................................................................. 12-4
VoIP, IM & P2P ............................................................................................................................. 12-7
Custom Services ............................................................................................................................. 12-8
QoS & Bandwidh Management................................................................................................... 12-9
Routing ............................................................................................................................................ 12-9
Routing Policies ........................................................................................................................... 12-9
Static Routing Table .................................................................................................................. 12-10
Dynamic Routing Table ............................................................................................................ 12-11
Dynamic Routing Settings ........................................................................................................ 12-11
Reports .......................................................................................................................................... 12-14
Service Reports .......................................................................................................................... 12-14
Monitor Reports ......................................................................................................................... 12-16
CHAPTER 13: REPORTER.............................................................................13-1
Report Templates .......................................................................................................................... 13-1
Steps to execute a report .............................................................................................................. 13-6
Steps to execute a Report (Performance Reports) ..................................................................... 13-7
Report Results ............................................................................................................................ 13-10
Drill – Down Capabilities ......................................................................................................... 13-17
Exporting Reports ...................................................................................................................... 13-19
Programmed Reports .................................................................................................................. 13-20
CHAPTER 14: APPENDICES .........................................................................14-1
APPENDIX A: MONITORING MESSAGES DESCRIPTION ...........................14-2
Critical Events ................................................................................................................................ 14-2
Error Events ................................................................................................................................... 14-5
Warning Events ........................................................................................................................... 14-24
Informative Events ...................................................................................................................... 14-56
APPENDIX B: OST GENERAL CATEGORIES ............................................14-76
Importance of Categories within OST ..................................................................................... 14-76
Available Categories.................................................................................................................... 14-77
APPENDIX C: BORDER GATE PROTOCOL ...............................................14-82
viii
WebSafe Personal Operation Guide
Table of Figures
Figure 2-1: General Section ..............................................................................................................2-1
Figure 2-2: Web/wap dashboard.......................................................................................................2-2
Figure 2-3: AdsFree dashboard ........................................................................................................2-3
Figure 2-4: Antiphishing dashboard .................................................................................................2-4
Figure 2-5: Antispam In dashboard ..................................................................................................2-5
Figure 2-6: Antispam Out dashboard ...............................................................................................2-6
Figure 2-7: Antivirus dashboard .......................................................................................................2-7
Figure 2-8: Firewall dashboard .........................................................................................................2-8
Figure 2-9: Traffic history widget ................................................................................................. 2-10
Figure 2-10: Cache status widget .................................................................................................. 2-10
Figure 2-11: Active connection widget ......................................................................................... 2-11
Figure 2-12: Administrators ........................................................................................................... 2-12
Figure 2-13: Administrators password change ............................................................................. 2-14
Figure 2-14: Schedule tasks ........................................................................................................... 2-15
Figure 2-15: Backups ..................................................................................................................... 2-17
Figure 2-16: Hosts & Process Control .......................................................................................... 2-18
Figure 2-17: Host information ....................................................................................................... 2-20
Figure 2-18: CPU information ....................................................................................................... 2-21
Figure 2-19: Memory usage information ..................................................................................... 2-21
Figure 2-20: Modules performance configuration........................................................................ 2-22
Figure 2-21: Host location ............................................................................................................. 2-22
Figure 2-22: Logs configuration .................................................................................................... 2-25
Figure 2-23: Events ........................................................................................................................ 2-28
Figure 2-24: Events parameters ..................................................................................................... 2-29
Figure 2-25: Predefined events with triggering conditions.......................................................... 2-30
Figure 2-26: Alerts ......................................................................................................................... 2-30
Figure 2-27: New alert ................................................................................................................... 2-31
Figure 2-28: Predefined events with triggering conditions.......................................................... 2-32
WebSafe Personal Operation Guide
ix
Figure 2-29: Password security settings ........................................................................................ 2-32
Figure 2-30: External servers ......................................................................................................... 2-34
Figure 2-31: External server configuration ................................................................................... 2-36
Figure 2-32: SMTP cluster ............................................................................................................. 2-37
Figure 2-33: SMTP Server ............................................................................................................. 2-38
Figure 2-34: Proxy server .............................................................................................................. 2-39
Figure 2-35: LDAP Server ............................................................................................................. 2-40
Figure 2-36: Kerberos cluster ........................................................................................................ 2-42
Figure 2-37: Kerberos Server ........................................................................................................ 2-43
Figure 2-38: Provisioning customers ............................................................................................ 2-46
Figure 2-39: Client users ................................................................................................................ 2-48
Figure 2-40: Client external servers .............................................................................................. 2-50
Figure 2-41: Service Packages....................................................................................................... 2-51
Figure 2-42: Service details ........................................................................................................... 2-52
Figure 2-43: Creating packages of services .................................................................................. 2-54
Figure 2-44: Filtering policies ....................................................................................................... 2-58
Figure 2-45: Source&Destination .................................................................................................. 2-59
Figure 2-46: Schedules ................................................................................................................... 2-62
Figure 2-47: Advanced Configuration .......................................................................................... 2-63
Figure 3-1: Web Proxy Policies ........................................................................................................3-2
Figure 3-2: Web Proxy Policies: Status ...........................................................................................3-3
Figure 3-3: Web Proxy Policies: Source&Destination ...................................................................3-3
Figure 3-4: Web Proxy Policies: Action ..........................................................................................3-4
Figure 3-5: Web Proxy ssl-inspection: Invalid certificate ..............................................................3-7
Figure 3-6: Web Proxy Captive portal .............................................................................................3-8
Figure 3-7: Web Proxy Captive portal configuration ......................................................................3-8
Figure 3-8: Web Proxy Profiles ........................................................................................................3-9
Figure 3-9: Web Proxy Advanced Configuration......................................................................... 3-12
Figure 3-10: Web Proxy Authentication Settings......................................................................... 3-16
x
WebSafe Personal Operation Guide
Figure 3-11: Web Proxy PAC File ................................................................................................ 3-17
Figure 4-1: FTP Proxy Policies ........................................................................................................4-1
Figure 4-2: FTP Proxy Policies: Status ............................................................................................4-2
Figure 4-3: FTP Proxy Policies: Source&Destination ....................................................................4-2
Figure 4-4: FTP Proxy Policies: Action ...........................................................................................4-3
Figure 4-5: FTP Proxy Profiles.........................................................................................................4-5
Figure 4-6: FTP Proxy Service Reports ...........................................................................................4-7
Figure 4-7: FTP Proxy Service Reports ...........................................................................................4-9
Figure 5-1: WEB/WAP Filtering policies ........................................................................................5-1
Figure 5-2: WEB/WAP Filtering policies: Status ...........................................................................5-2
Figure 5-3: WEB/WAP Filtering policies: Action ..........................................................................5-3
Figure 5-4: WEB/WAP Profiles .......................................................................................................5-6
Figure 5-5: WEB/WAP Profiles: Files .............................................................................................5-7
Figure 5-6: WEB/WAP Profiles: Time Limit ..................................................................................5-8
Figure 5-7: WEB/WAP Profiles: Advanced ....................................................................................5-9
Figure 5-8: WEB/WAP Category Management ........................................................................... 5-11
Figure 5-9: WEB/WAP Category Management: New Category................................................. 5-12
Figure 5-10: WEB/WAP Black- &Whitelists ............................................................................... 5-14
Figure 5-11: WEB/WAP Service Reports .................................................................................... 5-15
Figure 5-12: WEB/WAP Monitor Reports: Visualization ........................................................... 5-16
Figure 5-13: WEB/WAP Monitor Reports ................................................................................... 5-17
Figure 5-14: WEB/WAP Advanced configuration....................................................................... 5-18
Figure 6-1: AdsFree Filtering Policies .............................................................................................6-1
Figure 6-2: AdsFree Filtering Policies: Status.................................................................................6-2
Figure 6-3: AdsFree Filtering Policies: Actions ..............................................................................6-3
Figure 6-4: AdsFree Profiles .............................................................................................................6-5
Figure 6-5: AdsFree Service Reports ...............................................................................................6-7
Figure 6-6: AdsFree Monitor Reports ..............................................................................................6-8
Figure 7-1: Automatic Notices .........................................................................................................7-1
WebSafe Personal Operation Guide
xi
Figure 7-2: Automatic Notices Policies: Status ...............................................................................7-2
Figure 7-3: Automatic Notices Policies: Actions ............................................................................7-3
Figure 7-4: Automatic Notices Profiles: Category ..........................................................................7-5
Figure 7-5: Automatic Notices Policies: Frequency .......................................................................7-6
Figure 7-6: Automatic Notices Service Reports ..............................................................................7-7
Figure 7-7: Automatic Notices Monitor Reports.............................................................................7-9
Figure 7-8: Automatic Notices Advanced Configuration: Redirection .........................................7-9
Figure 7-9: Automatic Notices Advanced Configuration: Redirection edition .......................... 7-10
Figure 7-10: Automatic Notices Advanced Configuration: Banners insertion .......................... 7-10
Figure 7-11: Automatic Notices Advanced Configuration: Banners edition ............................. 7-11
Figure 7-12: Automatic Notices Advanced Configuration: Smart Banners list ......................... 7-12
Figure 7-13: Automatic Notices Advanced Configuration: Smart Banners edition .................. 7-12
Figure 8-1: Antiphising .....................................................................................................................8-1
Figure 8-2: AntiPhishing Policies: Status ........................................................................................8-2
Figure 8-3: Antiphising Policies: Source&Destination...................................................................8-3
Figure 8-4: Antiphishing Policies: Web Actions .............................................................................8-4
Figure 8-5: Antiphishing Policies: Mail actions ..............................................................................8-5
Figure 8-6: Antiphising Profiles: Protocol .......................................................................................8-8
Figure 8-7: Antiphishing Black- &Whitelists ............................................................................... 8-10
Figure 8-8: AntiPhishing Quarantine ............................................................................................ 8-11
Figure 8-9: AntiPhishing Quarantine: Search ............................................................................... 8-11
Figure 8-10: AntiPhishing Service Reports .................................................................................. 8-13
Figure 8-11: AntiPhishing Monitor Reports ................................................................................. 8-15
Figure 8-12: AntiPhishing Advanced Configuration ................................................................... 8-16
Figure 9-1: Antispam.........................................................................................................................9-1
Figure 9-2: Antispam policies: status ...............................................................................................9-2
Figure 9-3: Antispam policies: Actions ...........................................................................................9-3
Figure 9-4: Antispam profiles: Protocols .........................................................................................9-5
Figure 9-5: Antispam profiles: Spam ...............................................................................................9-6
xii
WebSafe Personal Operation Guide
Figure 9-6: Antispam profiles: Sender .............................................................................................9-7
Figure 9-7: Volumetry .......................................................................................................................9-8
Figure 9-8: Antispam profiles: Attachment .....................................................................................9-8
Figure 9-9: Antispam profiles: Advanced ........................................................................................9-9
Figure 9-10: Antispam Black- &Whitelists .................................................................................. 9-10
Figure 9-11: Antispam Service Reports ........................................................................................ 9-12
Figure 9-12: Antispam Monitor Reports ....................................................................................... 9-13
Figure 9-13: Antispam Advanced Configuration: Filter Settings ............................................... 9-14
Figure 9-14: Antispam Advanced Configuration: MTA DoS ..................................................... 9-17
Figure 9-15: Antispam Advanced Configuration: Security Settings........................................... 9-18
Figure 9-16: Antispam Advanced Configuration: Notifications & Quarantine ......................... 9-19
Figure 10-1: Antispam Out ............................................................................................................ 10-1
Figure 10-2: Antispam Out policies .............................................................................................. 10-2
Figure 10-3: Antispam Out policies: Actions ............................................................................... 10-3
Figure 10-4: Antispam Out profiles .............................................................................................. 10-5
Figure 10-5: Antispam Out profiles: Spam................................................................................... 10-6
Figure 10-6: Antispam Out profiles: Sender................................................................................. 10-7
Figure 10-7: Antispam Out profiles: Attachment ......................................................................... 10-8
Figure 10-8: Antispam Out profiles: Advanced ........................................................................... 10-9
Figure 10-9: Antispam Out Black- &Whitelists ......................................................................... 10-10
Figure 10-10: Antispam Out Service Reports............................................................................. 10-12
Figure 10-11: Antispam Out Monitor Reports ........................................................................... 10-13
Figure 10-12: Antispam Out Advanced Configuration: Filter Settings .................................... 10-14
Figure 10-13: Antispam Out Advanced Configuration: Security Settings ............................... 10-16
Figure 10-14: Antispam Out Advanced Conf.: Notifications&Quarantine .............................. 10-17
Figure 11-1: Antivirus .................................................................................................................... 11-1
Figure 11-2: Antivirus policies: Status.......................................................................................... 11-2
Figure 11-3: Antivirus policies: Web/WAP Actions ................................................................... 11-3
Figure 11-4: Antivirus policies: Mail Actions .............................................................................. 11-4
WebSafe Personal Operation Guide
xiii
Figure 11-5: Antivirus profiles ...................................................................................................... 11-5
Figure 11-6: Antivirus quarantine ................................................................................................. 11-6
Figure 11-7: Antivirus Quarantine: Search ................................................................................... 11-6
Figure 11-8: Antivirus Reports ...................................................................................................... 11-8
Figure 11-9: Antivirus Monitor Reports ....................................................................................... 11-9
Figure 11-10: Antivirus Advanced Configuration ..................................................................... 11-10
Figure 12-1: Firewall ...................................................................................................................... 12-1
Figure 12-2: Firewall policies: Status ........................................................................................... 12-2
Figure 12-3: Firewall policies: Actions ......................................................................................... 12-3
Figure 12-4: Firewall profiles ........................................................................................................ 12-5
Figure 12-5: Firewall VoIP, IM and P2P ...................................................................................... 12-7
Figure 12-6: Firewall Custom Services ......................................................................................... 12-8
Figure 12-7: Firewall QoS Bandwidth Management ................................................................... 12-9
Figure 12-8: Routing Policies ...................................................................................................... 12-10
Figure 12-9: Firewall Static Routing Table ................................................................................ 12-10
Figure 12-10: Firewall new route ................................................................................................ 12-11
Figure 12-11: Firewall Dynamic Routing Table ........................................................................ 12-11
Figure 12-12: Firewall Dynamic Routing Settings .................................................................... 12-12
Figure 12-13: Firewall Edit Network .......................................................................................... 12-12
Figure 12-14: Firewall Edit Neighbor ......................................................................................... 12-13
Figure 12-15: Firewall Service Reports ...................................................................................... 12-14
Figure 12-16: Firewall Monitor Reports ..................................................................................... 12-16
Figure 13-1: Report Templates ...................................................................................................... 13-3
Figure 13-2: Report Details ........................................................................................................... 13-7
Figure 13-3: Performance Report .................................................................................................. 13-8
Figure 13-4: Report Table format................................................................................................ 13-11
Figure 13-5: Report Details ......................................................................................................... 13-12
Figure 13-6: Report Table format: Two level Grouping criteria ............................................... 13-13
Figure 13-7: Report Chart format (Columns) ............................................................................. 13-14
xiv
WebSafe Personal Operation Guide
Figure 13-8: Report Chart format (Lines) ................................................................................... 13-15
Figure 13-9: Report Chart format (Pie chart) ............................................................................. 13-15
Figure 13-10: Report Chart format: Report criteria ................................................................... 13-16
Figure 13-11: Report Chart format: Two-level Grouping criteria............................................. 13-17
Figure 13-12: Report Drill-Down Capabilities ........................................................................... 13-18
Figure 13-13: Report chart conditions ........................................................................................ 13-19
Figure 13-14: Programmed Reports ............................................................................................ 13-20
Figure 13-15: Programmed report configuration........................................................................ 13-21
Figure 14-1: Categorization of URLs .......................................................................................... 14-76
WebSafe Personal Operation Guide
xv
Chapter 1: Introducing OST
Optenet offers a security suite solution designed specifically for Internet Service
Providers (ISPs) and mobile operators: OST (OST). Its architecture is designed to
provide highly effective and efficient content filtering and security services with
scalability, fault tolerance, straightforward administration and high availability for the
operator’s users.
Currently, Optenet’s OST provides the following content filtering services to operators’
users:

Web/WAP Content Filtering: This service allows blocking
browsing sites within specific categories (such as pornography,
games, drugs, etc.), set up whitelists and blacklists of sites, prevent
certain file types from being downloaded, set schedules for rules in
order to define when access is available and establish time limits
on browsing.

Automatic Notices: This service allows operators to display
notifications to their clients by redirecting their navigation to a
given URL.

Antiphishing: Protection from potential and verified fraud sites
that try to obtain sensible user information simulating other
legitimate websites, including emails containing links to these
sites.

Antispam: Spam messages can be filtered using a range of spam
detection methods, as well as whitelists and blacklists that allow
spam to be deleted, rerouted to an external account, tagged or sent
to a quarantine fileserver.

Antivirus/Antispyware Engine: The antivirus engine provides
users with an automatic antivirus check when downloading files.
Moreover, it is possible to scan e-mails messages during the
download and, if a virus is detected, send them to quarantine, clean
them, tag them and/or remove the attachment from such messages.
Within the antivirus engine, OST allows users to protect sensitive
information so that any attempt to upload this information is
automatically blocked. Users can define a list of trusted sites.

Firewall: A virtualized firewall service for the end-user is available
with OST, allowing firewall functions for each user.

Messages/User alerts: OST enables operators to send specific
messages to end-users based on rules defined for each profile or
type of service.
WebSafe Personal Operation Guide
1-1
All modules have an information reporter so that the end-user can see logs of activity
for any configured service.
Using this manual
This manual explains how to configure and use the OST product.
Status
3.2
Monitoring
3.3
General Management
3.4
Account Management
3.5
Filtering Policies
3.6
Advanced Configuration
4
Web Proxy
5
Web / WAP
5.1
Filtering Policies
5.2
Profiles
5.3
Category Management
5.4
Black- & Whitelists
5.6
Advanced Configuration
6
AdsFree
7
Automatic Notices
8
Antiphishing
1-2
Categorization
Monitor Admin.
3.1
Categorization
Operator L2
General
Categorization
Operator L1
3
Content Service
Administrator
Administration settings
Customer Care
Manager
2
Categorization
Manager
Menu
Introduction
Monitor
Manager
1
Operations
Manager
This manual is aimed at several different audiences. The information is intended
primarily for network administrators responsible for OST. In the following table,
various reading paths are suggested.
WebSafe Personal Operation Guide
8.3
Black- & Whitelists
9
Antispam In
9.3
Black- & Whitelists
10
Antispam Out
10.3
Black- & Whitelists
11
Antivirus
12
Firewall
13
Reporter
14.1
Report Templates
Categorization
Monitor Admin.
Categorization
Operator L2
Categorization
Operator L1
Content Service
Administrator
Customer Care
Manager
Categorization
Manager
Monitor
Manager
Operations
Manager
Menu
Appendices
A
B
Appendix A: Monitoring Messages
Description
Appendix B: OST General Categories
C
Appendix C: Border Gate Protocol
Glossary
Term
Descriptor
APS
AS
CCOTTA
CPU
DMZ
DNS
DoS
Enduser
FTP
GUI
Optenet Professional Services
Autonomous System
Carrier Class OPTENET Transparent Traffic Analyzer
Central Processing Unit
Demilitarized Zone
Domain Name System
Denial of Service
Operator’s customer
File Transfer Protocol
Graphic Unit Interfaces
WebSafe Personal Operation Guide
1-3
1-4
Term
Descriptor
HTTP
IDS
IM
IPS
ISP
LDAP
MAC
MMS
MMSC
MSISDN
NTLM
OCP
OPM
ORA
ORT
OWS
P2P
POP
SMTP
SNMP
SSL
TCP
UDP
URL
UTM
VLAN
VoIP
WAP
WOLF
WML
OST
Hyper Text Transfer Protocol
Intrusion Detection System
Instant Messaging
Intrusion Protection System
Internet Service Provider
Lighweight Directory Access Protocol
Medium Access Control
Multimedia Messaging Service
Multimedia Messaging Service Center
Mobile Station Integrated Services Digital Network
NT LAN Management
OPTENET Communication Protocol
OPTENET Process Monitor
OPTENET Radius Accounting
OPTENET Reporting Tool
OPTENET Web Server
Peer to Peer
Post Office Protocol
Simple Mail Transfer Protocol
Simple Network Management Protocol
Secure Socket Layer
Transmission Control Protocol
User Datagram Protocol
Uniform Resource Locator
Unified Threat Management
Virtual LAN
Voice over IP
Wireless Application Protocol
Web-content Optenet Legal Filter
Wireless Markup Language
Web Safe Personal
WebSafe Personal Operation Guide
Administration settings
To access the Administration GUI, open a browser and enter the IP and port where the
Web Server (WS) module is installed. The WS for administration of the ISP is typically
deployed in the DMZ and the WS for end-users in a public area of the network with a
Firewall in between.
OST includes by default a System Administrator type user (“user_sys/123456”), which
has the highest privileges for managing the system. To change them you must access the
“Administrators” section of the Administration Website of the ISP.
You are recommended to perform all administration tasks using the web interface. Once
OST is up and running, you can implement any operational changes through the web
administration interface.
The Administration GUI displays several top tabs, which correspond to the different
services together with a General tab for global settings. A specific menu is displayed on
the left when selecting each tab.
WebSafe Personal Operation Guide
1-5
Chapter 2: General
This section provides information about the global settings of the solution and allows
for their modification. This section comprises of five sub-sections: Status, Monitoring,
General Management, Account Management, Filtering Policies and Advanced
Configuration.
Figure 2-1: General Section
WebSafe Personal Operation Guide
2-1
Status
OST provides, as part of its Unified Thread Management (UTM) console, a dashboard
to monitor filtering activity and threats. This is the first screen shown when accessing
the Administrator GUI and it provides the status of the different available services and
working mode (On | Off | Monitor mode | Failure), enabling administrators to change
the status of any given service.

When a Service is set to [ON], all filtering policies associated to
the Service will be applied (whenever they match the filtering
criteria), and filtering activity will be logged.

When a Service is set to [Monitor], filtering policies will not be
applied (no blocking action is applied), although information is
registered in logs as though the policy had been applied. This
working mode is ideal to test “what would have happened if
defined policies were active).

When a Service is set to [OFF], filtering policies will not be
applied and no information will be registered on logs.
This screen also displays the general status of the hosts where the application has been
installed. This information is updated every 120 seconds.
Finally, a dashboard widget will be shown per Service, summarizing filtering behavior
during last 24 hours (only widgets related to licensed services are being shown). This
information will also be refreshed every 120 seconds.
Available widgets to monitor Service filtering are:
Service web/wap
Figure 2-2: Web/wap dashboard
2-2
WebSafe Personal Operation Guide

Represented Time Frame: Last 24 hours

Upper left corner:
o
Table with summarized information about requests
managed by all web filtering services (Web / Wap,
Antivirus web, Antiphishing web):

Average Clients / hour.

Total Requests.

Total Blocks.

Max. Requests / hour.

Min. Requests / hour.

Average Requests / hour.
o
Lower left corner: Top 5 visited domains. There is a sixth
item (sector), [Others], representing the rest of blocked
domains.
o
Pie Chart: Top 5 blocked Webpages Categories.
o
Columns Chart: Breakdown of top 5 blocked categories
per hour.
Service AdsFree
Figure 2-3: AdsFree dashboard
WebSafe Personal Operation Guide
2-3

Represented Time Frame: Last 24 hours

Upper left corner:
o
Table with summarized information about blocked Ads:

Total number of blocked Ads

Max. Blocks / hour

Min. Blocks / hour

Average Blocks / hour
o
Lower left corner: Top 5 blocked domains
o
Pie Chart: Distribution of blocks by Ad Type (Banners,
Pop-ups, animated Gifs)
o
Columns Chart: Hourly breakdown of the same infomation
represented by the Pie chart.
Service Antiphishing
Figure 2-4: Antiphishing dashboard
2-4
WebSafe Personal Operation Guide

Represented Time Frame: Last 24 hours

Upper left corner:
o
Table with summarized information about blocked
phishing web sites and/or blocked phishing emails.

Total number of attacks

Max. Attacks / hour

Min. Attacks / hour

Average Attacks / hour
o
Lower left corner: Top 5 Phishing sites (most blocked
domains)
o
Pie Chart: Distribution of blocks by type (mail and Web)
o
Columns Chart: Hourly breakdown of the same infomation
represented by the Pie chart.
Service Antispam In
Figure 2-5: Antispam In dashboard
WebSafe Personal Operation Guide
2-5

Represented Time Frame: Last 24 hours

Upper left corner:
o
Table with summarized information about blocked emails
by AntiSpam.in policies. That is, not considering those
emails blocked for AntiPhishing or Antivirus policies.

Average Clients / hour

Total number of Spam emails.

Max. Number of Spam emails / hour.

Min. number of Spam email / hour.

Average number of Spam emails / hour.
o
Lower left corner: Top 5 blocked Spammers (IPs).
o
Pie Chart: Mail blocked vs Delivered.
o
Columns Chart: Hourly breakdown of the same infomation
represented by the Pie chart.
Service Antispam Out
Figure 2-6: Antispam Out dashboard
2-6
WebSafe Personal Operation Guide

Represented Time Frame: Last 24 hours
o
Upper left corner:
o
Table with summarized information about blocked emails
by AntiSpam.out policies (blocked outgoing emails).

Average Clients / hour

Total number of outgoing Spam emails.

Max. Number of outgoing Spam emails / hour.

Min. number of outgoing Spam email / hour.

Average number of outgoing Spam emails / hour.
o
Lower left corner: Top 5 blocked Spammers (IPs).
o
Pie Chart: Mail blocked vs Delivered.
o
Columns Chart: Hourly breakdown of the same infomation
represented by the Pie chart.
Service Antivirus
Figure 2-7: Antivirus dashboard
WebSafe Personal Operation Guide
2-7

Represented Time Frame: Last 24 hours

Upper left corner:
o
Table with summarized information about blocked web
content and/or emails due to Antivirus policies.

Total number of detected viruses.

Max. Number of detected Viruses / hour.

Min. number of detected Viruses / hour.

Average number of detected Viruses / hour.
o
Lower left corner: Top 5 detected viruses.
o
Pie Chart: Distribution of blocks by type (mail and Web /
Wap)
o
Columns Chart: Hourly breakdown of the same infomation
represented by the Pie chart.
Service Firewall
Figure 2-8: Firewall dashboard
2-8
WebSafe Personal Operation Guide

Represented Time Frame: Last 24 hours.

Upper left corner:
o
Table with summarized information about blocked
requests by Firewall protection policies.

Average number of Clients / hour.

Total number of blocked Connections.

Max. Number of blocked Connections/ hour.

Min. number of blocked Connections / hour.

Average number of blocked Connections / hour.
o
Lower left corner: Top 5 blocked Services (protocols,
patterns …). There is a sixth item (sector), [Others],
representing the rest of blocked Services.
o
Pie Chart: Top 5 blocked protocols.
o
Columns Chart: Hourly breakdown of the same infomation
represented by the Pie chart.
Monitoring
This section shows real time monitoring widgets oriented to verify traffic being
managed by OST appliances. These widgets are:

Traffic History.

Cache status

Active connections.
Traffic history
WebSafe Personal Operation Guide
2-9
Figure 2-9: Traffic history widget

Purpose: Monitor traffic in kbps in Ethernet ports (Eths)

Multiple instances of this widget can be added (in order to monitor
different servers / Eths separately).

Widget configuration:
o
Time period to be taken into account: Last 60 minutes |
Last 24 hours | Last 30 Days
o
Server and list of Eths (and traffic direction) to be
monitored.
o
Refresh Rate: Slow | Medium | Fast. Refresh rate relative
to time period to be taken into account.
Traffic log is not active by default. If you plan to monitor traffic activity, remember to
activate traffic activity logging in section [General >> General Management >> Filtering
Log Configuration].
Cache status
Figure 2-10: Cache status widget
2-10
WebSafe Personal Operation Guide

Purpose: Monitor Cache hits vs. Cache misses (only in proxy
deployment mode, with cache service active).

Widget configuration:
o
Time period to be taken into account: Last 60 minutes |
Last 24 hours | Last 30 Days
o
Refresh Rate: Slow | Medium | Fast. Refresh rate relative
to time period to be taken into account.
Active connections
Figure 2-11: Active connection widget

Purpose: Monitor number of active connections per CCOTTA
instance.

Widget configuration:
o
Time period to be taken into account: Last 60 minutes |
Last 24 hours | Last 30 Days
o
Servers and CCOTTA instances to be monitored.
o
Refresh Rate: Slow | Medium | Fast. Refresh rate relative
to time period to be taken into account.
General management
This section allows the root administrator to configure different general settings on the
system. It is possible to create and manage other administrator accounts, create or
modify scheduled actions for modules, backup system configuration and database files,
get hosts and modules information and carry on several actions on them, configure
alarms and alerts, etc. The left part of the screen will display a submenu for all these
options.
WebSafe Personal Operation Guide
2-11
Administrators
Figure 2-12: Administrators
In this section, you can perform actions on the system administrators, e.g. add a new
administrator or change the status of an existing one. Only an administrator with the
highest level of permission can manage other administrators of the web interface. The
types of administrators that can be created by default are:
2-12
WebSafe Personal Operation Guide

Quarantine Administrator: can manage the quarantine of the
customers. Search, delete and un block emails from the customers.

Customer Care Administrator: can manage customer accounts, and
edit their provisioned services.

Categorization Administrator: can manage categories and URL
classification.

Monitor Administrator: has access to the reporting tool.

Operations Administrator: can access all options.

Override Blocking Administrator: Virtual administrator whose
password can be used to access some restricted WebPages
(whenever a web/wap blocking policy has as action “block with
password override”).

User Group Manager: similar to monitor administrator but can
only create reports with data of associated users and/or groups.
This manager has to be associated to a set of LDAP users and
groups.

Content Service Administrator: can access General settings and
WOLF service options.

Categorization Operator L1: aimed at legal department users, this
type of administrator can manage the content of the custom legal
blacklists and categories

Categorization Operator L2: this is a restricted version of the
previous administrator type, which can only check how a URL is
categorized both in WOLF and Web/Wap filter.

Categorization Monitor Administrator: can create WOLF related
reports and access the content of custom categories to export their
content.

Read only administrator: can access all options but with read-only
permissions.
Note: Each type of administrator has access to different sections of the interface
depending on associated rights. These settings are highly dependent on the needs of each
Operator
WebSafe Personal Operation Guide
2-13
Administrators can be created locally, using “Optenet’s Database”, or they can be read
from a LDAP. In the first case, when creating an administrator you must enter its user
name and password. On the other hand, if the administrator is created from a LDAP,
you just need to enter its user name and select the LDAP from where the password will
be read.
Administrators can change their password by editing their details. In this case, the
administrator will be requested to enter the current password. This only applies to
administrators created in Optenet’s Database.
Figure 2-13: Administrators password change
2-14
WebSafe Personal Operation Guide
Schedule tasks
Figure 2-14: Schedule tasks
You can schedule maintenance tasks using the web administration interface. To do so,
click on the Scheduled Tasks option in the menu on the left-hand side. In this section,
you can schedule tasks globally, i.e. for all modules, or just for specific ones.
When you program a task at global level, all modules that can perform that kind of task
will execute it. When you program a task at module level (e.g. Web Filter), only the
selected type of module will execute it. You can also configure triggers, specific dates
and actions for the tasks. Actions can be a predefined function (e.g. CompactDatabase)
or specific shell commands that are executed as an action.
Example: an example of a scheduled task is the backup operation that Central Manager
executes periodically (by default every day at 01:00 am) to back up the information in its
database (clients, configuration files, etc.)
There is a different list of predefined functions for every given module. Some of them
will be scheduled by default:
WebSafe Personal Operation Guide
2-15
Task scheduled by default:
Module
Task Name
Schedule
Purpose
UpdateAVBases
Daily, from 1:00 to 5:00 h Updates Antivirus Signatures.
ConfigBackup
Daily, from 1:00 to 5:00
h, retries every hour
CompactDatabase
Daily, from 1:00 to 3:00,
retries each 30 minutes
Central Manager
EndPoint Agent
EndPoint Agent
Daily, From 09:00 to
EndPointUpdateAVBases 11:00, retries each 30
minutes
Daily, from 14:00 to
EndPointAVScan
16:00, retries each 30
minutes
Makes a backup copy of the
configuration files.
Compacts all *.dat files (directory
“/database”).
Performs save and reload database
operations (administrators, users, etc.)
so that the .dat files are free of pending
[ADD] and [DELETE] operations.
Downloads to EndPoints, latest
versions of AV signatures
(incremental).
Executes the antivirus Scan in
EndPoints (all units).
Unscheduled task
Module
Task Name
Purpose
Reloads to memory the .conf configuration files, which could
have been modified externally.
Global (All
modules)
ReloadConfiguration
ConsolidateURLs
WebFilter
CompactDatabase
Warning: the configuration files may be reloaded by
the OST modules. Optenet does not recommend
scheduling this task. The configuration is reloaded by each
module when it is modified via web.
Consolidates the URL lists that WF initially loads and those
generated by traffic. It verifies the consistency of the list and if
there is an inconsistency, the cache list takes priority. It then
saves them to disk in their respective .crp files
Performs save and reload database operations so that the .dat
files used by WebFilter module are free of pending [ADD] and
[DELETE] operations.
Backups the following directories:
 Database directory.

Optenet’s lists

Custom Lists

Logs (directories ./log)
Backup
Central Manager
UpdateAVBases
DownloadCRPs
ResolveWolfUrls
2-16
Verifies the antivirus license and if it is valid, updates the lists
for the Antivirus module.
Downloads the complete .crp lists from the Optenet global
Servers (repository of categorized urls).
This is a WOLF specific task. Central Manager will resolve
through the DNS all domains associated to all URLs of the
legal lists (both Optenet’s and Custom’s), and will provide
CCOTTA with the list of resulting IP addresses through the
file listblackip.crp.
WebSafe Personal Operation Guide
Note: You can also schedule a task that executes a user-defined shell command/script.
Backups
This section helps managing the backups created periodically by the Central Manager.
You can create backups (specifying the type of information to be backed up from the
Central Manager database), query the type of information and files contained in a
particular backup, and delete a backup.
OST makes backup copies of system files. OST can, for example, be programmed to
make a backup copy of any of the databases used by the system. Since it is the system
that makes the backup copy, the administrator can be sure that the backup copy is
consistent and uncorrupted.
Figure 2-15: Backups
Backup copies of the OST files can be made using the web administration interface. The
OST files that can be backed up are:
WebSafe Personal Operation Guide
2-17

Configuration files: backup of all configuration data, including
modules configuration files, database of clients, filtering
configuration files and transactions.

Database files: backup of the database of clients.

Optenet lists: backup of Optenet’s URL, virus and spam signatures
lists.

Operator’s lists: backup of customer’s customized lists.

Logs: backup of log files.
Note: Optenet recommends performing the following backups:
1. a daily backup of the transaction files and the database;
2. a daily backup of the logs;
3. a monthly backup of the configuration files, client profiles and templates.
Note: The restore process is a very delicate operation. This is the reason why it is not
possible to carry out a restore operation through the interface. If you need to restore a
previously saved backup, please contact APS.
Host & Process Control
Figure 2-16: Hosts & Process Control
2-18
WebSafe Personal Operation Guide
In this section, the status, module group and the available actions for modules in a host
are shown. Bear in mind that the Process Monitor module controls all other OST
modules. Therefore, if the administrator stops one of the modules using Linux
commands (kill), the Process Monitor will detect that the module is not responding,
raise an alarm and restart the module. This really depends on how the Process Monitor
is configured and what it is supposed to do in such an event. Hence, Optenet
recommends using the Web Administration interface to manage the modules and
processes of the OST architecture.
The available actions are:

Restart: terminates and completely restarts the module in a single
step.

Suspend: temporarily stops the module.

Resume: starts a suspended module.

Flush logs: forces the module to write the logs in the hard disk.

Reset counter: resets the counter of start attempts. When the
Process Monitor has made “N” attempts to start a module, this
module goes into Exhausted mode. The Process Monitor will not
attempt to start the module until the counter is reset.

Set Debug: enables debug mode.
Warning: Stopping the Central Manager or WebServer modules will prevent the web
interface from working.
By clicking on a host name, CPU, Memory or Hard Disk usage or in one of the module
names, a new window will be opened showing relevant information. Some examples are
shown below:
WebSafe Personal Operation Guide
2-19
Figure 2-17: Host information
2-20
WebSafe Personal Operation Guide
Figure 2-18: CPU information
Figure 2-19: Memory usage information
As shown in the image below, the performance of each module can be monitored. You
can set specific performance thresholds for each module. If these thresholds are
exceeded, an event will be triggered, which can be associated to an alert (see section
Alerts). Also, modules can be restarted automatically by ticking the corresponding
checkbox.
WebSafe Personal Operation Guide
2-21
Figure 2-20: Modules performance configuration
Finally, if the SNMP service is enabled, the OST will respond to SNMP queries.
Host location
This screen displays a list of all hosts present in the installation and their physical
location if this has been defined. Hosts with the same physical location share the same
local Central Manager when the Extended Central Manager mode is in place. You can
define and modify hosts physical location. To do so, click the button in the location
column, enter the new location in the text box and click again to accept the changes.
You can also permanently delete a host from the installation by clicking delete on the
action column, or change the status from enable to disable by clicking the button on the
status column.
Figure 2-21: Host location
Warning: It is highly recommended to avoid changing these parameters. The “Delete”
action is irreversible and involves deleting both the host and the modules installed on it.
2-22
WebSafe Personal Operation Guide
Filtering Log Configuration
Basic Concepts
This section explains the basic concepts to be taken into account when querying the
Reporter Module. There are two types of reports, depending on the data source type
being selected:

Monitor reports: these reports can query and consult raw logs
generated by the different filtering modules of the solution
(WebFilter, SMTPFilter, CCOTTA etc). They allow a complete
and detailed track of the traffic being processed by the solution.
o
Logs are stored in plain text, except some exceptions
where encryption is required for privacy purposes.
o
At service level it is possible to configure what to log:
nothing, all requests, only blocks, as indicated in each
filtering policy.
The administrator must adjust what has to be logged,
looking for a balance between performance, required disk
space and the type of reports needed.
For instance, if Firewall Service is configured to log all
requests, i.e. a record per connection, daily logs may have
a large size. Hence it could be more appropriate to log only
blocks or log as indicated in each filtering policy.
Such a configuration where accesses are not logged,
impacts the type of reports available. For example reports
based on accesses would have no sense, since no
information regarding allowed connections would have
been logged.

Service Reports: Report Modules periodically consolidate the logs
generated by the different filtering modules, and accumulate the
information in an optimized format in order to speed up the
execution of queries and provide the scalability required by ISPs,
MSPs and large enterprises. Service reports provide an intuitive
way to obtain summarized reports facilitating the analysis of
threats, customer’s behavior, policy enforcement etc.
o
Logs are stored in binary format, to improve performance.
o
Simultaneous accumulation in different time units.
It is possible to query the system and/or execute predefined reports, from two different
option menus:
WebSafe Personal Operation Guide
2-23

Service Name >> Reports
>> Service Reports
>> Monitor Reports

Reporter >> Report Templates
The system can be queried in order to obtain information about the activity of any
filtering service:

Information to be calculated.

Grouping criteria (up to two levels).

Ordering criteria.

Filtering criteria.

Time Range to be considered.
The following table summarizes the information that can be calculated (these may vary
depending on the Service):
Calculated Field
Blocks
Accesses
Requests
Total
Size
Pages Viewed
2-24
Comments
Total number of blocked request (according to filtering policies
managed by a given service).
Total number of allowed request:
 Either by a filtering policy with “Bypass” as action
 Or those allowed by default since no blocking policy was
applied
Total number of requests (Blocked ones + Allowed ones)
Number of operations (redirections in AutoNotices Service,
Size of the Processed request measured in bytes.
Depending on the service it can represent:
 The size of processed mail (in case of mail filtering services)
 The size of t
Number of visited web pages (web/wap filtering service).
From the requests, the system estimates the number of pages that
users have been browsing (differentiating pages from embedded
resources).
WebSafe Personal Operation Guide
Calculated Field
Comments
Navigation time in seconds (web/wap filtering service)
Navigation Time
URI
OST manages estimations when providing this information. It
is important to outline that Navigation time does not refer to the
time taken to download the objects but the time that a particular
user is browsing a particular resource (global navigation,
navigation classified as a given category etc).
Domain/Subdomains of the requested URLs
Log Configuration
Each module within OST can be linked to the Reporter so that the latter can request and
store information. You can select which log servers are associated to the Reporter at any
one time in the frame labeled Log Servers. You can do this by selecting the various
information sources. Unselected information sources will not log any filtering activity.
Figure 2-22: Logs configuration
WebSafe Personal Operation Guide
2-25
It is also possible to activate the encryption of the communication from and to the
reporter modules and to activate the checksum integrity of the logs to prevent them
from being manipulated.
The bottom frame is used to configure each information source, also called log server.
First you can decide to log all requests, only blocked requests or as indicated in each
filtering policy.
Then you can set the number of days to keep detailed logs both in each module’s local
log directory and the reporter’s log directory.
Note: The reporting tool uses ONLY information previously stored in the reporter’s log
directory.
You can define the parameters that govern how Reporter accumulates and compresses
data for each module. The Reporter requests information from the modules and then
structures this data in order to process it efficiently. This information can increase in
volume significantly; therefore the Reporter includes a data collection system that
allows a considerable reduction of this data volume. The system works by gradually
summarizing data according to a series of selections. In this way a huge amount of disk
space is saved and calculations are performed extremely quickly, at the same time as
maintaining the ability to generate a great number of reports. The downside is that there
is a slight loss of precision in the data since it is accumulated over a period of time (a
complete hour, a complete day, etc.).
It is also possible to set how many days of data to keep in the files of data collected by
the hour, how many months of data in the files collected by the day, and how many
years of data in the files collected by the month.
Moreover, the administrator can indicate whether the files of a particular type should be
archived before they would otherwise be converted by transferring them to a file type of
lower granularity (data collected by the hour can be transferred to form part of a larger
file of data accumulated by the day). These backups can be made independently for
each type of file (hours, days, or months).
Default log configuration

2-26
Content Filter serice:
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
o
Years in Months: 1
WebSafe Personal Operation Guide






Antispam Filter:
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
o
Years in Months: 1
Firewall: Only log if requested in the policy
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
o
Years in Months: 1
AdsFree: Only log blocked actions
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
o
Years in Months: 1
Autonotice:
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
o
Years in Months: 1
WebProxy (only in UDM mode): Only log if requested in the policy
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
o
Years in Months: 1
FTPProxy (only in UDM mode): Only log if requested in the policy
o
Detailed logs: 1 days
o
Days in hour: 7
o
Months in days: 1
WebSafe Personal Operation Guide
2-27
o
Years in Months: 1
Note: Notice that by default [Traffic] log is not active. If you plan to monitor traffic
activity (dashboard module [General >> Monitoring >> Traffic History]) or execute
reports based on [Traffic] data source, then you should activate traffic activity logging in
this section.
Events
Figure 2-23: Events
When OST is working, information messages are generated after certain events. These
can help the administrator to detect a problem or an inappropriate configuration. In this
section you can see all the events of the system and their description. You can also
configure parameters of their behavior, for example:

The necessary number of occurrences over a period of time that an
event must occur before it is actually triggered.

The maximum and/or minimum threshold of an event, if
applicable.
OST Reporter classifies system events according to severity criteria:
2-28
WebSafe Personal Operation Guide

Critical errors: These are for the most serious errors that can
occur in the system. They are produced when the system performs
actions that corrupt its functioning. They cause the reporting tool
to stop working, with no possibility of recovery.

Severe errors: Very serious errors that cause the reporting tool to
function incorrectly, meaning that the results it provides may be
unreliable. They can sometimes cause the reporting tool to stop.

Warnings: Notices to the system administrator concerning
situations that could potentially result in a severe error. They are
not in themselves especially serious but they can indicate that an
error is imminent or that non-vital operations have not been
executed successfully.

Information: These are informative messages about the
functioning of the system. They inform the administrator that
certain background-level operations have been completed
correctly.

Verbose: These are system troubleshooting messages that allow
the administrator to track a possible system problem more closely.
Normally they are deactivated. The storage of information in
Verbose mode uses up a large quantity of resources and reduces
application performance. For this reason, as a general rule it should
only be activated at the request of Optenet technical support.
Each message is identified by a code. This code is unique and each code has been
classified as one of the five types of messages described.
Figure 2-24: Events parameters
As a system administrator you can also define custom events. Custom events must have
a numerical ID with a value between 9000 and 9999 and a severity level (critical, error,
warning or info). Optionally, you can include an event description. Custom events are
the only events that can be associated to a filtering policy. In this case, when an event is
associated to a filtering policy, each time the policy is executed, the event will be
triggered.
Some predefined events enable the configuration of additional triggering conditions
(threshold of resources consumption reached, number of occurrences in a given period
of time etc). At the time of writing this manual, some of these events were:
WebSafe Personal Operation Guide
2-29
Event ID
4551 to 4579
4586
Figure 2-25: Predefined events with triggering conditions
Alerts
In this section you can set, edit and delete alerts. Alerts can be triggered by a number of
events (see previous section).
Figure 2-26: Alerts
Press New to create and configure a new alert. In the first tab you can select the events
that will trigger the alert, while the second tab displays the actions available:
2-30
WebSafe Personal Operation Guide

Record the event in the system log.

Record the event in the internal log.

Send the event information via SNMP trap.

Send the event information via e-mail.
Figure 2-27: New alert
Details about the types of messages generated by OST can be found in Appendix A.
Click Default Conf. button to define:
WebSafe Personal Operation Guide
2-31

Logging/Notifications default configuration based on Event
severity

For email notifications, set the default values for mail subject,
sender and addressee.
Figure 2-28: Predefined events with triggering conditions
Password Control
This section allows to define the password security policies for the administrators.
Figure 2-29: Password security settings
2-32
WebSafe Personal Operation Guide


Password policy: defines the number of simultaneous sessions allowed and the
login attempts allowed before locking the user in case of an incorrect password.
By default all the values are 0 (deactivated)
o
Number of Multiple sessions allowed
o
Incorrect Password Attempts Allowed
o
Lock Time Period (in seconds) in case of password locked.
o
Password History Check: defines the number of previous password to
check in case a password change is required
o
Minimum Password Period (in days)
o
Maximum Password Period (in days)
o
Password Must Change on first login. If this is selected, the
administrator password must be changed on the first login
Password Strength: defines the minimum password strength requirements.
Those passwords which do not honor these requirements will not be permitted.
By default all the parameters are 0 (deactivated) except for the minimum length
(6 characters):
o
Minimum Length of the password
o
Minimum lowercase letters
o
Minimum uppercase letters
o
Minimum numeric characters
o
Minimum symbols characters
o
Minimum number of numeric characters in the middle
o
Minimum number of symbol characters in the middle
o
Check sequential letters (like abc)
o
Check sequential numbers (like 567)
o
Check keyboard pattern used (like azerty, qwerty…)
o
Check sequence repeated (like abcabc or 123123)
o
Check sequence mirrored (like abccba or 123321)
External Servers
This screen allows you to create and manage connections to external servers. External
servers of the same type can be grouped in clusters.
WebSafe Personal Operation Guide
2-33
Figure 2-30: External servers
The different types of server clusters you can define are:
2-34
WebSafe Personal Operation Guide

Messaging clusters:
o

DNS clusters:
o


DNS: these servers will translate hostnames to IP
addresses.
PROXY clusters:
o

SMTP: these servers are used to send mail alerts (see
Alerts in this same section). If the solution is configured in
proxy mode with SMTP filtering, these will be the servers
that would receive filtered mails.
PROXY: you may define proxy servers to redirect traffic
and access the internet.
User identification/authentication clusters:
o
LDAP: define LDAP servers to be able to create user- and
group-based rules.
o
NTLM: use these servers if your authentication is based on
the well-known Microsoft authentication protocol.
o
Kerberos: use these servers if your authentication is based
on Kerberos authentication protocol.
o
DCAgent Server: these servers associate user name and
corresponding IP address, when a domain log in event is
detected.
SNMP clusters:
o
SNMP: SNMP trap alerts will be sent to this type of
servers.
Cluster Types based on their nature:

Round Robin of primary and secondary Servers:
o
The cluster
mechanisms.
o
Servers can operate in primary mode or Secondary mode.
o
Primary Servers offer load balancing. There must be at
least a primary server in the cluster.
o
Secondary Servers will not be used unless all primary
servers are down. In case of having several secondary
servers they will also offer redundancy.
WebSafe Personal Operation Guide
provides
redundancy
and
balancing
2-35
o


Belonging to this type: DNS, SMTP, Proxy, LDAP,
NTLM
Round Robin of Primary Servers:
o
Similar to previous case, but due to the nature of the
service, it has no sense having secondary servers.
o
Belonging to this type: Kerberos
Multicast:
o
Notifications are being sent to ALL servers in the cluster.
o
Belonging to this type: SNMP
Figure 2-31: External server configuration
You can add servers to clusters and change their priority within the cluster. Servers can
operate in primary or secondary mode. Usually, two primary servers are defined for
load balancing purposes. Secondary servers are defined for redundancy purposes. The
operation in the two cases is detailed below:
2-36
WebSafe Personal Operation Guide

Balancing: when an OST tries to establish a connection with a
cluster, it connects to the first primary server in the list (server A).
Only when a request to server A is not answered, the OST will
connect to the next available primary server (server B). Server B
will then be the default option unless it also fails to answer a
request. In this case, the OST will try to connect to the first
primary server again (server A).

Redundancy: when an OST tries to establish a connection with a
cluster, it connects to the first primary server in the list (server A).
Only when a request to server A is not answered, the OST will
connect to a secondary server (server B). Server B will then be the
default option during a limited period of time. Then the OST will
try to connect to the primary server again.
There must be at least one primary server per cluster.
SMTP Clusters and Servers:
Figure 2-32: SMTP cluster
The above screen is shown when a SMTP cluster is created. SMTP clusters are created
for two main purposes: send e-mails notifications (default cluster) and receive scanned
e-mails (only in proxy mode).
If the cluster is set as default, it will have a predefined name (SMTPDefault) and the
servers associated to this cluster will be used to send e-mail notifications and, if in
proxy mode, as the default e-mail receiver. If the solution is configured in proxy multidomain mode, you will be able to create several SMTP clusters and associate to each
one of them a number of mail domains. Scanned e-mails with a receiver belonging to a
domain associated to a cluster will be redirected to this cluster. Otherwise it will be
redirected to the default cluster.
Note: Mail domain association will only be shown in multi-proxy mode.
WebSafe Personal Operation Guide
2-37
Figure 2-33: SMTP Server
To create a SMTP server within a cluster, you must define the following parameters:

Server name

Server IP address or domain

Listening port (default 25)

Status

Operation mode (primary or secondary)
DNS Clusters and Servers:
There can only be a global DNS cluster in the solution, which is called DNSDefault.
You may add as many DNS servers to this cluster as you like. All DNS servers are
operating in primary mode and have the following parameters:

Server name

Listening port (53 by default)

Server IP address or domain

Status
Proxy Clusters and Servers:
Proxy clusters are created for two main purposes: configure a proxy to be used by the
solution to access the internet (default cluster) and allow for WebProxy policies where
the action is to chain a request to a parent or child proxy (see section WebProxy →
Filtering Policies in Chapter 4).
2-38
WebSafe Personal Operation Guide
If the cluster is set as default, it will have a predefined name (ProxyDefault) and the
servers associated to this cluster will be used by the solution to access the internet in
order to download URL database, Antivirus signatures, Spam signatures and to check
the license.
Figure 2-34: Proxy server
To create a Proxy server within a cluster, you must define the following parameters:

Server name

Server IP address or domain

Listening port (default 8080)

User and Password (optional)

Status

Operation mode (primary or secondary)
LDAP Clusters and Servers:
The OST uses LDAP clusters to retrieve user names and passwords in order to
authenticate Administrators (as seen in section General Management → Administrators)
or to facilitate user/group based filtering policies (see section WebProxy→Filtering
Policies in Chapter 4).
WebSafe Personal Operation Guide
2-39
Figure 2-35: LDAP Server
To create a LDAP server within a cluster, you must define the following parameters:
2-40
WebSafe Personal Operation Guide

Server name

Server IP address or domain

Choose whether or not you want to encrypt communications with
the LDAP.

Listening port (default 389)

Type of LDAP: W2K (default), iPlanet, Lotus

Status

Operation mode (primary or secondary)

Queries to be used to gather users and user groups.
o
By pressing Load Predefined Values button, default
queries will be generated. The field HA1 will be only
required in order to offer http Digest Access
Authentication.
o
The field HA1 will be required in case of using this LDAP
server to offer webproxy basic authentication policies of
the type http DIGEST.
Warning: In order to provide policies based on user groups, remember to give the SAME
NAME to the cluster that provides the authentication (NTLM, Kerberos or DCAgent),
and the cluster that provides information about groups (LDAP).
NTLM Clusters and Servers:
OST uses NTLM clusters for user/group authentication, facilitating user/group based
filtering policies (see section Web Proxy → Filtering Policies in Chapter 4).
Warning: In order to provide policies based on user groups, remember to give the SAME
NAME to the cluster that provides the authentication (NTLM, Kerberos or DCAgent),
and the cluster that provides information about groups (LDAP).
Once the cluster is created, to create a NTLM server within the cluster, you must define
the following parameters:
WebSafe Personal Operation Guide
2-41

Server name

Server IP address or domain

Listening port (default 445)

Status

Operation mode (primary or secondary)
Kerberos Clusters and Servers:
Figure 2-36: Kerberos cluster
The above screen shows how a Kerberos cluster is created. Like NTLM clusters, OST
uses Kerberos clusters for user/group authentication, facilitating user/group based
filtering policies (see section Web Proxy → Filtering Policies in Chapter 4).
In case of a Kerberos cluster, some additional steps are required in order to register the
Service:
2-42
WebSafe Personal Operation Guide

Manual operations:
o
Provide a name to the proxy-CCOTTAs in the DS
(Domain Server). This operation will be repeated as many
times as needed (as many times as CCOTTA instances are
installed).
o
Register the domain name as Service Server in the
KDC.AS (Kerberos authentication Server).

Edit the Cluster and click on [Register] button.

Ask a Service key. If key expires, indicate how often encryption
key will be renew automatically.
Figure 2-37: Kerberos Server
To create a Kerberos server within a cluster, you must define the following parameters:

Server name

Server IP address or domain

Listening port (default 445)
Warning: In order to provide policies based on user groups, remember to give the SAME
NAME to the cluster that provides the authentication (NTLM, Kerberos or DCAgent),
and the cluster that provides information about groups (LDAP).
DCAgent Clusters and Servers:
DCAgent clusters are mainly used to identify users/groups in bridge mode deployments.
Although they could also be used in proxy deployments, it is not recommended.
Servers associated to a DCAgent cluster have the following parameters:
WebSafe Personal Operation Guide
2-43

Server name

Server IP address or domain

Listening port (default 10240)
Warning: In order to provide policies based on user groups, remember to give the SAME
NAME to the cluster that provides the authentication (NTLM, Kerberos or DCAgent),
and the cluster that provides information about groups (LDAP).
DCAgent Clusters and Servers:
DCAgent clusters are mainly used to identify users/groups in bridge mode deployments.
Although they could also be used in proxy deployments, it is not recommended.
Servers associated to a DCAgent cluster have the following parameters:

Server name

Server IP address or domain

Listening port (default 10240)
Note: DCAgent clusters are not available by default. Set the
WebFilter.con#UseInternalAuthentication=True to activate this functionality.
variable
Warning: In order to provide policies based on user groups, remember to give the SAME
NAME to the cluster that provides the authentication (NTLM, Kerberos or DCAgent),
and the cluster that provides information about groups (LDAP).
SNMP Clusters and Servers:
There can only be a global SNMP cluster in the solution, which is called SNMPDefault.
You may add as many SNMP servers to this cluster as you like. All SNMP servers are
operating in primary mode and have the following parameters:
2-44
WebSafe Personal Operation Guide

Server name

Listening port (161 by default)

Server IP address or domain

Status
Account Management
This section allows the administrator to provision clients with different services, as well
as to add managers and associate servers and authentication methods to each of them.
Provisioning
In this section the administrator can search for and delete existing clients, as well as add
new clients with their provisioned services and packages.
WebSafe Personal Operation Guide
2-45
Figure 2-38: Provisioning customers
The frame on the left hand side of the screen allows the Administrator to search for,
delete and create new clients. On the right hand side frames, the Administrator can edit
the details of each client. More specifically, the Administrator can define:
2-46
WebSafe Personal Operation Guide

Client’s details:
o
Client ID
o
Type of client: enterprise, residential or mobile.
Depending on the selection, the services available to the
client will vary. Enterprise services offer more
functionality to the clients, while Residential services offer
simplicity and ease of use.
o
Administrator’s ID and Password
o
E-mail address (optional)

Client Services: Services and service packages provisioned to the
client. This frame shows the available services and service
packages for the client and the provisioned ones (see section
Service Packages in Chapter 3 for more information on services
and packages).

Client domains: domains entered in this frame will be associated to
the client. If in proxy mode, all e-mails addressed to these domains
will be sent to the client’s SMTP server if available, and will be
affected by the filtering policies defined by this client. (see section
General Management →External Server and Account Management
→ External Servers for more information on external servers)

Client IP addresses and VLANs/MPLS: IP addresses and,
optionally, VLANs or MPLS associated to the client (only for
enterprise and residential clients)
Note: This screen is intended mainly for demonstration and control purposes. Massive
client provisioning, should be done using other procedures.
WebSafe Personal Operation Guide
2-47
Client users
Figure 2-39: Client users
This section is used to search for and edit existing client users, as well as to add new
users with their password and, optionally, e-mail address.
The types of users that can be added are:
2-48
WebSafe Personal Operation Guide

Client Administrator: this user can log in the client graphical
interface with full access to its configuration.

Account User: this user can only access his or her own quarantine.
That is, this type of users has sense if the license includes antivirus
mail and/or AntiSpam and/or AntiPhishing mail.

Proxy User: if in proxy mode, this user may use these credentials
to be authenticated (see Chapter 4: WebProxy for more
information on Authentication).

Quarantine Administrator: it can access the client’s quarantine.
Hence, this type of manager can see messages in quarantine from
all users belonging to this client.

Monitor Administrator: has access to the reporting tool.

User group Manager: similar to monitor administrator but can
only create reports with data of associated users and/or groups.
This manager has to be associated to a set of LDAP users and
groups.

Read only Administrator: can access all options but with readonly permissions.
The user types Account User and Quarantine Administrator, are only available when a
SMTPFilter.In service is provisioned to the client. Proxy User type, on the other hand,
is only available for Enterprise clients when the solution is installed in proxy mode.
WebSafe Personal Operation Guide
2-49
External Servers
Figure 2-40: Client external servers
This screen allows you to create and manage external server connections associated to a
client. The different types of clusters and servers you can define are:

SMTP: If the solution is configured in proxy mode with SMTP
filtering, these will be the servers that would receive filtered mails
for this client.

LDAP: define LDAP servers to be able to create user- and groupbased rules.

DCAgent: these servers will associate users with their IP
addresses.

NTLM: use this server if your authentication is based on the wellknown Microsoft authentication protocol.

Kerberos: use these servers if your authentication is based on
Kerberos authentication protocol.
See section General Management→External Servers for more information on external
servers.
2-50
WebSafe Personal Operation Guide
Note: External servers created in this screen are only accessible by the client to whom the
clusters are associated. Only the client (and not the ISP administrator) will be able to use
this clusters information to create sources and destinations.
Service Packages
Figure 2-41: Service Packages
You can define different services and service packages within OST. For instance, you
can create various standards of service to offer to clients (i.e. basic, premium, etc.) and
group them to form a package. By default, services are classified in three categories:
WebSafe Personal Operation Guide
2-51

Premium: aimed at residential type clients with access to the Selfcare Portal (access to the filtering configuration GUI)

Basic: aimed at residential type clients without Access to the Selfcare Portal (filtering configuration is defined globally at ISP level)

Business: aimed at enterprise type clients with full access to the
Self-care Portal.

To create a new service, first select the service Group (Residential,
Enterprise and Mobile) and then define a service by clicking New
on the top left frame.
Figure 2-42: Service details
Then frame display above will be shown. The following parameters must be specified
for each service
2-52
WebSafe Personal Operation Guide

Service type: This can be Antivirus, AdsFree, Firewall, Mail
Filter, SMTPFilter.In, SMTPFilter.Out, MMSFilter, IDS/IPS,
Auto.Notices or Web Filter.

Service name: A name for the new service.

Catalogue status: Only active services can be provisioned on the
Provisioning section.

IID: Internal service ID, a unique identification for the service
used internally. These are some of the identifiers already used:
o
o
Residential Services:

[ContentFilter–Premium]: WC

[ContentFilter–Basic]: WB

[AdsFree–Premium]: AC

[AdsFree-Basic]: AB

[Activation-Basic]: TB

[Antivirus-Premium]: V3

[Antivirus-Basic]: V2

[AntiPhishing-Basic]: PB

[AntiPhishing-Premium]: PC

[FireWall-Premium]: FC

[FireWall-Basic]: FB

[SMTPFilterIn-Premium]: IC

[SMTPFilterIn-Basic]: IB

[Reporter-Premium]: RC

[IDSIPS-Premium]: DC

[IDSIPS-Basic]: DB
Enterprise Services:

[ContentFilter–Business]: WE

[AdsFree–Business]: AE

[Activation-Business]: TE

[Antivirus-Business]: AE

[AntiPhishing-Business]:
WebSafe Personal Operation Guide
2-53

[AntiPhishing-Premium]: PE

[FireWall-Business]: FE

[SMTPFilterIn-Premium]: IE

[Reporter-Premium]: RE

[IDSIPS-Premium]: DE

Own Profile: Select this option to allow clients to change their
configuration. Otherwise default filtering policies will be applied.

Profile Policies file: Location of the policies configuration
template file. These are the rules that will be assigned to customers
with this service. Once the template has been associated to client,
each customer can edited the filtering configuration from the
customer interface.
Note: The template defined in “Profile Policies files” cannot be edited through the
graphical interface.
After defining all services, you can group them in packages by clicking New on the top
right frame.
Figure 2-43: Creating packages of services
Services and packages cannot be deleted. However, you can declare them obsolete,
which will remove the selected service or package from the corresponding list in the
Provisioning section (see section Provisioning). This will not affect clients already
provisioned with these services or packages.
2-54
WebSafe Personal Operation Guide
Filtering Policies
Filtering is based on traffic analysis and the application of the configured rules. Each
filtering rule will be known as a “Policy”, which comprises the following information:

Policy Status, that indicates whether it is active or not:
o
On: Policy is Active, so it is being evaluated and applied
(if all associated conditions are fulfilled).
o
Off: Inactive. The policy is not being evaluated nor
applied.

Whom does the policy apply? : Source and Destination for the
traffic to be analyzed.

What triggering conditions have to be fulfilled to apply the policy
(Policy Profile)?

When has the policy to be applied? (Time schedules).

How will the Solution react (action to be applied)?
The behavior of the filtering Services will be directly conditioned by the policies that
have been defined and the order in which they are displayed.
The Solution will use a system of priorities that avoids conflicts between policies (for
instance, different policies of a same Service, affecting a user that belongs to two
different user groups, performing different actions for each group).
Note: Policies defined at ISP level have higher priority than those defined at Client level.
In general terms, policies are evaluated/applied following the order that shown in the
screen with the list of policies. For each Service, the first policy that fulfills all the
conditions will be applied.
Despite the given order, the Solution can only ensure that this ordering will be
completely taken into account when evaluating policies of the same Service. For
instance, a Firewall policy or IDS/IPS policy will be applied sooner than a web/wap
policy, since the fulfillment of the conditions for their application will be detected at an
earlier stage. So, policies will be applied grouped in “layers” according to available
Services, as detailed below:
Order
1. Firewall policies.
2. In case of Web traffic:
a. Web/wap policies.
b. AdsFree policies.
WebSafe Personal Operation Guide
2-55
Order
c. Antivirus web policies.
d. AutoNotices (notifications).
3. In case of mail traffic:
a. AntiSpam policies.
b. Antiphishing policies.
c. Antivirus Mail policies.
As described previously in this manual, the application of policies will be directly
conditioned by the state of the Services:

Service is Active: All active policies (related to that service) are
evaluated. If any of them fulfills completely the required
conditions, the configured action will be executed and the
application of the policy will be registered in the logs (enabling the
generation of activity reports). Activity will be registered
according to log settings for the service and/or applied policy.

Service is Inactive: Policies related to the Service will not be
evaluated (nor applied).

Service is in Monitor Mode: Policies related to the Service will
be evaluated but never applied. If the service and/or policy are
configured to log activity, the solution will log “what would have
happened” if the Service was active.
Some additional considerations:
2-56
WebSafe Personal Operation Guide


Most policies are “terminal” for the service they belong to:
o
That is, once the first policy that fulfills all the conditions
is detected, the configured action is executed and the rest
of candidate policies (with a lower priority) discarded. For
instance, if the Access to Internet is blocked for a given
user, due to a rule that blocks pornography, it has no sense
to keep on evaluating other policies that block other
prohibited categories or URL patterns.
o
On the other hand, other policies might be “Cumulative”.
Even when a given policy is applied, other policies (for the
same service) can be evaluated and potentially also
applied.
The fact of applying a policy that enables explicitly the traffic (that
is, no blocking action is selected) does not mean that the policies
related to the rest of services are not evaluated/applied. For
example: there may exist an AntiSpam policy that considers as
non-Spam e-mails whose sender is included in a Spammers
Whitelist and in consequence the configured action is to deliver the
email. However, other Services’ policies will also be evaluated
potentially blocking the e-mail, like an antiphishing policy; and/or
an Antivirus policy.
Policies
This screen provides information regarding the defined filtering policies for the
provisioned services: Web, AdsFree, AutoNotices, Antiphishing, Antispam.In,
AntiSpam.Out, Antivirus and/or Firewall.
WebSafe Personal Operation Guide
2-57
Figure 2-44: Filtering policies
The screen displays a table with the various policies and information on the source &
destination they apply to, the action to be performed, the filtering conditions and the
time when they will be applied.
In the bottom part of the screen, detailed information on a selected policy is displayed,
the source & destination to which it is applied, the action, the conditions for its
execution and the time period when it is applied.
From this screen, you can delete a policy, edit it or change its priority by altering its
position in the list using the arrows.
Source & Destination
In this screen you can create, edit and delete Sources & Destinations by specifying the
criteria that are used in the various services of the application to determine who each
policy is applied to.
If you are using a provisioning system like LDAP or Windows Domains, the system can
use the existing user accounts and groups. To update the information you should use the
"Refresh" button. For other types of groups, data must be entered manually.
2-58
WebSafe Personal Operation Guide
Figure 2-45: Source&Destination
The application offers a wide range of criteria to use when creating a Source or
Destination:
WebSafe Personal Operation Guide
2-59

Services: This criterion can be used to associate a policy to a
single service or a group of them. For example, you may want to
apply a more restricted access to clients that have the service
WebFilter-Default.

Users and User Groups: When a provisioning service is
integrated, i.e. LDAP, the system is able to obtain both existing
users and groups using the Refresh button on the Users/Groups tab.
Otherwise, when a provisioning service is not integrated for a
client, the administrator can only add users for this particular
client.

Clients: If a client is added to a target group, all users that belongs
to this client will be affected by the policies where the target group
is included.

Mail Domains and Mail Addresses: Using these two criteria you
can specify a single e-mail address or a whole domain.

MSISDN: This criterion can be used to define Target Groups
aimed at WAP and MMS filtering.

Module: This criterion allows the creation of a Target Group
containing an Optenet Module. This enables the capability of
defining specific policies that will affect traffic analyzed by a
particular instance of the solution.

IP, VLAN, and MAC: Use these criteria to specify a range of IP
addresses, names of hosts, VLAN’s identifiers, MAC addresses,
physical Interfaces or a Network.
Different criteria of Sources and Destinations are valid for each available service, as
explained in the following table:
Service
WebProxy
Both source and
destination.
WebFilter,
AdsFree,
AutoNotices
Only source
WOLF
2-60
Valid Conditions
Conditions based on:
 Clients (ISP administration)
 IPs or IP Ranges
 VLAN Ids
 MAC Addresses
Conditions based on:
 Provisioned Services (ISP administration)
 Clients (ISP administration)
 IPs or IP Ranges
 Users
 User Groups (in case an LDAP is available)
 Module instance
Conditions based on:
 IPs or IP Ranges
WebSafe Personal Operation Guide
Service
Valid Conditions
Only source
 Users
 User Groups (in case an LDAP is available)
 Module instance
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges (Web, SMTP.in, SMTP.out)
 Users (Antivirus web)
 User Groups (web)
 Module Instance (web)
 Mail Domains (SMTP.in, POP, SMTP.out)
 Mail Addresses (SMTP.in, POP, SMTP.out)
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges (Web, SMTP.in, SMTP.out)
 Users (web)
 User Groups (web)
 Module Instance (web)
 Mail domains (SMTP.in, POP, SMTP.out)
 Mail Addresses (SMTP.in, POP, SMTP.out)
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges
 Users
 User Groups
 Module Instance
 Mail Domains (SMTP.in, POP)
 Mail Addresses (SMTP.in, POP)
Conditions based on:
 Provisioned Services (ISP administration)
 Users
 User Groups
 Module Instance
 Mail domains
 Mail addresses
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges
 VLAN Ids
 MAC Addresses
Antivirus
Both source and
destination
AntiPhishing
Both source and
destination.
AntiSpam.In
Only destination
AntiSpam.Out
Only source
Firewall
Both source and
destination
Schedules
In a similar manner, it is possible to define different time frames or schedules when
policies will be applied. Schedules can be defined by date, days of the week or
particular time ranges in hours and minutes.
WebSafe Personal Operation Guide
2-61
Figure 2-46: Schedules
The schedule Always is defined by default, allowing the application of a policy in an
absolute time frame.
Advanced Configuration
OST configuration can be edited using the web interface by clicking on the Advanced
Configuration option in the menu on the left. The following screenshot shows the
configuration page of the web administration interface.
2-62
WebSafe Personal Operation Guide
Figure 2-47: Advanced Configuration
In this page, you can edit and modify the configuration files. The changes you make to
the OST configuration using the web interface are replicated in all modules.
The following options are available in the configuration section:

Configuration files: select the file you want to edit.

Nodes: displays the available nodes within the selected
configuration file.

Keys: shows the available keys for the selected node. When you
select a key, a new section opens where you can delete the selected
key or set new values.
Warning: Changes in these settings require a good understanding of the Solution and its
configuration parameters. If in doubt, please refrain to introduce any modification, as this
may prevent the Solution from a correct operation.
WebSafe Personal Operation Guide
2-63
Chapter 3: Web Proxy
This section describes the configuration options for the Web Proxy services. This
section comprises of the following sub-sections: Filtering Policies, Profiles and
Advanced Configuration.
Note: This service will only be available if the Solution is deployed in UDM mode.
Web Proxy policies, unlike the ones available for other services, will not be oriented to
filter content, although they represent a vital piece for identifying and authenticating
users. They represent a means to gather information about user and user groups to be
used as criteria in other policies.
In general terms, Web Proxy policies will enable:

General Actions: Enabling the Access/ denying the Access to
requested URL.

Caching actions: Deciding whether caching or not specific
content.

Authentication: By creating Web Proxy policies (and
establishing priorities among this policies), it can be easily
defined how to authenticate users and the type of authentication
to be used:
o
No authentication required.
o
Basic authentication (using Optenet repository, LDAPs
etc)
o
NTLM authentication, Kerberos authentication.

Proxy Chaining: Proxy chaining policies can be established so
that traffic can be redirected to different proxies and, optionally,
add additional HTTP headers with the information of the
requester (user, IP etc), so that this information can be used by
external systems.

Gathering of information: Registering information about
user/IP who is executing the request, taking this information from
HTTP headers. This can be a useful way to identify the user who
is really executing the request when the original IP has been
NATed. An external software/hardware would include the
information about the real user, so that he or she can be filtered
according to the defined filtering policies.
WebSafe Personal Operation Guide
3-1

ssl-inspection: Only available in UDM deployment mode. This
action allow to inspect https traffic using a man in the middle
implementation (refer to OST SSL Inspection doc for more
details).

Captive Portal authentication: Only available in UDM
deployment mode. To allow to create ISP rules to redirect the
clients to a captive portal for authentication. This policy applies
to all the clients even without the WebProxy service provisioned.
Filtering Policies
Figure 3-1: Web Proxy Policies
This screen displays similar information to the one described in previous section
Policies but with the difference that only Web Proxy policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new Web
Proxy policies creation and priority modification. After deleting a policy or changing its
priority, you must click Accept to confirm the modifications.
3-2
WebSafe Personal Operation Guide
Figure 3-2: Web Proxy Policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be on or off. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1: Source &
Destination for more information on Source and Destination
definition). This service requires both source and destination.
Figure 3-3: Web Proxy Policies: Source&Destination
WebSafe Personal Operation Guide
3-3
The parameters that can be used for this section are:
Service
WebProxy
Both source and
destination.

Valid Conditions
Conditions based on:
 Clients (ISP administration)
 IPs or IP Ranges
 VLAN Ids
 MAC Addresses
Profiles: The group of conditions that must be satisfied to apply
the policy (see next section for more information on Web Proxy
profiles)
Figure 3-4: Web Proxy Policies: Action
3-4
WebSafe Personal Operation Guide

Actions: The action the policy will carry out. In this case the
possibilities are:
o
o
o
General Actions:

Bypass: it allows accessing the requested URL.

Deny access: it blocks the access to the requested
URL.
Authentication: use this action to force user
authentication. The available authentication methods are:

Not required: no authentication required.

Basic: user name and password will be using the
indicated repository:

Optenet_Db: Local (internal) repository of users.

A list with all LDAP clusters will be shown
(created as External Servers). Choose the cluster to
be used. In order to reinforce the security (in case
the LDAP servers enable this option), Digest
authentication can be used.

NTLM: user name and password will be read
from a Windows Domain server defined by the
administrator. A list of all NTLM clusters will be
shown (defined as External Servers). Select the
one to be used.

Kerberos v5: to use Kerberos authentication, do
not forget to register a Kerberos cluster (defined as
external Server) for the realm to be authenticated.
In this case, it is possible to select a fallback
authentication (by selecting the fallback check
box) so in case the browser doesn’t support
Kerberos authentication, NTLM authentication
will be requested to that browser.
HTTP/FTP Cache:

Cache: stores information on the cache directory
when the service is active (see Advanced
Configuration in Chapter 4)

Do not cache: avoids storing information even
when the service is active
WebSafe Personal Operation Guide
3-5
Note: For a correct operation, the system time of all servers where the solution is
installed must be synchronized. Web servers return http headers with the request’s
expiration date. If the system time is incorrect this can cause the cache content to be
continuously invalid or even not become invalid when it should have expired.
o
o
Proxy Chaining:

Forward IP: adds the client’s IP address as a
header to the HTTP request. The name of the
HTTP header to be added must be typed.

Forward User: adds the user name as a header to
the HTTP request. The name of the HTTP header
to be added must be typed.

Establish direct connection: establishes direct
connection with external host avoiding chained
proxies.

Chain proxy: the request is redirected through
another proxy. You may also Forward IP or
Forward User information. In this case it is
required to have a Proxy server previously defined
(see section External Servers>Proxy cluster)
Gathering of Information: The policies with this type of
actions will enable to gather the IP and/or User from an
HTTP header, overwriting the requester IP (that can be
the one of a router, proxy, etc.). They will enable to store
this information so that it can be used by other policies of
other services that only have to be applied to a certain list
of users/IPs.


3-6
User Information: user name is read from an
HTTP header defined by the administrator. Type
the name of the header and the type of encoding:

Plain Text.

Base 64

HTTP
Authentication
(“username:realm:password”)
IP information: IP is read from an HTTP header
defined by the administrator. Type the name of the
header.
WebSafe Personal Operation Guide

o
Client ID: The client ID is read from an HTTP
header defined by the administrator. Type the
name of the header. In this case the client will be
identify with this header instead of using the IP
address as usually.
ssl-inspection: activating this action will allow to
inspect all the https traffic. The solution is based on a
man in the middle implementation. This allow to block
any https URL (not only the hostname), analize the
content of the website, block files and detect virus.

Ignore certificate errors: If this option is
selected, invalid certificates will be bypassed. If
this option is not selected, invalid certificates
will show an HTTP Proxy error: SSL server
isn't valid: Invalid Common Name (Invalid
Common Name)
Figure 3-5: Web Proxy ssl-inspection: Invalid certificate

Captive portal authentication: if this option is selected, all the
clients (even if don’t have the WebProxy service provisioned) will
be redirected (when starting their navigation) to a Captive Portal
for authentication. The captive portal uses cookies for
atutentication. This cookies expire with the browser session and
have a two hours time to live. The captive portal is fully
customizable. By default this screen shows a “Use default profile”
to allow the clients with more than one user, to configure a default
profile.
WebSafe Personal Operation Guide
3-7
Figure 3-6: Web Proxy Captive portal
The captive portal can be configured to use any web page by
configuring:
o
The captive portal URL
o
The secret shared key (to encrypt the cookie)
Figure 3-7: Web Proxy Captive portal configuration

Schedule: The frame of time when the policy will be activated (see
section General>Filtering Policies>Schedules for more information
on schedule definition)
Profiles
In this section it is possible to create, edit and delete the profiles used to define Web
Proxy policies. Each profile is comprised of a number of conditions such as Port,
Browser, HTTP Method, URL scheme, URL host and URL path.
3-8
WebSafe Personal Operation Guide
Figure 3-8: Web Proxy Profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
A Profile must be understood as a “Boolean expression” where conditions can be
entered in the different tabs (tabs group conditions based on their nature):

By default, conditions under a same tab are connected by [OR]
operators.

A checkbox [Necessary Condition] will enable to toggle between
[OR] and [AND] operators.

A checkbox [Inverse Condition] will enable to negate conditions.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:

Port: in a similar way, you can also define the source and
destination port of the request.
WebSafe Personal Operation Guide
3-9



3-10
Browser Control: There is a set of browsers defined by default
but the user can define a custom browser based on the User Agent.
The default browsers defined are:
o
Firefox
o
Safari
o
Chrome
o
Opera
o
Internet Explorer
HTTP Method: the HTTP methods available are:
o
GET: The GET method means retrieve whatever
information (in the form of an entity) is identified by the
Request-URI.
o
POST: The POST method is used to request that the origin
server accept the entity enclosed in the request.
o
PUT: The PUT method requests that the enclosed entity be
stored under the supplied Request-URI.
o
HEAD: The HEAD method is identical to GET except that
the server MUST NOT return a message-body in the
response.
o
OPTIONS: The OPTIONS method represents a request for
information about the communication options available on
the request/response chain identified by the Request-URI.
o
CONNECT: This specification reserves the method name
CONNECT for use with a proxy that can dynamically
switch to being a tunnel. For example, SSL tunneling.
o
TRACE: The TRACE method is used to invoke a remote,
application-layer loop- back of the request message.
o
DELETE: The DELETE method requests that the origin
server delete the resource identified by the Request-URI.
o
OTHER
URL Scheme: selects the scheme or protocol that will apply to the
profile. The options are:
o
HTTP
o
FTP
WebSafe Personal Operation Guide

URL Host: use this option to include URL hosts. You can use ‘*’
as a wildcard.
Example: “/webmail*.myCompany.*”

URL Path: use this option to include the string of the URL that
contains the path, including the query. You can use ‘*’ as a
wildcard.
Example:
If “MyPage.php” is entered:
The request of the following webpage would match the condition:
http://10.222.0.234/MyPage.php
Advanced Configuration
Use this section to configure the advanced settings of the WebProxy service. It consists
of two subsections: Cache Settings and SSL & Authentication Settings.
Cache Settings
Cache Settings for HTTP and FTP objects.
WebSafe Personal Operation Guide
3-11
Figure 3-9: Web Proxy Advanced Configuration
Cache Service features:


3-12
Independent cache service for HTTP and FTP objects. This
approach is more flexible than allocating HTTP and ftp objects in
a single cache since:
o
The HTTP and FTP cache Services
activated/deactivated independently.
can
be
o
It will be possible to establish separate settings.
o
There will be Independent maintenance processes to free
memory.
There will be a cache repository in RAM and another in disk.
WebSafe Personal Operation Guide
HTTP Cache Settings:

Path: Directory where the cache repository will be located. By
default: “./httpcache”

Max. Cache Size:

o
Cache Size: Max. Cache size in disk (GB). By default: 10
GB.
o
Max. Cache Size in RAM: Maximum size of RAM
occupation by cached objects (in MB). By default: 256
MB.
Max. Size of HTTP objects to be cached:
o
Max. Size in RAM: Max. Size of an HTTP object to be
cached in RAM (in Kb). By default: 30 Kb.
o
Max. Size in Disk: Max. Size of an HTTP object to be
stored in disk (in Kb). By default: 2048 Kb.

Option “Remove proxy & cache HTTP headers”: If this checkbox
is marked, no header will be added to the served content related to
neither proxy nor cache management.

Option “Ignore no-cache Request Directive”: It will be possible to
configure whether to ignore or not the presence of the directive “no
cache” in the requests. Marking this option, a better performance
will be achieved.

Freshness revalidation for cached objects:
o
Based on HTTP directives received along with the HTTP
object being cached (proxy-revalidate/no-cache, expires,
max-age/s-max-age, last-modified …) or applying
heuristic calculations.
o
In case the directive “Last-modified” is received (and no
other directive related to time expiration is being received),
the cached object will be given a freshness value that
results from applying the following formula:
(Now – Last Modified date) * Factor
That is, it will be possible to configure the factor to
calculate the freshness of HTTP object based on the date
they were modified for the last time.
WebSafe Personal Operation Guide
3-13
o
It will be possible to optionally overwrite the minimum
time and/or maximum time for an object to be cached
(despite the freshness value indicated by HTTP directives
or any other heuristic calculation).

Min. Cache Time: Indicate the minimum time
object will be allocated in cache (seconds |
minutes | hours | days).

Max. Cache Time: Indicate the maximum time
objects will be allocated in cache (seconds |
minutes | hours | days). By default, objects will be
allocated no longer than 7 days.
Let us see it with an example:
Let’s suppose that:
“Last Modification date” = Day D, 10:00:00 h
“Date the object was saved (cached)” = Day D, 11:00:00 h (difference = 3600 seconds)
If Factor = 1.0  the object if fresh/valid for another 3600 seconds (3600*1) since
11:00:00 h
If Factor = 0.1  the object is fresh/valid for another 360 seconds (3600*0.1) since
11:00:00
If the calculated value is lower than the one indicated by “Min. Cache Time” (and the
corresponding checkbox is marked)  the value configured as “Min. Cache Time” will
be taken.
If the calculated value is greater than the one indicated by “Max. Cache Time” (and the
corresponding checkbox is marked)  the value configured as “Max. Cache Time” will
be taken.
3-14
WebSafe Personal Operation Guide
FTP Cache Settings:

Path: where the cache repository will be located. By default
“./ftpcache”

Max. Cache Size:


o
Cache Size: Max. Cache size in disk (GB). By default: 10
GB.
o
Max. Cache Size in RAM: Maximum size of RAM
occupation by cached objects (in MB). By default: 0 MB.
The goal is not caching FTP objects in RAM by default.
Max. Size of FTP objects to be cached:
o
Max. Size in RAM: Max. Size of a FTP object to be
cached in RAM (in Kb). By default: 0 Kb.
o
Max. Size in Disk: Max. Size of a FTP object to be stored
in disk (in Kb). By default: 102400 Kb.
Time to Live for all FTP cached objects:
o
Cached FTP objects will expire based on an only
parameter (TTL), common to all FTP objects. TTL may
come in minutes, hours, days.
o
By default: 1440 minutes.
Maintenance:

As it was outlined previously, there will be separate maintenance
processes for HTTP and FTP cache repositories.

It will be possible to configure a threshold of occupation. Once this
threshold is exceeded, oldest objects will be removed:
o
When an absolute occupation value is reached (in GB).
o
Or, when a % of occupation is reached (related to the
maximum reserved space for the repository).
o
By default: Free memory whenever a 95% of occupation is
reached (that is, whenever there only remains a 5% of free
space).
Empty the cache:

It will be possible to remove all objects from the cache (both in
memory and disk).
WebSafe Personal Operation Guide
3-15

The emptying can be selective:
o
All objects (Empty FTP Cache and HTTP Cache).
o
Only HTTP Objects.
o
Only FTP Objects.
Authentication Settings
Figure 3-10: Web Proxy Authentication Settings
Use this section to configure the authentication functionalities. More specifically:

Indicate whether the solution has to obtain user group information
from external LDAP Servers, so that Source & Destinations based
on groups can be evaluated. Set the time-to-live (TTL) for the
information user / user groups to be cached in memory avoiding
unnecessary accesses to those LDAP Servers.

In case of providing LDAP HTTP
DIGEST Access
Authentication (Authentication policies based on basic
authentication of the type Digest Access), type a value for the TTL
of the Server query result (TTL of the authentication validity,
without requiring the re-typing of credentials). In case of receiving
two consecutive requests within that period, the counter will be
reset, extending the TTL of the Server query result.
PAC file
In this section it is possible to create the rules required to use a PAC file to configure
the proxy in the customers browser.
3-16
WebSafe Personal Operation Guide
Figure 3-11: Web Proxy PAC File
It is possible to define exceptions to the use of proxy (exceptions to be covered by the
PAC File distributed) based on:

IP ranges.

requested urls patterns.
It is necessary to select the check box “Enable Clients to create exceptions” to allow to
the enterprise customers to define their own rules. Only the enterprise customers can
create their own rules.
The PAC file with the rules will be stored in the following URL:
ADMINISTRATOR_GUI_URL/public/PAC/getpacfile.htmopt
WebSafe Personal Operation Guide
3-17
Chapter 4: FTP Proxy
This section describes the configuration options for the FTP Proxy services. This
section comprises of the following sub-sections: Filtering Policies, Profiles and Reports.
Note: This service will only be available if the Solution is deployed in UDM mode.
Filtering Policies
Figure 4-1: FTP Proxy Policies
This screen displays similar information to the one described in previous section
Policies but with the difference that only FTP Proxy policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new FTP
Proxy policies creation and priority modification. After deleting a policy or changing its
priority, you must click Accept to confirm the modifications.
WebSafe Personal Operation Guide
4-1
Figure 4-2: FTP Proxy Policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be on or off. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1: Source &
Destination for more information on Source and Destination
definition). This service requires both source and destination.
Figure 4-3: FTP Proxy Policies: Source&Destination
4-2
WebSafe Personal Operation Guide
The parameters that can be used for this section are:
Service
FTPProxy
Both source and
destination.

Valid Conditions
Conditions based on:
 Clients (ISP administration)
 IPs or IP Ranges
 VLAN Ids
 MAC Addresses
Profiles: The group of conditions that must be satisfied to apply
the policy (see next section for more information on FTP Proxy
profiles)
Figure 4-4: FTP Proxy Policies: Action
WebSafe Personal Operation Guide
4-3

Actions: The action the policy will carry out. In this case the
possibilities are:
o

General Actions:

Bypass: it allows accessing the requested FTP
resource.

Deny access: it blocks the access to the requested
FTP resource.
o
Log activity: selected by default. To enable to log the
activity of the FTP requests
o
Associate an event to this policy. If selected the text box it
is possible to select an event to be associated to this policy.
Schedule: The frame of time when the policy will be activated
(see section General>Filtering Policies>Schedules for more
information on schedule definition)
Profiles
In this section it is possible to create, edit and delete the profiles used to define FTP
Proxy policies. Each profile is comprised of a number of conditions such as FTP
command, FTP users, hosts and directories.
4-4
WebSafe Personal Operation Guide
Figure 4-5: FTP Proxy Profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
A Profile must be understood as a “Boolean expression” where conditions can be
entered in the different tabs (tabs group conditions based on their nature):

By default, conditions under a same tab are connected by [OR]
operators.

A checkbox [Necessary Condition] will enable to toggle between
[OR] and [AND] operators.

A checkbox [Inverse Condition] will enable to negate conditions.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:
WebSafe Personal Operation Guide
4-5

FTP Command: the FTP Commands available are:
o
Read commands: ABOR, MDTM, PASV, STRU, ACCT,
MODE, PORT, SYST, CDUP, NLST, PWD, TYPE,
CWD, NOOP, REST, USER, HELP, SIZE, XCUP, LIST,
PASS, SMNT, XPWD
o
Write commands: ALLO, MKD, RNTO, STOU, APPE,
RMD, SITE, XMKD, DELE, RNFR, STOR, XRMD

FTP Users: it is possible to create a list of FTP that will apply to
the profile.

FTP Host: use this option to include URL hosts. You can use ‘*’
as a wildcard.
Example: “ftp*.myCompany.*”

FTP Directories: use this option to include the FTP directories to
include or exclude.
Reports
Service Reports
This section is used to configure the Webfilter service reports that will be requested.
Both the data that will make up a report and the report's format can be edited.
4-6
WebSafe Personal Operation Guide

Type of report:
o
Accesses: The total number of requests that were allowed.
o
Blocks: The total number of requests that were blocked by
the filter.
o
Requests: The total number of requests, allowed and
blocked, that meet the conditions of the report.
Figure 4-6: FTP Proxy Service Reports
The report has several different criteria that allow the administrator to filter and create a
more specific report.
WebSafe Personal Operation Guide
4-7

Groupings: The grouping criteria allow the administrator to set
the data field or attribute by which the values displayed in the
report will be grouped. Furthermore, the administrator can create a
sub-grouping of the group criteria. For example, the results can be
grouped by Days, and then further grouped by FTP Command. So,
in the report, the results are broken down by day, and within each
Day group, the results are sorted by FTP Command.

Selection Criteria: The report can have conditions that include or
exclude several parameters (shown in the Use selection criteria
section). Click on the checkbox to enable the frame on the right. In
this frame you can select different fields to include or not include.
Type in the parameter (e.g. Client ID of XXXX in or not in) and
these conditions will then appear in the main condition box.
You can also customize the report by:

Time Frame

Format: table, graph, line graph or pie chart

Order: ascending or descending order

Data computing: shows absolute or percentage figures.

Records to show
Once the report is generated, it can be exported to:

PDF

HTML

CSV
Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
4-8
WebSafe Personal Operation Guide
Figure 4-7: FTP Proxy Service Reports
WebSafe Personal Operation Guide
4-9
Chapter 5: WEB/WAP
This service allows blocking browsing sites within specific categories (such as
pornography, games, drugs, etc.), set up whitelists and blacklists of sites, prevent certain
file types from being downloaded, set schedules for rules in order to define when access
is available and establish time limits on browsing.
This section describes the configuration options for the Web/WAP filtering services.
This section comprises of the following sub-sections: Filtering Policies, Profiles,
Category Management, Black- & Whitelists, Reports and Advanced Configuration.
Filtering Policies
Figure 5-1: WEB/WAP Filtering policies
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only Web/WAP policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Web/WAP policies creation and priority modification. After deleting a policy or
changing its priority, you must click Accept to confirm the modifications.
WebSafe Personal Operation Guide
5-1
Figure 5-2: WEB/WAP Filtering policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be on or off. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1: Source &
Destination for more information on Source and Destination
definition) The parameters that can be used for this section are:
Service
WebFilter
Only source
5-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 Clients (ISP administration)
 IPs or IP Ranges
 Users
 User Groups (in case an LDAP is available)
 Module instance
WebSafe Personal Operation Guide

Profiles: The group of conditions that must be satisfied to apply
the policy (see next section for more information on Web/WAP
profiles)
Figure 5-3: WEB/WAP Filtering policies: Action
WebSafe Personal Operation Guide
5-3

Actions: The action the policy will carry out. In this case the
possibilities are:
o
Block: it blocks the access to the requested URL and
displays a blocking page.
o
Block with Password override: Blocks the access to the
requested URL by showing a blocking page that enables
the typing of a password. Select the Administrator’s
password to be used. By default “Any client administrator”
is configured.
o
Block with this URL: it blocks the access to the requested
URL and displays a blocking page specific for this rule.
o
o

In case of external URL: type http:// at the
beginning of the URL.

In case of internal URL: the required format
would
be:
“<Server_Name>@<Path_To_Blocking_Page>”
SSL Inspection and Digital Certificates validation (only
available if SSL inspection is selected in the profile, see
Chapter 6: Profiles): In case an invalid digital certificate is
found, the action to be performed must be selected:

Block access

Bypass

Ask User
Bypass: it allows accessing the requested URL.

Schedule: The frame of time when the policy will be activated
(see Chapter 1: Schedule for more information on schedule
definition)

If the Log activity option is checked, policy execution will be
logged (see Chapter 1: Advanced Configuration for more
information on logging capabilities). In a similar way, if the policy
is associated to an event, each time the policy is executed an event
will be triggered, which could be also associated to an alarm (see
Chapter 1: Events and Chapter 1: Alerts for more information on
Events and Alerts)
There are two global Web/Wap filtering policies defined by default:
5-4
WebSafe Personal Operation Guide

WebWapWL: This policy allows access to all URLs included in
the Whitelist (see Chapter 6: Black -&Whitelists). This will apply
to all Web/Wap filter services as long as this policy has the higher
priority.

WebWapBL: This policy denies access to all URLs included in
the Blacklist (see Chapter 6: Black -&Whitelists). This will apply
to all Web/Wap filter services as long as this policy has the higher
priority.
There are also two Web/Wap filtering policies that affect clients provisioned with the
Basic ContentFilter service:

AvoidViolence: This policy blocks access to URLs contained in
the following categories: anorexia and bulimia, bombs, drugs,
racism and sects.

DenyPorn: This policy blocks access to URLs contained in the
following categories: pornography, sexuality and models.
Profiles
In this section it is possible to create, edit and delete the profiles used to define
Web/WAP policies. Each profile is comprised of a number of conditions based on:

Web Categories.

File types and (optionally) restrictions for their size.

Exceptions:
o
List of URL to be included (even if they don’t belong in
the list of selected categories).
o
List of URLs to be excluded (even if they belong in the
list of selected categories).

Time Limit: Navigation quota.

Other advanced conditions (such as the verification of digital
certificates etc).
WebSafe Personal Operation Guide
5-5
Figure 5-4: WEB/WAP Profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:
5-6

Categories: this section lists the content categories to include in
the profile. A category is a set comprising web pages related to a
specific type of content. These sets can be created using lists of
URL addresses, semantic URL analyzers, and content analyzers.
Click on ‘Include URLs not categorized’ to create a profile that
affects all URLs that are not included in any category.

Files: Use this option to select which file types will be affected
by this profile. This selection can affect files in all URLs or only
the ones selected on the categories or included/excluded URLs
sections.
WebSafe Personal Operation Guide
Figure 5-5: WEB/WAP Profiles: Files
Note: If the Solution is deployed in proxy mode, it will also be possible to indicate a limit
in the size of selected file types.

Included URLs: Use this option to include URLs in the profile.
URLs added to this list will always satisfy the condition
regardless of whether it has been included in a category. It is
possible to include a website with regular expressions in the
section Regular Expression of Included URLs:
Example:
http://www.website.com/*
http://www.website.com/*/images
To include several URLs, each one of them must be entered on a new line.
WebSafe Personal Operation Guide
5-7

Excluded URLs: Use this option to exclude URLs from the
profile. URLs added to this list will be considered an exception,
and will never satisfy the condition regardless of whether they
have been included in a category.

Temporal Exception: Use this option to set a period of time
when the policy will not be applied. This criterion can be used to
define navigation quotas.
Figure 5-6: WEB/WAP Profiles: Time Limit
Note: Temporal exceptions policies are calculated by user or IP address. If a user or IP
address is affected by more than one policy with a temporal exception, all policies will
contribute to the time counter.
5-8

HTTP Method; This option allows to configure a profile
depending on the method used in HTTP protocol: GET, POST,
PUT, HEAD, OPTIONS, CONNECT, TRACE or DELETE.

Advanced: Use this option in order to establish the following
advanced trigger conditions:
WebSafe Personal Operation Guide
Figure 5-7: WEB/WAP Profiles: Advanced

Verify persistent requests to prohibited pages: Each time a
given user (or IP, depending on Solution settings) is blocked by a
WebFilter policy, his blocking counter is being incremented. It
will be possible to create additional WebFilter policies that take
into account this users/IPs that are frequently blocked, and
restrict them the access to the web for a given period of time.
Note: This option is disabled at ISP Administration level.
WebSafe Personal Operation Guide
5-9

Verify Digital Certificates: The activation of this checkbox
would produce an SSL inspection to check the validity of the
digital certificates (in case of https pages). Activating this policy,
the https content will be inspected using a man in the middle
implementation (refer to OST SSL Inspection doc for more info).
This option is only supported in UDM deployment mode.
It will enable the creation of special WebFilter policies to react
whenever an invalid certificate is found:
o
Allowing the access to the requested page
o
Blocking the access to the requested page. The user will
see a block page denying the access to a web site with an
invalid certificate
o
Asking the user what to do. The user will see a block web
page asking the user if wants to access to a web site with
an invalid certificate.
Note: Currently, the verification of Digital Certificates and the creation of policies based
on the detection of invalid certificates is only available in UDM deployment mode.
By default there are five Web/Wap profiles defined:

Distractions: This profile includes the categories: art, banners,
blogs, chat, dating, forum, gambling, games, instant messaging,
leisure, logos and ringtones, models, P2P servers, personal
websites, pornography, portals, press, sexuality, shopping, sports
and travel.

Porn: This profile includes the categories: models, pornography
and sexuality.

Violence: This profile includes the categories: anorexia and
bulimia, bombs, racism and sects.

WebWapWL: This profile includes the category Whitelist and
cannot be deleted or edited.

WebWapBL: This profile includes the category Blacklist and
cannot be deleted or edited.
Category Management
In this section you can create new categories, add URLs and query which categories
URLs belong to.
5-10
WebSafe Personal Operation Guide
Figure 5-8: WEB/WAP Category Management
A category is a set that groups together World Wide Web files. These sets can be
created using URL lists and content and URL analyzers. There are three types of
category:

Content categories: These classify the World Wide Web by
content (e.g. pornography, sport, press), which can be allowed or
blocked according to the filtering rules set up.

Search engine category: For URLs that are part of a search
engine category, multilingual content analysis is not used to
establish their content categories.

Redirector category: This is for URLs that redirect or convert to
other URLs. If a URL is in the redirector category, it is treated like
the URL to which it redirects or converts.
A category can have more than one type. Likewise, a URL can belong to more than one
category.
Each category is defined by two URL lists: Yes and No. The Yes list contains all the
addresses that are considered as belonging to a certain category, and the No list contains
those that are considered as NOT belonging.
WebSafe Personal Operation Guide
5-11
In the categories section you can select the following options:

New: Creates a new user category.

Edit: Edits a user category.

Delete: Deletes a user category. OPTENET categories cannot be
deleted.

Export: Exports the content of the selected user category.
OPTENET Categories cannot be exported.
If you click on “New” you can create a Custom Category. If you click on “Advanced”
button, you can specify the type of the category (content, search and/or redirect)
Figure 5-9: WEB/WAP Category Management: New Category
You can specify whether an individual page does or does not belong to a category by
entering a complete URL, for example:
http://www.dangerousplace.com/index.htm
You can specify an entire website by placing an asterisk (*) at the end, for example:
http://www.dangerousplace.com/*
You can also use the asterisk as a wild card at the beginning and in the middle of an
URL. In this way, you can specify that all the hosts of an organization belong to a
certain category, for example:
http://*.dangerousplace.com*
With regard to Redirection type categories, you can add URL extraction patterns, for
example:
5-12
WebSafe Personal Operation Guide
http://www.google.com/search?q=cache:*:#+
where ‘#’ indicates the point where the URL that the browser is being redirected to
appears. The asterisk can be used for URLs belonging to the Redirection type category
as well.
Bear in mind that Optenet uses URLs without the protocol (e.g. http, https).
So, if you enter “http://www.example.com” in Pornography, the following URLs will
be categorized under Pornography:
http://www.example.com
https://www.example.com
ftp://www.example.com
In the frame Search categories an URL belongs to, the administrator can check the
different categories an URL belongs and does not belong to. This can be done for a
specific client or for Optenet’s categories. It is also possible to contribute with a certain
URL that the Administrator considers that should be included in the default categories
by clicking to the button “Contribute”.
Note: Categories created at ISP Administration level will NOT be available at client
level.
Black- & Whitelists
This screen offers a quick access to the content of Whitelist and Blacklist categories.
Here you can edit the content of both lists.
WebSafe Personal Operation Guide
5-13
Figure 5-10: WEB/WAP Black- &Whitelists
It is important to note that the inclusion of an URL in these lists does not imply
necessarily that the URL will be always accessed or blocked. Although these two lists
are associated with two special profiles (see Chapter 6: Profiles) that cannot be
modified, the same does not apply to the filtering policies that make use of these
profiles. Therefore the behavior of these two categories depends on the Filtering Policy
strategy.
Reports
Service Reports
This section is used to configure the Webfilter service reports that will be requested.
Both the data that will make up a report and the report's format can be edited.
5-14
WebSafe Personal Operation Guide

Type of report:
o
Accesses: The total number of requests that were allowed.
o
Blocks: The total number of requests that were blocked by
the filter.
o
Requests: The total number of requests, allowed and
blocked, that meet the conditions of the report.
o
Browsing Time: Based on requests, an estimate of the time
that users have been browsing. Bear in mind that browsing
time does not refer to the time it takes to download items,
rather it is the time that a user browses a resource (either a
website or a type of content). This parameter is exclusive
to the “Content Filter”, or Web mode.
o
Number of Page Views.
Figure 5-11: WEB/WAP Service Reports
The report has several different criteria that allow the administrator to filter and create a
more specific report.
WebSafe Personal Operation Guide
5-15

Groupings: The grouping criteria allow the administrator to set
the data field or attribute by which the values displayed in the
report will be grouped. Furthermore, the administrator can create a
sub-grouping of the group criteria. For example, the results can be
grouped by Days, and then further grouped by File Type. So, in the
report, the results are broken down by day, and within each Day
group, the results are sorted by File Type.

Selection Criteria: The report can have conditions that include or
exclude several parameters (shown in the Use selection criteria
section). Click on the checkbox to enable the frame on the right. In
this frame you can select different fields to include or not include.
Type in the parameter (e.g. Client ID of XXXX in or not in) and
these conditions will then appear in the main condition box.
You can also customize the report by:

Time Frame

Format: table, graph, line graph or pie chart

Order: ascending or descending order

Data computing: shows absolute or percentage figures.

Records to show
Figure 5-12: WEB/WAP Monitor Reports: Visualization
Once the report is generated, it can be exported to:
5-16
WebSafe Personal Operation Guide

PDF

HTML

CSV
Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
Figure 5-13: WEB/WAP Monitor Reports
WebSafe Personal Operation Guide
5-17
Advanced Configuration
Figure 5-14: WEB/WAP Advanced configuration
This section is used to select the various advanced filtering and blocking parameters:
5-18
WebSafe Personal Operation Guide

Filter configuration: Select whether SafeSearch is enabled. If this
option is activated, search engines will operate with the SafeSearch
option enabled, ignoring the user settings.

Web blocking configuration: It is possible to configure the
blocking page to be displayed whenever a policy with blocking
action is applied different from the default one. It is necessary to
select one of response codes:
o
200 OK: In this case it is possible to configure:

Blocking Page URL: Type the URL address to be
used:

In case of external URL: type http:// at
the beginning of the URL.

In case of internal URL. Required format::
“<Server_Name>@<Path>”.

Static text to be shown

HTML Code: Write the HTML code to be used as
blocking page.
o
302 Found - Request has been moved temporarly
o
307 Moved - Request has been moved temporarly
o
404 Not Found
o
500 Internal Server Error
It is possible to configure a Blocking Page URL for any of
this response:


In case of external URL: type http:// at the
beginning of the URL.

In case of internal URL. Required format::
“<Server_Name>@<Path>”.
HTTPS Blocking configuration: It is necessary to select one of
response codes:
o
200 OK - Request has succeeded. In this case
o
302 Found - Request has been moved temporarly
o
404 Not Found
o
500 Internal Server Error
o
502 Bad Gateway
WebSafe Personal Operation Guide
5-19
It is possible to configure a Blockin Page URL for any of
this response:


In case of external URL: type http:// at the
beginning of the URL.

In case of internal URL. Required format::
“<Server_Name>@<Path>”.
WAP blocking configuration: Equivalent to the previous one but
with the following response codes:
o
200 OK - Request has succeeded
o
302 Found - Request has been moved temporarly
o
307 Moved - Request has been moved temporarly
o
404 Not Found
It is possible to configure a Blockin Page URL for any of
this response:

In case of external URL: type http:// at the
beginning of the URL.

In case of internal URL. Required format::
“<Server_Name>@<Path>”.
Clicking on Preview button it is possible to check the new blocking web page.
5-20
WebSafe Personal Operation Guide
Chapter 6: AdsFree
This section describes the configuration options for the AdsFree filtering services. This
section comprises of the following sub-sections: Filtering Policies, Profiles, Reports and
Advanced Configuration.
Filtering Policies
Figure 6-1: AdsFree Filtering Policies
´
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only AdsFree policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
AdsFree policies creation and priority modification. After deleting a policy or changing
its priority, you must click Accept to confirm the modifications.
WebSafe Personal Operation Guide
6-1
Figure 6-2: AdsFree Filtering Policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be on or off. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1: Source &
Destination for more information on Source and Destination
definition) The parameters that can be used for this section are:
Service
AdsFree
Only source
6-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 Clients (ISP administration)
 IPs or IP Ranges
 Users
 User Groups (in case an LDAP is available)
 Module instance
WebSafe Personal Operation Guide

Profiles: The group of conditions that must be satisfied to apply
the policy (see next section for more information on AdsFree
profiles)
Figure 6-3: AdsFree Filtering Policies: Actions
WebSafe Personal Operation Guide
6-3


Actions: The action the policy will carry out. In this case the
possibilities are:
o
Block all pop-ups: it blocks all pop-up windows coming
from the requested URLs.
o
Block only ads pop-ups: it blocks advertising pop-up
windows coming from the requested URLs.
o
Freeze gifs animation: it avoids gif animation to be
displayed.
o
Hide banners: this action substitutes banners on selected
URLs with empty spaces.
Schedule: The frame of time when the policy will be activated
(see Chapter 1: Schedules for more information on schedule
definition)
If the Log activity option is checked, policy execution will be logged (see Chapter 1:
Filtering Log Configuration for more information on logging capabilities). In a similar
way, if the policy is associated to an event, each time the policy is executed an event
will be triggered, which could be also associated to an alarm (see Chapter 1: Events and
Chapter 1: Alerts for more information on Events and Alerts)
Profiles
In this section it is possible to create, edit and delete the profiles used to define AdsFree
policies. Each profile is comprised of a number of conditions which could be categories,
included and excluded URLs.
6-4
WebSafe Personal Operation Guide
Figure 6-4: AdsFree Profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:

Categories: this section lists the content categories to include in
the profile. A category is a set comprising web pages related to a
specific type of content. These sets can be created using lists of
URL addresses, semantic URL analyzers, and content analyzers.
Click on ‘Include URLs not categorized’ to create a profile that
affects all URLs that are not included in any category.

Included URLs: Use this option to include URLs in the profile.
URLs added to this list will always satisfy the condition regardless
of whether it has been included in a category. It is possible to
include a website with regular expressions in the section Regular
Expression of Included URLs:
WebSafe Personal Operation Guide
6-5
Example:
http://www.website.com/*
http://www.website.com/*/images
To include several URLs, each one of them must be entered on a new line.

Excluded URLs: Use this option to exclude URLs from the
profile. URLs added to this list will be considered an exception,
and will never satisfy the condition regardless of whether they
have been included in a category.
The relationship between the different conditions is:
(Categories OR Included URLs) AND NOT Excluded URLs
Reports
Service Reports
This section is used to configure the AdsFree service reports that will be requested. Both
the data that will make up a report and the report's format can be edited.
6-6
WebSafe Personal Operation Guide

Type of report:
o
Blocks: The total number of requests that were blocked by
the filter.
Figure 6-5: AdsFree Service Reports
The report has several different criteria that allow the administrator to filter and create a
more specific report.

Groupings: The grouping criteria allow the administrator to set
the data field or attribute by which the values displayed in the
report will be grouped. Furthermore, the administrator can create a
sub-grouping of the group criteria. For example, the results can be
grouped by Days, and then further grouped by File Type. So, in the
report, the results are broken down by day, and within each Day
group, the results are sorted by File Type.

Selection Criteria: The report can have conditions that include or
exclude several parameters (shown in the Use selection criteria
section). Click on the checkbox to enable the frame on the right. In
this frame you can select different fields to include or not include.
Type in the parameter (e.g. Client ID of XXXX in or not in) and
these conditions will then appear in the main condition box.
You can also customize the report by:
WebSafe Personal Operation Guide
6-7

Time Frame

Format: table, graph, line graph or pie chart

Order: ascending or descending order

Data computing: shows absolute or percentage figures.

Records to show
Once the report is generated, it can be exported to:

PDF

HTML

CSV
Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
Figure 6-6: AdsFree Monitor Reports
6-8
WebSafe Personal Operation Guide
Chapter 7: Automatic Notices
This service allows operators to display notifications to their clients by redirecting their
navigation to a given URL.
This section describes the configuration options for the Automatic Notices service. This
service allows ISPs to display notifications to their clients by redirecting their
navigation to a given URL. This section comprises of the following sub-sections:
Filtering Policies, Profiles and Reports.
Filtering Policies
Figure 7-1: Automatic Notices
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only Automatic Notices policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Automatic Notices policies creation and priority modification. After deleting a policy or
changing its priority, you must click Accept to confirm the modifications.
WebSafe Personal Operation Guide
7-1
Figure 7-2: Automatic Notices Policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be enabled. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1:
Source&Destination for more information on Source and
Destination definition) The parameters that can be used for this
section are:
Service
AutoNotices
Only source
7-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 Clients (ISP administration)
 IPs or IP Ranges
 Users
 User Groups (in case an LDAP is available)
 Module instance
WebSafe Personal Operation Guide

Profiles: The group of conditions that must be satisfied to apply
the policy (see next section for more information on Automatic
Notices profiles)
Figure 7-3: Automatic Notices Policies: Actions
WebSafe Personal Operation Guide
7-3


Actions: The action the policy will carry out. In this case there is
only one possibility:
o
Redirection to: you can select here a list of URLs to be
redirected to. These lists should be defined previously in
Advanced Configuration. In this case, if the conditions are
met, the navigation is redirected to an URL from the list.
o
Banners inserction: you can select here a list of banners
to be inserted in a web page. These lists should be defined
previously in Advanced Configuration. In this case, if the
conditions are met, a banner will be inserted in the web
page that the user is visiting with the configuration defined
in “Advanced Configuration”.
o
Smart banners: you can select here a list of smart banners
to be inserted in the web page. These lists should be
defined previously in Advanced Configuration. In this
case, if the conditions are met, the java script of the banner
will be inserted in the web page that the user is visiting
with the configuration defined in “Advanced
Configuration”.
Schedule: The frame of time when the policy will be activated
(see section Schedules in Chapter 1 for more information on
schedule definition)
If the Log activity option is checked, policy execution will be logged (see section
Filtering Log Configuration in Chapter 1 for more information on logging capabilities).
In a similar way, if the policy is associated to an event, each time the policy is executed
an event will be triggered, which could be also associated to an alarm (see sections
Events in Chapter 1 and Alerts in Chapter 1 for more information on Events and Alerts)
When a user request is redirected, the following parameters are added to the redirection
URL:

Original URL: URL requested by the user.

Client IP: IP address from where the user made the request.

Client: client ID the user belongs to.

IID: identificator of service modality.
The format of the request sent to the redirected URL is as follows:
7-4
WebSafe Personal Operation Guide
http://<redirection_url>/?Params=[original_url]|[client_ip]|[cli
ent]|[iid]
Profiles
In this section it is possible to create, edit and delete the profiles used to define
Automatic Notices policies. Each profile is comprised of a number of conditions such as
categories, included URLs and excluded URLs.
Figure 7-4: Automatic Notices Profiles: Category
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:
WebSafe Personal Operation Guide
7-5

Categories: this section lists the content categories to include in
the profile.

Hosts Included: Use this option to include Hosts in the profile.
Hosts added to this list will always satisfy the condition regardless
of whether it has been included in a category. It is possible to ad a
hosts with regular expression in the Regular expressions section of
included hosts:
Example:
www.website.com/*
www.website.com/*/images
To include several URLs, each one of them must be entered on a new line.

Hosts Excluded: Use this option to exclude Hosts from the
profile. Hosts added to this list will be considered an exception,
and will never satisfy the condition regardless of whether they
have been included in a category.
Figure 7-5: Automatic Notices Policies: Frequency

Frequency: Use this option to define how often the notice will be
shown.
Reports
7-6
WebSafe Personal Operation Guide
Service Reports
Figure 7-6: Automatic Notices Service Reports
This section is used to configure the Automatic Notices service reports that will be
requested. Both the data that will make up a report and the report's format can be edited.
The following parameters can be configured:

Report type: Total

Grouping options: Events can be grouped by two criteria
according to the fields chosen in the Log Configuration section.

Selection criteria: It is possible to apply filters to some fields so
that only records that meet certain user-defined conditions are
included. As with the grouping criteria, they depend on the work
mode that is being used. They are usually the same as in the
previous section.
You can also customize the report by:
WebSafe Personal Operation Guide
7-7

Timeframe: Date range of the report.

Format: The report can be displayed in table format, or as a bar
graph, pie chart or line graph.

Order: The results of the query can be stored in descending order.

Calculation method: The data can be calculated as absolute totals
or as percentages.

Records to Show: Total number of records that will be displayed
in the report.
Once the report is generated, it can be exported to:

PDF

HTML

CSV
Monitor Reports
This section allows the administrator to create a detailed report on notices history.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
7-8
WebSafe Personal Operation Guide
Figure 7-7: Automatic Notices Monitor Reports
Advanced Configuration
Redirection
Figure 7-8: Automatic Notices Advanced Configuration: Redirection
WebSafe Personal Operation Guide
7-9
In this section it is possible to create, edit and delete the lists of URLs that will be used
in the redirect action.
Figure 7-9: Automatic Notices Advanced Configuration: Redirection edition
Each list has to include the list of URLs and the redirection algorithm:

Radom redirection (URLs can be repeated)

Radom redirection without repetition
Banners Insertion
Figure 7-10: Automatic Notices Advanced Configuration: Banners insertion
7-10
WebSafe Personal Operation Guide
In this section it is possible to create, edit and delete the lists of Banners that will be use
in the Banners insertion action.
Figure 7-11: Automatic Notices Advanced Configuration: Banners edition
Each banner list has to include:

The list of URLs where the banner is located

The position of the banner in the web page

The width of the banner ir % or pixels

The banner insertion algorithm:
o
Radom redirection (URLs can be repeated)
o
Radom redirection without repetition
Smart Banner
WebSafe Personal Operation Guide
7-11
Figure 7-12: Automatic Notices Advanced Configuration: Smart Banners list
In this section it is possible to create, edit and delete the lists of Smart Banners that will
be use in the Smart Banners insertion action:
Figure 7-13: Automatic Notices Advanced Configuration: Smart Banners
edition
Each smart banner has to include:
7-12
WebSafe Personal Operation Guide

The URLs (static image, javascript code…) where the smart
banner is located when is closed

The position size of the smart banner when is closed

The URLs (static image, javascript code…) where the smart
banner is located when is opened

The position size of the smart banner when is opened

The banner insertion algorithm:
o
Radom redirection (URLs can be repeated)
o
Radom redirection without repetition
WebSafe Personal Operation Guide
7-13
Chapter 8: Anti-phishing
This service offers protection from potential and verified fraud sites that try to obtain
sensible user information simulating other legitimate websites, including emails
containing links to these sites.
This section describes the configuration options for the Antiphishing service. This
section comprises of the following sub-sections: Filtering Policies, Profiles, Black- &
Whitelists, Quarantine and Reports.
Filtering Policies
Figure 8-1: Antiphising
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only AntiPhishing policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Antiphishing policies creation and priority modification. After deleting a policy or
changing its priority, you must click Accept to confirm the modifications.
The main table displays the various policies and information on the source &
destination they apply to, the action to be performed, the filtering conditions and the
time when they will be applied.
WebSafe Personal Operation Guide
8-1
In the bottom part of the screen, you can view detailed information on a selected policy,
the source & destination to which it is applied, the action, the conditions for its
execution and the time period during which it is applied.
From this screen, you can delete a policy, edit it or change its priority by altering its
position in the list using the arrows.
To edit or create a policy, click on “Edit” or “New”. This activates the editing box, from
which the various criteria can be adjusted.
Figure 8-2: AntiPhishing Policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:
8-2
WebSafe Personal Operation Guide

Status: Select whether the policy is going to be on or off. This
option lets you create and edit a policy before activating it.
Figure 8-3: Antiphising Policies: Source&Destination

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1: Source &
Destination for more information on Source and Destination
definition)
AntiPhishing policies require the definition of both the origin and destination
(in order to determine the direction of the traffic to be filtered):
o
If a specific origin is chosen (an origin different from
“All”), destination will be set automatically to “All”. That
is, a policy to filter outgoing traffic is being created (web
requests or outgoing email). This decision will limit so, the
list of available profiles to be associated to the policy.
o
If a specific destination is chosen (a destination different
from “All”), origin will be set automatically to “All”. That
is, a policy to filter incoming traffic is being created
(incoming email). This decision will limit so, the list of
available profiles to be associated to the policy.
The parameters that can be used for this section are:
WebSafe Personal Operation Guide
8-3
Service
Valid Conditions
AntiPhishing
Both source and
destination.
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges (Web, Smtp.in, Smtp.out)
 Users (web)
 User Groups (web)
 Module Instance (web)
 Mail domains (smtp.in, POP, Smtp.out)
 Mail Addresses (smtp.in, pop, smtp.out)

Profiles: The group of conditions that must be satisfied to apply
the policy (see next section for more information on Antiphishing
profiles)

Actions: The action the policy will carry out. In this case the
possibilities depend on the Protocol of the Profile selected:
o
Web/Wap:
Figure 8-4: Antiphishing Policies: Web Actions
8-4
WebSafe Personal Operation Guide
o

Block with standard blocking page: it blocks the
access to the requested URL and displays a
blocking page.

Block with this URL: it blocks the access to the
requested URL and displays a blocking page
specific for this rule.

Bypass: it allows accessing the requested URL
and registers the event on the logs.
Mail:
Figure 8-5: Antiphishing Policies: Mail actions
WebSafe Personal Operation Guide
8-5


Delete: discards the message.

Bypass: lets the message reach its destination.

Quarantine: sends the message to quarantine.

Tag message: adds a label to the message as a
prefix in the subject, replacing the subject, in the
message’s body or replaces the message with the
label and adds the message as attachment. Tagging
a message can be a “stand-alone” action or
complementary to send the email to quarantine,
redirect or copy it to an email address.

Redirect: diverts the message to a new e-mail
address. Only available when the associated
profile does not include POP filtering.

Copy to: delivers the message to the original
addressee and sends a copy to a new e-mail
address. Only available when the associated
profile does not include POP filtering.
Schedule: The frame of time when the policy will be activated
(see section Schedules in Chapter 1 for more information on
schedule definition)
By default there are six Antiphishing policies defined:
8-6
WebSafe Personal Operation Guide

AntiPhiWebWL: This policy allows access to all URLs included
in the Whitelist (see Black & White Lists in this Chapter). This
will apply to all Antiphishing filter services as long as this policy
has the higher priority.

AntiPhiWebBL: This policy denies access to all URLs included
in the Blacklist (see Black & White Lists in this Chapter). This
will apply to all Antiphishing filter services as long as this policy
has the higher priority.

AntiPhiMailWL: This policy allows access to all Mails included
in the Whitelist (see Black & White Lists in this Chapter). This
will apply to all Antiphishing filter services as long as this policy
has the higher priority.

AntiPhiMailBL: This policy denies access to all Mails included in
the Blacklist (see Black & White Lists in this Chapter). This will
apply to all Antiphishing filter services as long as this policy has
the higher priority.

BlockMailAttack: This policy apply only to Basic customers. The
policy denies access to all Mails included in a verified list of
Phising.

BlockWebAttack: This policy apply only to Basic customers. The
policy denies access to all Web sites included in a verified list of
Phising.
If the Log activity option is checked, policy execution will be logged (see section
Filtering Log Configuration in Chapter 1 for more information on logging capabilities).
In a similar way, if the policy is associated to an event, each time the policy is executed
an event will be triggered, which could be also associated to an alarm (see sections
Events in Chapter 1 and Alerts in Chapter 1 for more information on Events and Alerts)
Profiles
In this section it is possible to create, edit and delete the profiles used to define
Antiphishing policies. Each profile is comprised of a number of conditions such as
Protocol, Threat and Advanced criteria.
WebSafe Personal Operation Guide
8-7
Figure 8-6: Antiphising Profiles: Protocol
The top left frame lists the profiles that have been already defined and allows creating,
deleting or editing a profile. On selection of one of these profiles, the top right frame
will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:

Protocol: You can select whether this profile will apply to Web,
incoming or outgoing mail. In case of choosing incoming email, it
will be possible to select POP, SMTP or both. Take into account
that if POP filtering is required, “Copy to” and “Redirect To” will
not be available as actions of the associated policy.

Threat: Use this option to select the threat type.

o
Verified Phishing Sources: URLs categorized as phishing
in Optenet databases.
o
Suspicious Phishing Sources: URLs categorized as
potential phishing sources by content analysis.
o
Pharming (only for web Protocol): Activate antipharming
capabilities.
Advanced: This condition allows you to create profiles based on
the content of the black- & whitelists.
The relationship between the different conditions of a Profile is:
8-8
WebSafe Personal Operation Guide
Protocol AND (Thread OR Advanced)
By default there six Antiphishing profiles defined:

PhishingMailBL: This profile includes the conditions protocol
“Mail In” and “If in Blacklist” and cannot be deleted or edited.

PhishingMailWL: This profile includes the conditions protocol
“Mail In” and “If in Whitelist” and cannot be deleted or edited.

PhishingWebBL: This profile includes the conditions protocol
“Web/Wap” and “If in Blacklist” and cannot be deleted or edited.

PhishingWebWL: This profile includes the conditions protocol
“Web/Wap” and “If in Whitelist” and cannot be deleted or edited.

VerifMailPhish: This profile includes the condition protocol
“Mail In” and the threads of Verified phishing .

VerifWebPhish: This profile includes the condition protocol
“Mail In” and the threads of Verified phishing sources.
Black- & Whitelists
This screen offers a quick access to the content of Whitelist and Blacklist categories.
Here you can edit the content of both lists.
WebSafe Personal Operation Guide
8-9
Figure 8-7: Antiphishing Black- &Whitelists
Note that these lists must be associated to a policy in order to define their functionality.
Use the “Filtering Policies” section for this purpose."
Quarantine
The Quarantine module is used to store, display and unblock the messages that have
been identified as phishing, and sent to Quarantine by the filtering policies.
8-10
WebSafe Personal Operation Guide
Figure 8-8: AntiPhishing Quarantine
Available operations over selected e-mails are:

Unblock: Selected emails are delivered.

Delete: Selected emails are removed.

Forward: Selected emails are sent to a delivery list (a new
window is being shown in order to indicate that list). Emails are
not removed from quarantine.
Figure 8-9: AntiPhishing Quarantine: Search
It is also possible to search messages using various selection criteria.
WebSafe Personal Operation Guide
8-11

Time frame: Date range the messages were sent.

Sender: EXACT Search. Valid formats:
o
name@domain
o
ip@domain
o
@domain  All emails for that domain will be returned.

Receiver: like Sender with exact search in the same formats

Subject: Type a substring to be found anywhere as part of the
subject.
Also indicate the number of Records to show (per page) and the order criteria:

By Sender or

By Subject or

By Date Sent
Reports
Service Reports
This section is used to configure the Antiphishing service reports that will be requested.
Both the data that will make up a report and the report's format can be edited.
8-12
WebSafe Personal Operation Guide
Figure 8-10: AntiPhishing Service Reports
The following parameters can be configured:
WebSafe Personal Operation Guide
8-13

Report type: Options are different for web and mail data sources:
o
Accesses: The total number of requests/messages that
were allowed.
o
Blocks: The total number of requests/messages blocked by
the filter.
o
Requests: The total number of requests/messages, allowed
or blocked, that meet the conditions of the report.

Traffic (only Web): Amount of data transferred during a request.

Size (only Mail): Size of messages received.

Timeframe: Date range of the report.

Grouping options: Events can be grouped by two criteria
according to the fields chosen in the Log Configuration section.

Selection criteria: It is possible to apply filters to some fields so
that only records that meet certain user-defined conditions are
included. As with the grouping criteria, they depend on the work
mode that is being used. They are usually the same as in the
previous section.

Format: The report can be displayed in table format, or as a bar
graph, pie chart or line graph.

Records to Show: Total number of records that will be displayed
in the report.

Order: The results of the query can be stored in descending order.

Calculation method: The data can be calculated as absolute totals
or as percentages.
Once the report has been generated, it can be exported in PDF format.
Monitor Reports
This section is used to configure the monitoring reports that will be requested. Both the
data that will make up a report and the report's format can be edited. It provides detailed
information on activity, not the numerical/statistical results of the previous section.
8-14
WebSafe Personal Operation Guide
Figure 8-11: AntiPhishing Monitor Reports
The following parameters can be configured:

Selection criteria: It is possible to apply filters to some fields so
that only records that meet certain user-defined conditions are
included.

Timeframe: Date range of the report.

Records to Show: Total number of records that will be displayed
in the report.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Source IP of XXXX in or not in) and these conditions will then appear
in the main condition box.
WebSafe Personal Operation Guide
8-15
Advanced configuration
Figure 8-12: AntiPhishing Advanced Configuration
In this section it is possible to select a list of categories that should be considered as nophishing URLs. By default, the categories consider as no-phishing are:
8-16

Government

Financial Institutions

Webmail

Pay Per surf

Economy
WebSafe Personal Operation Guide
Chapter 9: Antispam In
This service offers incoming mail filtering capabilities. Spam messages can be filtered
using a range of spam detection methods, as well as whitelists and blacklists that allow
spam to be deleted, rerouted to an external account, tagged or sent to a quarantine
fileserver.
This section describes the configuration options for the Incoming Antispam
(Antispam.IN) filtering service. This service can analyze and filter SMTP and POP emails. This section comprises of the following sub-sections: Filtering Policies, Profiles,
Black- & Whitelists, Quarantine, Reports and Advanced Configuration.
Filtering Policies
Figure 9-1: Antispam
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only Incoming Antispam policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Incoming Antispam policies creation and priority modification.
WebSafe Personal Operation Guide
9-1
Figure 9-2: Antispam policies: status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be enabled. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see Chapter 1: Source &
Destination for more information on Source and Destination
definition) Antispam.In policies require only the selection of the
Destination of the e-mails to be filtered. The parameters that can be
used for this section are:
Service
AntiSpam.In
Only destination

9-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges
 Users
 User Groups
 Module Instance
 Mail Domains (smtp.in, POP)
 Mail Addresses (smtp.in, pop)
Profiles: The group of conditions that must be satisfied to apply
the policy (see the following section for more information on
Incoming Antispam profiles)
WebSafe Personal Operation Guide
Figure 9-3: Antispam policies: Actions

Actions: The action the policy will carry out. In this case the
possibilities are:
o
Delete: discards the message.
o
Bypass: lets the message reach its destination.
o
Quarantine: sends the message to quarantine.
o
Tag message: adds a label to the message as a prefix in the
subject, replacing the subject, in the message’s body or
replaces the message with the label and adds the message
as attachment. Tagging a message can be a “stand-alone”
action or complementary to send the email to quarantine,
redirect or copy it to an email address.
o
Redirect: diverts the message to a new e-mail address.
This action is only available for SMTP profiles. If the
profile selected includes POP protocol, this action won’t
be available.
WebSafe Personal Operation Guide
9-3

o
Copy to: delivers the message to the original addressee
and sends a copy to a new e-mail address. This action is
only available for SMTP profiles. If the profile selected
includes POP protocol, this action won’t be available.
o
Add to blocked IPs during a period of minutes. In this
case all the emails from the IP blocked will be blocked for
a period of time.
o
Remove from blocked IPs. Remove the IP from the list of
blocked IPs. This means that from that moment, the email
sent from that IP will arrive to its destination. You may
choose to apply this policy only during client connection
and/or to terminate the action of the last policy to be
executed
Schedule: The frame of time when the policy will be activated (see
section Schedules in Chapter 1 for more information on schedule
definition)
There are two global Incoming Antispam filtering policies defined by default:

AntispamInWL: This policy allows access to all e-mails from
addresses or domains included in the Whitelist (see section
Black&Whitelists in Chapter 10). This will apply to all Incoming
Antispam filter services as long as this policy has the higher
priority.

AntispamInBL: This policy blocks all e-mails from addresses or
domains included in the Blacklist (see section Black&Whitelists in
Chapter 10). This will apply to all Incoming Antispam filter
services as long as this policy has the higher priority.
There is also a filtering policy that affects clients provisioned with the Basic
Antispam.In service:

BlockSpam: This policy tags spam e-mails with the string
“**SPAM**” as a subject prefix.
If the Log activity option is checked, policy execution will be logged (see section
Filtering Log Configuration in Chapter 1 for more information on logging capabilities).
In a similar way, if the policy is associated to an event, each time the policy is executed
an event will be triggered, which could be also associated to an alarm (see sections
Events in Chapter 1 and Alerts in Chapter 1 for more information on Events and Alerts)
9-4
WebSafe Personal Operation Guide
Profiles
In this section it is possible to create, edit and delete the profiles used to define
Incoming Antispam policies. Each profile is comprised of a number of conditions such
as protocol, spam, sender, addressee, attachment or advanced.
Figure 9-4: Antispam profiles: Protocols
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:

Protocol: You can select whether this profile will apply to SMTP
e-mails, POP e-mails or both of them.
Note: POP protocol will not be available if the solution is deployed in proxy mode.
WebSafe Personal Operation Guide
9-5
Figure 9-5: Antispam profiles: Spam

Spam: Here you can select the conditions that an e-mail must have
to be considered spam. These could be:
o
Spam detection: activates the spam detection methods
specified in the Filter Settings section (see section
Advanced Configuration in Chapter 10).
o
Keyword analysis: activates the search for specific
keywords in the e-mail.
o
Header key analysis: similar to keyword analysis, but in
this case it searches for a specific value on a defined
header key.
o
Empty mail: if you activate this option, mails that have no
body and no subject will be considered spam.
Note: Header key names are case insensitive, but header key values are case sensitive.
9-6
WebSafe Personal Operation Guide
Figure 9-6: Antispam profiles: Sender


Sender: In this condition you can define e-mail senders by:
o
IP Range: Select a range of IPs by completing the From
and To fields or a single IP by completing only the From
field.
o
Address or domain: It is possible to select a single e-mail
address or a whole domain. You can also decide whether
to check these addresses or domains in the envelope or the
header of the e-mail: fields MAIL FROM (not applicable to
POP) or From respectively.
Addressee: In this condition you can define e-mail receivers by
address or domain. It is possible to select a single e-mail address or
a whole domain. You can also decide whether to check these
addresses or domains in the envelope or the header of the e-mail:
fields RCPT TO (not applicable to POP) or To respectively.
WebSafe Personal Operation Guide
9-7
Figure 9-7: Volumetry

Volumetry: This condition defines the limit of mails, spam,
viruses or connections to be considered in a defined period of time.
Figure 9-8: Antispam profiles: Attachment
9-8
WebSafe Personal Operation Guide

Attachment: Use this option to select which file types will be
affected by this profile.
Figure 9-9: Antispam profiles: Advanced

Advanced: This condition allows you to create profiles based on
the content of the black- & whitelists (see section
Black&Whitelists in Chapter 10).
The relationship between the different conditions may be:
Protocol AND (Spam OR Senders OR Receivers OR Attachments OR
Advanced)
or:
Protocol AND (Spam AND Senders AND Receivers AND Attachments AND
Advanced)
By default there are three Incoming Antispam profiles defined:
o
ASInWL: This profile includes the condition “If in
Whitelist” and cannot be deleted or edited (see section
Black&Whitelists in Chapter 10 for information on
Incoming Antispam Whitelist).
o
ASInBL: This profile includes the condition “If in
Blacklist” and cannot be deleted or edited (see section
Black&Whitelists in Chapter 10 for information on
Incoming Antispam Blacklist).
o
Spam: This profile includes the condition “Spam
detection” from the tab Spam and affects all protocols
(POP and SMTP).
WebSafe Personal Operation Guide
9-9
Black- & Whitelists
Here you can edit the content of Whitelist and Blacklist categories for Incoming
Antispam.
Figure 9-10: Antispam Black- &Whitelists
It is important to note that the inclusion of an e-mail address or domain in these lists
does not imply necessarily that they will be always allowed or blocked. Although these
two lists are associated with two special profiles (see section Profiles in Chapter 10) that
cannot be modified, the same does not apply to the filtering policies that make use of
these profiles. Therefore the behavior of these two categories depends on the Filtering
Policy strategy.
Quarantine
The Quarantine module is used to store, display and unblock the messages that have
been identified as spam, and sent to Quarantine by the filtering policies.
The functionality is identical to that described for AntiPhishing Quarantine (Section
Quarantine in Chapter 9).
9-10
WebSafe Personal Operation Guide
Reports
Service Reports
This section allows you to set the preferences for creating reports about the messages
received and/or sent by clients, indicating whether or not these messages were
considered spam. You can set various parameters to create the desired report:

Type:
o
Accesses: The total number of messages that were
allowed.
o
Blocks: The total number of messages that were blocked
by the filter.
o
Requests: The total number of messages, allowed and
blocked, that meet the conditions of the report.
o
Size: Size of messages received.
The report has several different criteria that allow the administrator to filter and create a
more specific report.
WebSafe Personal Operation Guide
9-11

Groupings: The grouping criteria allow the administrator to set
the data field or attribute by which the values displayed in the
report will be grouped. Furthermore, the administrator can create a
sub-grouping of the group criteria. For example, the results can be
grouped by Sender, and then further grouped by Subject. So, in the
report, the results are broken down by sender, and within each
sender group, the results are sorted by subject.

Conditions: The report can have conditions that include or
exclude several parameters (shown in the Use selection criteria
section). Click on the checkbox to enable the frame on the right. In
this frame you can select different fields to include or not include.
Type in the parameter (e.g. Client ID of XXXX in or not in) and
these conditions will then appear in the main condition box.
Figure 9-11: Antispam Service Reports
You can also customize the report by:
9-12
WebSafe Personal Operation Guide

Time Frame

Format: table, graph, line graph or pie chart

Order: ascending or descending order

Number of records

Data computing: shows absolute or percentage figures.
Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
Figure 9-12: Antispam Monitor Reports
Advanced Configuration
Filter Settings
In this screen you can decide the settings of the spam filter behavior.
WebSafe Personal Operation Guide
9-13
Figure 9-13: Antispam Advanced Configuration: Filter Settings
9-14
WebSafe Personal Operation Guide
In Filter Behavior, you can activate various spam detection methods. These methods
will be used when activating the Spam Detection checkbox in the profile as described in
section Profiles in Chapter 10.
The detailed list of available techniques is:
Technique
Description
Spammers Lists
Internal list of known spammers distributed by Optenet (Email accounts)
The URLs embedded in the email will be categorized:
 Hyperlinks href, img, src.

Text that starts with http://

All found URLs will be categorized (using the Categorized URLs repository
associated to the distribution).

It is verified if the URL category is one of the categories configured by the user to
be used along with this technique::
Operative:
URL Lists
URL Analysis
URL Content Analysis

By default, “Pornography” and “Spammer Ads” categories are activated.

The Administrator is able to select any other category provided by Optenet
(By clicking the button [Add Others], a new section will appear to select
the categories to be considered).
“URD” – URL Semantic Analysis.
Content Analysis is being applied to the text of the URLs embedded in the Email. Content Dictionaries
oriented mostly to pornography detection.
URAC – URL Content Analysis
URL page is being gathered (GET) in order to analyze its content. That is Content Analysis is being performed
(AC), using dictionary mostly oriented to detect categories such as:
 Pornography

Gambling

Models
AC – Message content Analysis
Message Content
Analysis
The text included in the body of the email will be analyzed to determine if it is spam or not. A Bayesian
classification is being used to calculate a dictionary of pair (Word/prefix, weight). The content analyzer is
being trained against dictionaries oriented to detect mostly categories such as:
 Pornography

Banners

Gambling
General Spammers IP
Lists
LNI – Optenet Reputation Database
All IPs included in the email (except those belonging to customer internal networks) are being checked against
Optenet reputation database
SPF
SPF – Falsified Address detection.
It is being verified if the IP that sends the email is an authorized IP to do it in the name of the domain that
represents
WebSafe Personal Operation Guide
9-15
Technique
Description
MD5 – Optenet Digital Signature Verification.
Content Hash
Optenet distributes a database of signatures that enables the detection of attached files to Spam emails.
Cannot be applied to POP filtering!!
The goal of this technique is avoiding the arrival of Spam to the MTA.
GreyListing
If any antispam technique considers a given email as spam, an error code is returned. If a legitimate MTA is on
the other side, the email will be resent after a given period of time.
Local Reputation List
LRL – Contextual Reputation database: Oriented to reduce the number of false positives. To determine if a
received email has to be considered as spam, the “history” of the sender is being studied.
Domain Keys
The owner of a given domain generates one or more Key pairs (public/private) for that domain.
DKIM
Those Domain Public Keys are published in the DNS. The server for outgoing mail has a private key to sign
messages, so that each email includes the signature as part of the header.
DNSBL – Spammer Catalog
DNSBL
DNSBL (domain Name System BlackList), also known as DNS Blacklists, are lists to block spam. The
technique is based in converting IPs in domain names, enabling easy searches in black lists. If the administrator
of a given black list receives a spam email from a given domain, the server will be included in the black list.
VIP – Shared verification of known spam digital signatures.
Vipul's Razor is a checksum-based, distributed, collaborative, spam-detection-and-filtering network.
Detection is done with statistical and randomized signatures that efficiently spot mutating spam content.
Vipul’s Razor
Vipul’s Razor Technique consists of calculating hashes over paragraphs included in Emails and contrasts them
with Vipul’s network.
Outgoing TCP 2703 port must be opened at the firewall, so that the technique can be applied correctly.
You can also define the maximum size of messages accepted by the solution. Messages
over this size will be automatically discarded. Finally, it is possible to specify the
maximum size of a spam message. This means that any message bigger than this size
will NOT be analyzed with these spam detection methods.
Warning: Changes on the default Filter Behavior settings may lead to a reduction in the
effectiveness of the filter and/or an increase in the rate of false positives.
MTA DoS configuration prevents from Denial of Service attack to the MTA by:
9-16
WebSafe Personal Operation Guide

Limiting the maximum number of concurrent connections

Number of connections that can be queued (in case the maximum
number of concurrent connections is reached). Rest of connection
will be rejected.

Maximum number of concurrent connection from a single IP

Directory Harvest Attack Prevention (DHAP) to prevent from
requesting for invalid receivers from a single IP.
o
In case the limit is reached, the IP address will be added to
a blocking list. These IPs will be blocked for one hour.
o
The administrator can search from an IP in the list and can
unblock it
Figure 9-14: Antispam Advanced Configuration: MTA DoS
Security Settings
This section allows setting the incoming anti-relay capabilities of the system.
WebSafe Personal Operation Guide
9-17
Figure 9-15: Antispam Advanced Configuration: Security Settings
This screen enables the following configuration:
9-18
WebSafe Personal Operation Guide

Enable the SMTP [VERIFY] command:
o

If the [VERIFY] command is not enabled, all [VERIFY]
requests sent to the Mail Server will be rejected.
Activate/Deactivate the SMTP anti-relay capabilities:
o
In case of activating the anti-relay capabilities, you must
indicate the allowed IP ranges and domains (that can use
the MTA as a relay):

IP Ranges: IP addresses of those external users
that are allowed to use the mail server as a relay,
i.e. can send e-mails from the server.

Authenticated Domains: Authenticated Domains
indicates which domains belong to the Mail Server
(domains that are accepted as destination for
incoming e-mails).

By adding an asterisk ‘*’ to the list, all e-mails
will be accepted. On the other hand, if this field is
left blank, all e-mails will be rejected.
Notifications & Quarantine
Figure 9-16: Antispam Advanced Configuration: Notifications & Quarantine
This screen defines the time to live of files in quarantine and whether unblocked
quarantine messages are added to the Incoming Antispam Whitelist. You can also
enable the option of sending notifications to users when they have new messages in the
quarantine.
The default notification message is:
From: SenderQuarentine
To: User
Subject: Quarantine New mail notification
WebSafe Personal Operation Guide
9-19
Mailbox <$MAILBOX$> have $N_MESSAGES$ new mail(s) on Quarantine,
received since $DATE$.\n" Quarantine access: $URL$
Some of these values can be customized:

o
Use the field “Sender e-mail address” in the screen above
to change this value
o
Default value: <module_name>@<host_IP>
o
Example: [email protected]

User: receiver of the e-mail in quarantine.

Subject:

9-20
SenderQuarantine:
o
Can be modified from “General – Advanced
Configuration” editing the file “Quarantine.conf”, and
modifying the key “Setup > Messages > MailSubject”
o
Default value: “Quarantine New mail notification”
Message:
o
Cab be modified from “General – Advanced
Configuration” editing the file “Quarantine.conf” and
modifying the key “Setup > Messages > MailBody”
o
Default value: "Mailbox <$MAILBOX$> have
$N_MESSAGES$ new mail(s) on Quarantine, received
since $DATE$.\n" Quarantine access: $URL$"
o
Allowed tags:

$MAILBOX$: user’s mail box.

$N_MESSAGES$: number of user’s quarantined
messages.

$DATE$: date from last update.

$URL$: link to quarantine.
WebSafe Personal Operation Guide
Chapter 10: Antispam Out
This service offers outgoing mail filtering capabilities. Spam messages can be filtered
using a range of spam detection methods, as well as whitelists and blacklists that allow
spam to be deleted, rerouted to an external account, tagged or sent to a quarantine
fileserver.
This section describes the configuration options for the Outgoing Antispam (AS.OUT)
filtering service. This service can analyze and filter SMTP e-mails. This section
comprises of the following sub-sections: Filtering Policies, Profiles, Black- &
Whitelists, Quarantine, Reports and Advanced Configuration.
Filtering Policies
Figure 10-1: Antispam Out
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only Outgoing Antispam policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Outgoing Antispam policies creation and priority modification.
WebSafe Personal Operation Guide
10-1
Figure 10-2: Antispam Out policies
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be enabled. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see see Chapter 1: Source &
Destination for more information on Source and Destination
definition) Antispam.Out policies require only the selection of the
Source of the e-mails to be filtered. The parameters that can be
used for this section are:
Service
AntiSpam.Out
Only source
10-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 Users
 User Groups
 Module Instance
 Mail domains
 Mail addresses
WebSafe Personal Operation Guide

Profiles: The group of conditions that must be satisfied to apply
the policy (see the following section for more information on
Outgoing Antispam profiles)
Figure 10-3: Antispam Out policies: Actions
WebSafe Personal Operation Guide
10-3


Actions: The action the policy will carry out. In this case the
possibilities are:
o
Delete: discards the message.
o
Bypass: lets the message reach its destination.
o
Quarantine: sends the message to quarantine.
o
Redirect: diverts the message to a new e-mail address.
o
Copy to: delivers the message to the original addressee
and sends a copy to a new e-mail address.
o
Tag message: adds a label to the message as a prefix in
the subject, replacing the subject, in the message’s body or
replaces the message with the label and adds the message
as attachment.
o
Add sender to compromised IP/Client list: this action
does not affect directly the received e-mail. It adds the
sender’s IP address and Client Id to a list of potentially
compromised IP/Clients. This list can then be included in a
profile and then be used in a new policy to define a global
action on compromised IP/Clients.
o
Remove sender from compromised IP/Client list: this
action does not affect directly the received e-mail. It
removes the sender’s IP address and Client Id from the list
of potentially compromised IP/Clients.
o
Reject: this action rejects outgoing e-mails and sends an
error code to the original sender. There are two possible
error codes:

Permanent: “553 Message refused”

Temporal: “452 Error sending message. Please try
again later”
Schedule: The frame of time when the policy will be activated
(see section Schedules in Chapter 1 for more information on
schedule definition)
By default there are five Outgoing Antispam filtering policies defined:
10-4
WebSafe Personal Operation Guide

AntispamOutWL: This policy allows access to all e-mails from
addresses or domains included in the Whitelist (see section
Black&Whitelists in Chapter 10). This will apply to all Outgoing
Antispam filter services as long as this policy has the higher
priority.

AntispamOutBL: This policy blocks all e-mails from addresses or
domains included in the Blacklist (see section Black&Whitelists in
Chapter 10). This will apply to all Outgoing Antispam filter
services as long as this policy has the higher priority.

DenySpam: This policy blocks e-mails that are considered spam
and are sent from compromised IP addresses.

RemComproIP: This policy removes IP addresses from the
compromised IP list when the ratio of spam e-mails sent by the IP
address is lower than a given threshold.

AddComproIP: This policy adds IP addresses to the compromised
IP list when the ratio of spam e-mails sent by the IP address is
higher than a given threshold.
If the Log activity option is checked, policy execution will be logged (see section
Filtering Log Configuration in Chapter 1 for more information on logging capabilities).
In a similar way, if the policy is associated to an event, each time the policy is executed
an event will be triggered, which could be also associated to an alarm (see sections
Events in Chapter 1 and Alerts in Chapter 1 for more information on Events and Alerts)
Profiles
In this section it is possible to create, edit and delete the profiles used to define
Outgoing Antispam policies. Each profile is comprised of a number of conditions such
as spam, sender, addressee, attachment or advanced.
Figure 10-4: Antispam Out profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
WebSafe Personal Operation Guide
10-5
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:
Figure 10-5: Antispam Out profiles: Spam

10-6
Spam: Here you can select the conditions that an e-mail must meet
in order to be considered as spam. These could be:
o
Spam received (detected using any of the spam
techniques). Activates the spam detection methods
specified in the Filter Settings section (see Advanced
Configuration in this Chapter)
o
Compromised IP address: matches if the the sender IP
address has been included in the compromised list.
o
In both cases, you must indicate how to estimate the
number of emails that are being sent, avoiding the need of
waiting for a whole minute for the triggering conditions to
be fulfilled: Fast Response, Normal Response, and Slow
Response.
o
Keyword analysis: activates the search for specific
keywords in the e-mail.
o
Header key analysis: similar to keyword analysis, but in
this case it searches for a specific value on a defined
header key.
WebSafe Personal Operation Guide
o
Empty mail: if you activate this option, mails that have no
body and no subject will be considered spam.
Note: Header key names are case insensitive, but header key values are case sensitive.
Figure 10-6: Antispam Out profiles: Sender

Sender: In this condition you can define e-mail senders by:
o
IP Range: Select a range of IPs by completing the From
and To fields or a single IP by completing only the From
field.
WebSafe Personal Operation Guide
10-7

o
Address or domain: It is possible to select a single e-mail
address or a whole domain. You can also decide whether
to check these addresses or domains in the envelope or the
header of the e-mail (fields MAIL FROM or From
respectively)
o
Sender included in the Compromised Clients/IP list:
Selects all IP addresses that have been included in the
Compromised list.
o
Sender not included in the Compromised Clients/IP
list: Selects all IP addresses that have NOT been included
in the Compromised list.
Addressee: In this condition you can define e-mail receivers by
address or domain. It is possible to select a single e-mail address
or a whole domain. You can also decide whether to check these
addresses or domains in the envelope or the header of the e-mail
(fields RCPT TO or To respectively) and if it is an illicit
connection to the port 25.
Figure 10-7: Antispam Out profiles: Attachment

10-8
Attachment: Use this option to select which file types will be
affected by this profile.
WebSafe Personal Operation Guide

Volume analysis: this option measures the number of messages
from any IP address. You may set an upper and lower threshold
based on total mails or spam mails based on:
o
Total number of emails / minute or
o
Number of Spam Email / minute
Figure 10-8: Antispam Out profiles: Advanced

Advanced: This condition allows you to create profiles based on
the content of the black- & whitelists (see Black&Whitelists in this
Chapter).
The relationship between the different conditions may be:
Protocol AND (Spam OR Senders OR Receivers OR Attachments OR
Advanced)
or:
Protocol AND (Spam AND Senders AND Receivers AND Attachments AND
Advanced)
By default there are five Outgoing Antispam profiles defined:
WebSafe Personal Operation Guide
10-9

ASOutWL: This profile includes the condition “If in Whitelist”
and cannot be deleted or edited (see Black & White Lists in this
Chapter).

ASOutBL: This profile includes the condition “If in Blacklist” and
cannot be deleted or edited (see Black & White Lists in this
Chapter).

HighVolumeSpam: This profile includes the condition upper
threshold of spam an IP address has to exceed.

LowVolumeSpam: This profile includes the condition lower
threshold of spam an IP address should not exceed.

RegularSpammer: This profile includes the condition Spam from
a compromised IP address.
Black- & Whitelists
Here you can edit the content of Whitelist and Blacklist categories for Outgoing
Antispam.
Figure 10-9: Antispam Out Black- &Whitelists
10-10
WebSafe Personal Operation Guide
It is important to note that the inclusion of an e-mail address or domain in these lists
does not imply necessarily that they will be always allowed or blocked. Although these
two lists are associated with two special profiles (see section Profiles in this Chapter)
that cannot be modified, the same does not apply to the filtering policies that make use
of these profiles. Therefore the behavior of these two categories depends on the
Filtering Policy strategy.
Quarantine
The Quarantine module is used to store, display and unblock the messages that have
been identified as spam, and sent to Quarantine by the filtering policies.
The functionality is identical to that described for AntiPhishing Quarantine (Section
Quarantine in Chapter 9).
Reports
Service Reports
This section allows you to set the preferences for creating reports about the messages
received and/or sent by clients, indicating whether or not these messages were
considered spam. You can set various parameters to create the desired report:


Type:
o
Accesses: The total number of messages that were
allowed.
o
Blocks: The total number of messages that were blocked
by the filter.
o
Requests: The total number of messages, allowed and
blocked, that meet the conditions of the report.
Size: Size of messages sent received.
The report has several different criteria that allow the administrator to filter and create a
more specific report.
WebSafe Personal Operation Guide
10-11

Groupings: The grouping criteria allow the administrator to set
the data field or attribute by which the values displayed in the
report will be grouped. Furthermore, the administrator can create a
sub-grouping of the group criteria. For example, the results can be
grouped by Sender, and then further grouped by Subject. So, in the
report, the results are broken down by sender, and within each
sender group, the results are sorted by subject.

Conditions: The report can have conditions that include or
exclude several parameters (shown in the Use selection criteria
section). Click on the checkbox to enable the frame on the right. In
this frame you can select different fields to include or not include.
Type in the parameter (e.g. Client ID of XXXX in or not in) and
these conditions will then appear in the main condition box.
Figure 10-10: Antispam Out Service Reports
You can also customize the report by:
10-12
WebSafe Personal Operation Guide

Time Frame

Format: table, graph, line graph or pie chart

Order: ascending or descending order

Number of records

Data computing: shows absolute or percentage figures.
Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
Figure 10-11: Antispam Out Monitor Reports
Advanced Configuration
Filter Settings
In this screen you can decide the settings of the spam filter behavior and manage the
Compromised Clients/IPs list.
WebSafe Personal Operation Guide
10-13
Figure 10-12: Antispam Out Advanced Configuration: Filter Settings
10-14
WebSafe Personal Operation Guide
In Filter Behavior, you can activate various spam detection methods. These methods
will be used when activating the Spam Detection checkbox in the profile as described in
section Profiles in this Chapter. For more information on these detection methods, see
the description on the Antispam In section Filter Settings.
You can also define the maximum size of messages accepted by the solution. Messages
over this size will be automatically discarded. Finally, it is possible to specify the
maximum size of a spam message. This means that any message bigger than this size
will NOT be analyzed with these spam detection methods.
Warning: Changes on the default Filter Behavior settings may lead to a reduction in the
effectiveness of the filter and/or an increase in the rate of false positives.
It is also displayed all IPs that have been included in the Compromised IP list (due to
the action of a policy), allowing to empty the list or remove a selected IP address.
As in case of Antispam In, it is also possible con configure MTA DoS techniques to
prevents from Denial of Service attacks (see Filter Settings in Antispam In Chapter for
form information)
Security Settings
This section allows setting the outgoing anti-relay capabilities of the system.
WebSafe Personal Operation Guide
10-15
Figure 10-13: Antispam Out Advanced Configuration: Security Settings
This screen enables the following configuration:
10-16
WebSafe Personal Operation Guide

Enable the SMTP [VERIFY] command: If the [VERIFY]
command is not enabled, all [VERIFY] requests sent to the Mail
Server will be rejected.

Activate/Deactivate the SMTP anti-relay capabilities:
o
In case of activating the anti-relay capabilities, you must
indicate the allowed IP ranges and domains (that can use
the MTA as a relay):

IP Ranges: IP addresses of those external users
that are allowed to use the mail server as a relay,
i.e. can send e-mails from the server.

Authenticated Domains: Authenticated Domains
indicates which domains belong to the Mail Server
(domains that are accepted as destination for
incoming e-mails).

By adding an asterisk ‘*’ to the list, all e-mails
will be accepted. On the other hand, if this field is
left blank, all e-mails will be rejected.
Notifications & Quarantine
Figure 10-14: Antispam Out Advanced Conf.: Notifications&Quarantine
This screen defines the time to live of files in quarantine and whether unblocked
quarantine messages are added to the Outgoing Antispam Whitelist.
You can also enable the option of sending notifications to users when they have new
messages in the quarantine.
WebSafe Personal Operation Guide
10-17
Chapter 11: Antivirus
The antivirus engine provides users with an automatic antivirus check when
downloading files. It is also possible to scan mail messages during the download and, if
a virus is detected, send them to quarantine, clean them and/or tag them.
This section describes the configuration options for the Antivirus service. This service
allows you to define filtering policies to manage virus threats for Web/WAP and
Antispam traffic. This section comprises of following sub-sections: Filtering Policies,
Profiles, Quarantine, Reports and Advanced Configuration.
Filtering Policies
Figure 11-1: Antivirus
This screen displays similar information to the one described in Chapter 1: Filtering
Policies but with the difference that only Antivirus policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Antivirus policies creation and priority modification.
WebSafe Personal Operation Guide
11-1
Figure 11-2: Antivirus policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be enabled. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see see Chapter 1: Source &
Destination for more information on Source and Destination
definition) The parameters that can be used for this section are:
Service
Antivirus
Both source and
destination
11-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges (Web, Smtp.in, Smtp.out)
 Users (Antivirus web)
 User Groups (web)
 Module Instance (web)
 Mail Domains (smtp.in, POP, Smtp.out)
Mail Addresses (smtp.in, pop, smtp.out)
WebSafe Personal Operation Guide

Profiles: The group of conditions that must be satisfied to apply
the policy (see the following section for more information on
Antivirus profiles)

Actions: The action the policy will carry out. In this case the
possibilities depend on the Protocol of the Profile selected:
Figure 11-3: Antivirus policies: Web/WAP Actions
o
Web/WAP:

Block: blocks the download of the requested file.

Bypass: allows the download of the requested file,
despite of being infected.
.
WebSafe Personal Operation Guide
11-3
Figure 11-4: Antivirus policies: Mail Actions
o

Mail:

Quarantine: sends the message to quarantine.

Block: blocks the message, deleting it completely.

Bypass: ignores the presence of a virus and
delivers the message to the original addressee.

Tag Message: adds a label to the message as a
prefix in the subject, replacing the subject, in the
message’s body or replaces the message with the
label and adds the message as attachment.
Schedule: The frame of time when the policy will be activated
(see section Schedules in Chapter 1 for more information on
schedule definition)
If the Log activity option is checked, policy execution will be logged (see section
Filtering Log Configuration in Chapter 1 for more information on logging capabilities).
In a similar way, if the policy is associated to an event, each time the policy is executed
an event will be triggered, which could be also associated to an alarm (see sections
Events in Chapter 1 and Alerts in Chapter 1 for more information on Events and Alerts)
11-4
WebSafe Personal Operation Guide
Profiles
In this section it is possible to create, edit and delete the profiles used to define Antivirus
policies. A profile is comprised of a single condition: its protocol.
Figure 11-5: Antivirus profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
protocol.
Quarantine
The Quarantine module is used to store, display and unblock the messages that have
been identified as spam, and sent to Quarantine by the filtering policies.
Mail Quarantine
The Quarantine module is used to store, display and unblock the messages that are
infected with virus, and sent to Quarantine by the filtering policies.
WebSafe Personal Operation Guide
11-5
Figure 11-6: Antivirus quarantine
Available operations over selected e-mails are:

Unblock: Selected emails are delivered.

Delete: Selected emails are removed.
Figure 11-7: Antivirus Quarantine: Search
It is also possible to search messages using various selection criteria.
11-6
WebSafe Personal Operation Guide

Time frame: Date range the messages were sent.

Sender: EXACT Search. Valid formats:
o
name@domain
o
ip@domain
o
@domain  All emails for that domain will be returned.

Subject: Type a substring to be found anywhere as part of the
subject.

Also indicate the number of Records to show (per page) and the
order criteria:
o
By Sender or
o
By Receiver or
o
By Subject or
o
By Date Sent
Reports
Service Reports
This section allows you to set the preferences for creating reports about the viruses
detected in clients’ systems. You can set various parameters to create the desired report
depending on the service they are referring to. If the Reporter is using Web/Wap filter
data, the parameters to configure are the same as the ones described in Chapter 6:
Web/WAP Reports. On the other hand if the Reporter is using Antispam logs, then the
parameters are as described in Chapter 10: Antispam In Reports.
WebSafe Personal Operation Guide
11-7
Figure 11-8: Antivirus Reports
Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
11-8
WebSafe Personal Operation Guide
Figure 11-9: Antivirus Monitor Reports
WebSafe Personal Operation Guide
11-9
Advanced Configuration
Figure 11-10: Antivirus Advanced Configuration
In this section you can design mail footers and notification messages for several
situations:

The attachment of an e-mail has been scanned and is safe to open.

The attachment of an e-mail is infected and is not safe to open.

Notification for the sender of an infected MMS message that has
not been delivered.
Apart from the content of the notification messages, you can also specify how often
users will receive notifications of deleted or quarantined messages.
11-10
WebSafe Personal Operation Guide
Chapter 12: Firewall
This section describes the configuration options for the Firewall service. This service
allows you to define filtering policies to manage traffic based on bandwidth, protocols
and ports. This section comprises of the following sub-sections: Filtering Policies,
Profiles, VoIP, IM & P2p, Custom Services, QoS & Bandwidth Mgmt, Routing and
Reports.
Filtering Policies
Figure 12-1: Firewall
This screen displays similar information to the one described in in Chapter 1: Filtering
Policies but with the difference that only Firewall policies are enabled (blue
background). In addition to edition and deletion of policies, this screen allows new
Firewall policies creation and priority modification.
WebSafe Personal Operation Guide
12-1
Figure 12-2: Firewall policies: Status
When creating or editing a policy, the Administrator will select five different
parameters:

Status: Select whether the policy is going to be enabled. This
option lets you create and edit a policy before activating it.

Source and Destination: The collective of users, groups, IP, etc.
that will be affected by the policy (see see Chapter 1: Source &
Destination for more information on Source and Destination
definition) The parameters that can be used for this section are:
Service
Firewall
Both source and
destination
12-2
Valid Conditions
Conditions based on:
 Provisioned Services (ISP administration)
 IPs or IP Ranges
 VLAN Ids
 MAC Addresses
WebSafe Personal Operation Guide

Profiles: The group of conditions that must be satisfied to apply
the policy (see the following section for more information on
Firewall profiles)
Figure 12-3: Firewall policies: Actions
WebSafe Personal Operation Guide
12-3


Actions: The action the policy will carry out. In this case the
possibilities are:
o
Bypass: allows the connection.
o
Drop: drops the connection.
o
Reject: rejects the connection.
o
Bandwidth Management: sets a limit to the connection
rate for a given IP or Client.
o
QoS (Quality of Service): tags packets to prioritize traffic
with the criteria: Best Effort, Class 1-4 and Express
Forwarding.
o
Route to: this action will only be available in Router
deployment mode. Establishes a route for this particular
type of traffic by setting the following parameters:

Outgoing Interface: the interface used to route
the traffic

Gateway: the gateway that should be accessed

Metric: a value that will set the global routing
priority of the rule
Schedule: The frame of time when the policy will be activated
(see section Schedules in Chapter 1 for more information on
schedule definition)
If the Log activity option is checked, policy execution will be logged (see section
Filtering Log Configuration in Chapter 1 for more information on logging capabilities).
In a similar way, if the policy is associated to an event, each time the policy is executed
an event will be triggered, which could be also associated to an alarm (see sections
Events in Chapter 1 and Alerts in Chapter 1 for more information on Events and Alerts)
Profiles
In this section it is possible to create, edit and delete the profiles used to define Firewall
policies. Each profile is comprised of a condition: services.
12-4
WebSafe Personal Operation Guide
Figure 12-4: Firewall profiles
The top left frame lists the profiles that have been defined by the Administrator and
allows creating, deleting or editing a profile. On selection of one of these profiles, the
top right frame will display its details.
Profiles are created and edited in the bottom frame, where it is possible to define the
following conditions:
WebSafe Personal Operation Guide
12-5

12-6
Services: It is possible to select from a range of services:
o
Web: HTTP, HTTPS
o
File Transfer: FTP, Gopher, WAIS, TFTP, UUCP
o
E-mail:

Applications: Lotus Notes, Microsoft HTTPMail

Protocols: SMTP, IMAP, POP3
o
P2P: Gnutella (Morpheus, LimeWare…), FastTrack
(Kazaa, iMesh…), Edonkey (Emule),Hotline Connect,
BitTorrent, WinMX, Ares, DirectConnect, Qnext,
Hamachi, FolderShare, ClubBox, BoxCloud, Pando,
Damaka, Giga Tribe, Onshare, Zultrax, VUZE
o
Streaming: Windows Media, RTSP Qtime, RealPlayer…,
iTunes, SHOUTcast, JetCast, Google Video, PeerCast,
AOL Radio, Raudio (PNA), VDOLive
o
Instant Messaging: MSN Messenger, Yahoo! Messenger,
AIM ,ICQ, Google Talk, Gmail Chat, Jabber, MIRC,
Tencent QQ, Gadu-Gadu, Camfrog, Paltalk, Eyeball Chat,
Wengo, Netease Popo, NateOn, Neos, Meetro, My Space
IM
o
VoIP:

Applications: Skype, NetMeeting, Talk

Protocols: SIP, SCCP, H323, MGCP
o
Chat: IRC
o
News Group: NNTP
o
Anonymizer: Hopster, GhostSurf, Google Web
Accelerator, Tor, RealTunnel, JAP, Your Freedom,
Toonel, SocksOnline, TotalRC
o
Remote Desktop:

Applications:
Telnet,
Rlogin,
Syslog,
PCAnywhere, VNC, Terminal Services, LogMeIn,
MyIVO, SoonR, WinRemotePC, Winframe, XWindows

Protocols: PPTP, L2TP, GRE, SSH, ONC-RPC,
REXEC, RSH, Winframe
o
Database: SQL Net
o
Network Services:
WebSafe Personal Operation Guide

Applications: Daytime, Timestamp, Ping, Finger,
Ident, Open Windows, NFS

Protocols: SOCKS 5, LDAP,
SMB/Samba, LPR, SNMP
NTP,
NFS,
o
Games: Second Life, Quake
o
Others: Protocols: TCP, UDP, ICMP, BGP, OSPF, RIP,
AH, DHCP, DNS, ESP, IKE
o
Custom defined: It is also possible to block protocols
defined by the administrator (see Custom Services section
in this Chapter).
Note: When selecting an application, the solution may automatically select one or more
protocols used by this application. This could imply the selection of more applications.
VoIP, IM & P2P
This screen is the same as Profiles screen but with only the following protocols:

VoIP

Instant Messaging

P2P
Figure 12-5: Firewall VoIP, IM and P2P
WebSafe Personal Operation Guide
12-7
Custom Services
Use this screen to define your own services. The top left frame displays the services that
you have already created. The top right frame shows the details of any selected service.
You can edit or create a new service by clicking on Edit or New.
You can create a service by defining a number of parameters. First assign a Name to
identify the new service. You can then define the range of ports and type of protocol
used by the service. This is useful when the service uses always the same ports.
Otherwise, if the service changes the port used by communication, you may use the
advanced options to define patterns that could identify a packet as belonging to a given
service.
Warning: The creation of pattern based services may lead to over-blocking.
Figure 12-6: Firewall Custom Services
12-8
WebSafe Personal Operation Guide
QoS & Bandwidh Management
Figure 12-7: Firewall QoS Bandwidth Management
This screen gives an overview of the Bandwidth Management and QoS policies in
place. In addition to edition and deletion of policies, this screen allows new Firewall
policies creation and priority modification. For more information, review Filtering
Policies in this Chapter.
Routing
Note: This section will only be available when the Solution is installed in router mode.
Routing Policies
This screen displays all static routing policies in place. In addition to edition and
deletion of policies, this screen allows new routing policies creation and priority
modification.
WebSafe Personal Operation Guide
12-9
Figure 12-8: Routing Policies
Static Routing Table
In this screen you can create, edit and delete static routes. These routes will govern
incoming traffic and will also be propagated to BGP neighbors.
Figure 12-9: Firewall Static Routing Table
12-10
WebSafe Personal Operation Guide
When creating or editing a policy, the following frame is shown:
Figure 12-10: Firewall new route
As shown in the image, to set a new routing rule, you must enter a route name,
destination network, gateway, interface and metric.
Dynamic Routing Table
Figure 12-11: Firewall Dynamic Routing Table
This table lists the routes learned through dynamic routing protocols.
Dynamic Routing Settings
BGP: In this section it is possible to configure the Border Gate Protocol (BGP).
WebSafe Personal Operation Guide
12-11
Figure 12-12: Firewall Dynamic Routing Settings
You can configure the following parameters:

Status: Enable or disable the service with this option.

BGP Identifier: the IP address with which the BGP router is
identified, that is, the IP address the neighboring routers will
connect to using BGP.

BGP Local AS (Autonomous System) ID: the ID number of the
autonomous system that the BGP belongs to.

Interfaces: the
communication.
interfaces
that
will
be
used
for
BGP
Figure 12-13: Firewall Edit Network
In the Neighbors box, you can add, edit or delete neighboring routers. When you click
on New or Edit the following box will be displayed:
12-12
WebSafe Personal Operation Guide
Figure 12-14: Firewall Edit Neighbor
Here you can configure the following parameters for each neighbor:

Status: use this option to temporarily remove a router from BGP
conversation.

Neighbor name: Set an internal name, which will only be used to
identify the router being configured in the GUI and in the
CCOTTA logs.

Neighbor IP address: IP address of the router that will
communicate with CCOTTA/BGP. Its MAC must be reachable
from the interface configured in the Interfaces field.

Neighbor AS ID: ID number of the autonomous system that the
neighboring router being configured belongs to.

TCP port (Default: 179): enables a port other than 179 to be used
for communication with neighboring routers.

BGP HoldTime (Recommended: 180): sets the HoldTime
(IMPORTANT: bear in mind that keepalive messages will be set to
1/3 of this value).

BGP-Update Origin Attribute (Recommended: 0): sets the
source attribute. CCOTTA/BGP does not apply logic to this value;
it will only form the packet with the value set here.

BGP-Update Local Pref Attribute (Recommended: 255):
metric of the IPs to be published.
WebSafe Personal Operation Guide
the
12-13

Community: this combo is used to configure the propagation
attribute, commonly used to avoid loops.
Reports
Service Reports
This section allows you to set the preferences for creating reports about the connections
requested by clients, indicating whether or not these connections were allowed or
blocked. You can set various parameters to create the desired report:

Accesses: The total number of connections that were allowed.

Blocks: The total number of connections that were blocked by the
filter.

Requests: The total number of connections, allowed and blocked,
that meet the conditions of the report.
Figure 12-15: Firewall Service Reports
The report has several different criteria that allow the administrator to filter and create a
more specific report.
12-14
WebSafe Personal Operation Guide

Groupings: The grouping criteria allow the administrator to set
the data field or attribute by which the values displayed in the
report will be grouped. Furthermore, the administrator can create a
sub-grouping of the group criteria. For example, the results can be
grouped by Source IP, and then further grouped by Protocol. So,
in the report, the results are broken down by Source IP, and within
each Source IP group, the results are sorted by Protocol.

Conditions: The report can have conditions that include or
exclude several parameters (shown in the Use selection criteria
section). Click on the checkbox to enable the frame on the right. In
this frame you can select different fields to include or not include.
Type in the parameter (e.g. Client ID of XXXX in or not in) and
these conditions will then appear in the main condition box.
You can also customize the report by:
WebSafe Personal Operation Guide
12-15

Time Frame

Format: table, graph, line graph or pie chart

Order: ascending or descending order

Number of records

Data computing: shows absolute or percentage figures.
Monitor Reports
Figure 12-16: Firewall Monitor Reports
This section allows the administrator to create a detailed report on clients’ history.
These reports display the filtering statistics of clients’ activities.
The report can have conditions that include or exclude several parameters (shown in the
Use selection criteria section). Click on the checkbox to enable the frame on the right.
In this frame you can select different fields to include or not include. Type in the
parameter (e.g. Client ID of XXXX in or not in) and these conditions will then appear in
the main condition box.
12-16
WebSafe Personal Operation Guide
Chapter 13: Reporter
The OST incorporates a report-generating tool capable of showing all data related to
requests analyzed and registered by the OST according to the configuration set by the
administrator.
These are the main features of the tool:

It does not rely on any external database platform, so no costly
database management system such as Oracle or MS SqlServer is
required.

It is based on a log and index compacting system, which performs
searches on all available data quickly and efficiently, taking up
minimum disk space.

The system for defining the reports to be generated, based on
configurable templates, is highly intuitive and flexible, allowing a
large variety of different reports to be generated easily.

It can be scheduled to generate reports automatically at any time,
freeing the administrator to continue with other tasks.

It can be installed on the same machine as the filter or on an
independent machine, thus preventing report generation from
influencing the performance of the filter.

The report tool can receive information from one or several local
or remote filters.
Report Templates
Optenet’s OST provides a list of templates to be used in the generation of the most
common reports.
Those templates are organized in groups or families:
WebSafe Personal Operation Guide
13-1
13-2

Global Use Reports: General purpose reports.

Monitoring reports: Reports oriented to monitor the correct
activity of the Solution (warnings, informative messages, errors etc
raised by the different modules included as part of the Solution).

Web Filter Reports: Reports related to Web/wap filtering service
(when available).

AntiSpam.In Reports: Reports related to incoming AntiSpam
filtering Service (when available)

AntiSpam.out Reports: Reports related to outgoing AntiSpam
filtering Service (when available)

Antivirus Reports: Reports related to Antivirus filtering service
(web and/or mail, when available).

Application Manager Reports: Reports related to Firewall
protection service (when available).

Automatic Notices Reports: Reports related to AutoNotices
redirection service (when available)

AntiPhishing Reports: Reports related to Antiphishing filtering
Service (web and/or mail, when available).

Auditing: Reports for monitoring and control the use of the OST
interface.

Favorite Reports: this family groups all those templates / queries
being saved by administrator for future use.
WebSafe Personal Operation Guide
Figure 13-1: Report Templates
The generation of reports provided by OST will be based on:

Execution of pre-defined templates (commonly-used queries,
provided as part of the solution).

Execution of guided queries (selecting the type of information to
be calculated, grouping criteria, filtering criteria, time period etc).
These queries can be saved as user templates for future use.

Both, predefined templates and user-defined templates can be
scheduled to be executed periodically (and optionally emailed to a
distribution list).
See Programmed Reports Section.

Repositories to be used:
o
By default, current repositories are being used.
o
It will be possible to specify an alternative path (for
instance, enabling the use of old repositories moved as a
backup to a different location – a different server and/or
disk-).
The information stored as a report template (or basic information required to execute an
individual query) must be the following:
WebSafe Personal Operation Guide
13-3
Concept
Comments
Report Type
Report type to be obtained:

Monitor report (using raw logs). Detailed log activity will be shown.

Accumulated Reports: Using accumulated repositories (enabling the use of grouping criteria, summarized
information etc).
Data Source Selection
Report From: Combo Box where the data source must be selected.
Queries will be oriented to a given Service, having each service (usually) an only dedicated Data Source.
Select any of the following data sources:

Internal

In order to execute queries related to verify the correct functioning of the Solution.

Content Filter.

Service web/wap (web filtering activity)

Antivirus Web

Service Antivirus (antivirus web filtering activity)

Antivirus Mail

Service Antivirus (antivirus mail filtering activity)

SMTPFilter In

Service AntiSpam.in (incoming AntiSpam filtering activity)

SMTPFilter Out

Service AntiSpam.in (outgoing AntiSpam filtering activity)

AntiPhishing Web.

Service AntiPhishing (web phishing filtering activity).

AntiPhishing Mail

Service AntiPhishing (mail phishing filtering activity).

Firewall

Service Firewall (Firewall filtering activity).

FTP Proxy

Service FTP Proxy (FTP filtering activity).

AutoNotices

Service AutoNotices (Redirections due to AutoNotices policies).

AdsFree

Service Adsfree (ads and banners blocked due to filtering policies)

Performance

Reports related to Solution performance

Traffic

Reports related to download and upload traffic by Client, IP etc.

Logons

Reports related to Logons/Logout in the solution

Master Entities

Reports related to changes in the Master Entities (Policies, Profiles, Source&Destination and
Schedules)

User Management

Reports related to users (new, edit, delete users)

BGP

Reports related to BGP
Calculated Field
Only available in reports using accumulated repositories:
Depending on selected Data Source, a Combo Box (Type) will be fulfilled with available calculated fields:

Data Computing
See complete list of available calculated fields per data Source later in this document.
Only available in reports using accumulated repositories:
Combo “Data Computing”: Select how the calculated field has to be shown:

Totals
13-4
WebSafe Personal Operation Guide
Concept
Comments

Time Period
Group Criteria
Ratio
Select any of the following time periods to be considered:

Predefined time periods:

Today: From Today 00:00 h - Now

Yesterday : From Yesterday 00:00 h – Yesterday 23:59

Last Week  Previous week (natural week):

Monday 00:00h – Sunday 23:59h

If [Sunday] is being configured as first day of the week: Sunday 00:00h – Sat 23:59

Last Month  Previous month (natural month)

Previous Month, Day 1, 0:00 h – Previous Month, Last day, 23:59

Custom Dates: The user will be able to establish a free range of dates:

From Date (dd/mm/yyyy hh:mm)

To Date (dd/mm/yyyy hh:mm)
Only available in reports using accumulated repositories:
Criteria to be used to group information. Available fields will depend on selected data source and the type of information
to be calculated.

See complete list of available fields to be used as grouping criteria per Data Source, later in this document.
Example: Blocks (web/wap Service), grouped by Web Category.
This would show a report grouping the number of blocks due to porn pages, press, Social Networks etc.
Subgroup Criteria
Only available in reports using accumulated repositories:
It will be possible to establish a second level to group calculated information. Restrictions:

Results Order
Format (table or chart
type)
Records to Show
Grouping criteria (grouping field) and subgrouping criteria (subgrouping field) cannot be the same.
Example: Blocks (web/wap Service), grouped by Day and subgrouped by Web Category
This would show a report grouping the number of blocks by day, and within each day, by Category.

Ascending | Descending.
It will be possible to select the format to represent the information

Table
or

Chart

Pie Chart

Columns

Lines
Number of results to be shown in the report (top n records / groups):
The number will vary depending on the representation type.

For tables  10 | 20 | 50 | 100 | 200 | 500 | 1000 | 2000 | 5000 records

For charts  10 | 20 | 50
Advanced filtering
criteria
Optionally, additional conditions can be established to limit the universe to be considered.



The available fields to be used to set additional conditions will vary depending on selected data source
Occasionally they can also vary depending on the selected field to be calculated (Combo Box “Type”).
See complete list of available fields to be used as filtering conditions later in this document.
It will be possible to establish more than a value for a given filtering field (comma separated values).
It will be possible to deny any given condition.
WebSafe Personal Operation Guide
13-5
Steps to execute a report


Using a Template:
o
Select a report template from the treeview on the left.
o
The template will be loaded on the different controls on
the right.
o
Change any required value (time range, grouping criteria
etc).
o
Change the default representation format if required (chart
type etc).
o
Click on [View] button. The report will be shown on a
separate browser window.
Specifying a query from scratch:
o
13-6
Select the type of report:

Check [Monitor] for detailed reports based on raw
logs.

Keep
it
unchecked
(default)
accumulated/summarized reports.
for
o
Select Data Source (Combo Box [Report From:])
o
Select the field to be calculated (Combo Box [Type :]).
o
Select Grouping criteria (Combo Box [Grouped by:])
o
Select Subgrouping criteria (Combo Box [Subgrouped by
:]). Optional.
o
Select Format, table or chart type (Combo Box [Format :]).
o
Select Data Computing Type, totals or ratio (Combo Box
[Data Computing :]).
o
Select the number of records / items to be considered
(Combo Box [Max.Records to show :]).
o
Check “Use Selection Criteria” if any additional condition
has to be established to restrict the results. A new section
will be shown enabling the introduction of values for
selection fields.
o
Click on [View] button to execute the query. The report
will be shown on a separate browser window.
WebSafe Personal Operation Guide
o
Feel free to save the template for future (by clicking on
[Save] button). In case of new template, a template name
must be entered.
Figure 13-2: Report Details
Steps to execute a Report (Performance Reports)
OST stores counters related to appliance CPU use, Memory Use and Traffic managed
by the different filtering modules / appliances where they are installed, enabling a fine
tuning of the deployed architecture.
WebSafe Personal Operation Guide
13-7
Figure 13-3: Performance Report
In case “Performance” is selected as data source:
13-8
WebSafe Personal Operation Guide


Combo Box “Type” (available calculated fields) will be refreshed
with the following values:
o
CPU: (% CPU usage).
o
Memory: (% Memory usage)
o
Traffic: (Traffic in bytes managed by the different
appliances/eths)
Depending on selected value, some other restrictions can be
established (in order to define queries with different levels of
granularity):
o
% CPU and % Memory usage:
o
Granularity 1: Appliance (all appliances or a given
appliance).
o

Granularity 2: Module (all filtering modules or a
given filtering module).

Granularity 3: If a given filtering module has been
selected: All module instances or a given instance.
Traffic:

Granularity 1: Appliance (all appliances or a given
appliance).

Granularity 2: Adapter/Eths (all eths or a given
eth).
If CPU or Memory is being selected, two extra combos are shown
in order to establish additional conditions to optionally select a
host (appliance) and/or Module (filtering module)
o


If case a specific filtering module is selected, an additional
combo will be shown so that the selection of a given
filtering module instance can be established.
If Traffic is being selected, two extra combos are shown in order to
establish additional conditions to optionally select a host
(appliance) and/or adapter (eth):
As a summary, this is the table of possible queries to be executed:
Calculated field Host
Module
% CPU | % Memory
All
All
WebSafe Personal Operation Guide
Module instance
-
Comments
Global % CPU or % Memory usage,
grouped by specified grouping criteria
(Hours, days, host, module, module
type)
13-9
Calculated field Host
Module
% CPU | % Memory
<Module Name>
% CPU | % Memory
% CPU | % Memory
All
All
Module instance
-
Global % CPU or % Memory used by
that filtering module, grouped by
specified grouping criteria (Hours,
days, host, module instance)
<Module Name> < Module Instance Name>
-
Comments
Example: %CPU used by WebFilter
Module.
Global % CPU or % Memory used by
that filtering module instance, grouped
by specified grouping criteria (Hours,
days, host, module instance)
Example: %CPU used by instance
WF01 of WebFilter Module.
Global % CPU or % Memory used by
all filtering modules running on
selected appliance grouped by
specified grouping criteria (Hours,
days, Module type, module instance)
< appliance
Name>
All
Calculated field
Host
Adapter
Comments
Traffic
All
All
<Appliance
Name>
<Appliance
Name>
All
Traffic managed by all appliances, all eths, grouped by selected
grouping criteria (Hours, days, host, adapter)
Traffic managed by selected appliance, all eths, grouped by selected
grouping criteria (Hours, days, adapter)
Traffic managed by selected eth of selected appliance, grouped by
selected grouping criteria (Hours, days)
Etc
<Ethx>
Etc
Report Results
Once a report template is selected and executed (or a query is executed) a new browser
window is opened showing the results of the report. Cases:
13-10
WebSafe Personal Operation Guide
Report. Table Format. Single Grouping criteria
Figure 13-4: Report Table format
The following columns will be shown as part of the table:

Field indicated as grouping criteria (Category in previous
example).

Selected Calculated field (Blocks in previous example).
o
Format: Will vary depending on field type:

Blocks, Accesses, Requests: Numeric values

Navigation Time: Time in seconds. Information
will be formatted to “d days, hh:mm:ss”

Size, Upload Bytes, Download bytes etc: Size in
bytes. Information will be formatted to Kb, MB or
GB according to represented value.
Note: Notice that each summarized record has an associated button, that grants the access
to the detailed raw records (detailed information) that contributed to that given calculated
record
WebSafe Personal Operation Guide
13-11
Figure 13-5: Report Details
Reports. Table Format. Two-level Grouping criteria
In case a subgrouping criterion has been established, tabular information is being shown
in this other format:
13-12
WebSafe Personal Operation Guide
Figure 13-6: Report Table format: Two level Grouping criteria
The report is similar to the one previously described (the one with an only field as
grouping criteria). This report includes the following differences:
WebSafe Personal Operation Guide
13-13

First column: Fields indicated as grouping/Subgrouping criterion
(Category/Uri in previous example).

For each grouped item:
o
A record is being shown indicating its name and
cardinality.
o
A record for each combination (<Grouped item value>,
<Subgrouped item value>).
Previous example would be the result of requesting a Content filter (web/wap service),
grouped by Web page Category and subgrouped by Uri.
Report in Chart Format (Columns). Single Grouping criteria
Figure 13-7: Report Chart format (Columns)

Grouping criteria is being shown as chart title (“Group Criteria:
Category” in previous example).

X Axis: Values taken by the field indicated as grouping criteria.

Y Axis: Cardinality.
In case any literal has been truncated (might occur for long values), move the mouse
over the chart items and a tooltip will be shown with the complete value and cardinality:
13-14
WebSafe Personal Operation Guide

On the right of the chart, same information is being summarized in
table format.
Report in Chart Format (Lines). Single Grouping criteria
Figure 13-8: Report Chart format (Lines)

Identical to Columns Chart described previously, using this time a
lines chart as format.
Report in Chart Format (Pie Chart). Single Grouping criteria
Figure 13-9: Report Chart format (Pie chart)
WebSafe Personal Operation Guide
13-15

Pie chart representation

Each sector shows the % that represents

To improve legibility, no other values are printed over chart
sectors, being all required information shown in the table on the
right.
Report in Chart Format. Two-level Grouping criteria

Similar to the ones described previously.

Different charts are being displayed:
o
A chart with summarized information (Level 1 – Grouped
by field)
o
For each level 1 value:

A chart with its distribution broken down by
(Level 2 – Subgrouped by field) values.
Example: Blocks (AntiSpam.in filter), grouped by Days and Recipient:
Figure 13-10: Report Chart format: Report criteria
13-16
WebSafe Personal Operation Guide
Figure 13-11: Report Chart format: Two-level Grouping criteria
Drill – Down Capabilities
Drill-down reports are a powerful tool that enables the user to move from summary
information to a deeper and detailed level of information. That is, interactively select
some item from a summary and display the data that contributed to that item, broken
down by some extra parameter.
Each iteration restricts more and more the universe being studied so drill-down reports
are specially designed to perform occasional researches.
For example, it will be possible to request the top blocked web categories during the last
seven days, and later going deeper and segment any category by other criteria (IP of the
requester, applied blocking policy, URIs etc).
WebSafe Personal Operation Guide
13-17
Warning: Drill down operations can only be applied in case no subgrouping conditions
have been established
In order to execute a drill-down report, follow these steps:

Type a query or select a report template (remember not to select
any field as subgrouping criteria).

Select a Chart Format (columns or Lines or Pie)

Press [View] button to generate the report. First representation of
the chart will be shown.

Whenever you right-click on an item on the chart, a popup menu
will be shown to enable the establishment of additional criteria to
restrict the universe of the report. Obviously, the fields listed to
establish additional criteria will depend on the selected data
source.
Figure 13-12: Report Drill-Down Capabilities
13-18
WebSafe Personal Operation Guide

Each time a new segmentation criteria is chosen (from the pop-up
menu), the chart will be refreshed, splitting the selected item
according to the new segmentation criteria. Notice that:
o
The contextual menu includes an additional entry
[Detailed logs] that provides access to the tabular detailed
information taken from raw logs.
o
A table on the right of the chart displays the list of
conditions applied so far:
Figure 13-13: Report chart conditions
In this example, information was initially grouped by
Webpage category and Char 1 was shown:


First segmentation: “WebMail” Category item was
selected, and on the contextual menu, a
segmentation by Client ID was requested  Chart
2 was shown.

Second segmentation: Client “123” was selected,
and on the contextual menu, a segmentation by
File Type was requested  Chart 3 was shown.

Third segmentation: “Zip” File type item was
selected, and on the contextual menu, a
segmentation by any other criteria was requested
 Chart 4 was shown
To navigate back to any previous segmentation situation, you just
need to uncheck the latest segmentation condition on the list, and
previous chart will be reloaded.
Exporting Reports
OST enables the exportation of reports to any of the following formats:
WebSafe Personal Operation Guide
13-19

PDF (table reports only)

CSV (table reports only)

HTML (table and chart reports)
Programmed Reports
OST enables the scheduling of any report template (System predefined templates and/or
user-defined standard templates). Scheduled reports can be sent (Via e-mail) to a
distribution list (configured for each report).
Figure 13-14: Programmed Reports
Available report templates are displayed in the upper list. Notice the column that
indicates if the generation of periodical reports (using the template) has been scheduled
or not.
In order to Schedule a report (or update any parameter of the scheduling) follow these
steps:

13-20
Select a report template from the list. Click on [Schedule] button.
Notice that in case the report already had been scheduled,
scheduling parameters will be shown.
WebSafe Personal Operation Guide
Figure 13-15: Programmed report configuration
Sections:
WebSafe Personal Operation Guide
13-21

Report Details:
o


Type the date and hour when the report has to be executed
for the first time.
Scheduled Information. Choose the criteria to be used for
periodical execution:
o
Execute only once
o
Daily execution
o
Weekly execution (a given day of the week)
o
Monthly execution (a given day of the month)
Mail Receivers.
o
The address of the sender
o
The addressees for the emails with the scheduled
executions of the report.
At the bottom of the screen there is a list of previous executions of the chosen report.
Any previous execution can be selected, so that the report can be reopened.
In order to unschedule a given report (stop its programmed execution), select it from the
upper list and click on [Unschedule] button.
13-22
WebSafe Personal Operation Guide
Chapter 14: Appendices
WebSafe Personal Operation Guide
14-1
Appendix A: Monitoring Messages
Description
This section describes the warning, serious error and alarm/critical error messages that
OST may use to prompt the administrator. The message code is shown together with a
brief description. The description is a pattern than can contain “%s” strings that will be
replaced by a string when a module generates a message. It can also contain “%d”
strings that will be replaced by a number.
Critical Events
1
Unable to load %s. Exiting program
This error is produced when an Operation module cannot load a critical resource. Without it, the program
must exit. The parameter is the critical resource name. Check that this resource exists and that the module
has rights to access it.
Modules: All
2
Unable to reload %s. Exiting program.
This error is produced when an Operation module cannot reload a critical resource. Without it, the program
must exit. The parameter is the critical resource name. Check that this resource exists and that the module
has rights to access it.
Modules: LIB, PM, AS, WF, RD
3
Unable to start %s. Exiting program.
This error is produced when an Operation module cannot start some critical subprocesses (e.g. threads).
Without them, the program must exit. Check that the server has enough resources (disk space, RAM,
available socket descriptors).
Modeules: All
4
Unable to start up MFC's. Exiting program
This error is produced when an Operation module cannot start MFC´s library. Without these objects,
windows sockets do not work and the program must exit. Only for Windows OS.
Modules: WF
5
Thread %s throws an exception that cannot be caught.
This error is produced when a thread launches an exception the program does not catch. An uncaught
exception is a critical error. The parameter is the name or the number of the thread.
Modules: WF
6
Unable to get install directory. Exiting program.
This error is produced when an Operation module cannot ask for its install directory. Without this
parameter, the program does not work properly and must exit.
14-2
WebSafe Personal Operation Guide
Modules: PM, CM, WF, RM
7
Unable to check program license. Exiting program
This error is produced when an Operation module cannot check its license against remote license servers.
Modules: CT, CM, AS, WF, RM
8
Invalid SOAP Port: %d. Exiting program.
Some Operation modules need a SOAP communication channel. This error appears when the configured
port cannot be used or it is busy. The parameter is the port number. Check that no other application is using
that port or change the port number in the configuration files.
Modules: CT
9
%s signal received. %s
This error appears when an external signal is received by the program. The first parameter is the signal
received and the second is the description of that signal.
Modules: CT, CM
10
Unable to set %s service %s. Exiting program.
The process cannot run as a service due to some reason (access denied, invalid name, invalid parameter,
service already exist…)
Only in case of PC-Windows version.
Modules: PM, WS
11
Unable to get %s port. Exiting program.
This error appears when the configured server port cannot be used or is busy, for example. The parameter is
the port number or the interface name that uses that port. Check that no other application is using that port
or change the port number in the configuration files.
Modules: AS
12
Unable to get %s. Exiting program
This error is produced when an Operation module cannot reload a critical resource (a parameter, a
configuration value, etc.). Without it, the program must exit. The parameter is the critical resource name.
Modules: WF
13
Wrong transaction. Please restart the program.
Only in case of PC-Windows version.
Modules: QR
14
Unable to treat unhandled exception. Exiting program.
Error during module starts when the module cannot create the service and the exception cannot be handled.
Modules: AS, PM
15
Unable to restore last backup: %s. Exiting program
This error appears when a backup operation fails. The program must exit. The parameter is the backup file
name. Check this backup file exists and that the module has rights to access it.
Deprecated
WebSafe Personal Operation Guide
14-3
16
Invalid OPTENET License %s, the Internet connection may be cut, please contact %s to renew it!
This error appears when there is no internet connection to check the license or when the solution is not
configured as a ISP or Enterprise solution
Modules: WF, CM
17
Invalid OPTENET License %s, Optenet products will not work, please contact %s to renew it!
This error appears when the License Check failed for more than 180 times.
Modules: CM
18
OPTENET License %s warning, %s, please contact %s to renew it!
This error appears when the License Check fails.
Modules: CM
19
Unable to create %s. Exiting program
CCOTTA module cannot create the number of files descriptors (256)
Modules: CT
20
%s is too old. %s must be updated. Exiting program
Deprecated
21
%s consolidation error
Deprecated
22
Master doesn't respond to heartbeats. Backup activated.
Deprecated
23
FATAL: no OptenetWebFilter running. Do /etc/init.d/optenetOF restart ( or equivalent). If not working,
check OptenetWebFilter's log.
Deprecated
24
Interface %s is just used by the operating system. Exiting program.
Appears when CCOTTA cannot use the network interface to start up the bridge because it is already in use.
Modules: CT
25
The bridge %s is using more than one CCOTTA's interfaces. Exiting program.
This error appears when there is more than one bridge with the same network interface configured. To solve
this, review CCOTTA configuration and use a different network interface for each bridge.
Modules: CT
26
%1 No Servers are available
Deprecated
27
%1 There are no configured Servers
Deprecated
28
%1 There are no configured Primary Servers
Deprecated
14-4
WebSafe Personal Operation Guide
29
Module health check failed: cavium bypass triggered at %s
Modules: CT
30
Thread %1 stalled for %2 milliseconds
Modules: CT
31
Processing %s queue is full for the last %d seconds
Modules: CT
32
This module is not compatible with %s. Exiting program
Modules: CT
Error Events
501
Cannot open %s file
This error appears when the program cannot open a file. This event stops the program working properly. The
parameter is the file name. Check this file exists and the module has rights to access it.
Modules: CT, CM, AS, QR, RD, RM
502
Cannot close %s file
This error appears when the program cannot close a file. This event stops the program working properly. The
parameter is the file name. Check this file exists and the module has rights to write it.
Modules: AS
503
Cannot create %s file.
This error appears when the program cannot create a new file. This event stops the program working
properly. The parameter is the file name. Check this file exists and the module has rights to create it.
Modules: CM
504
Cannot load %s file
This error appears when the program cannot load a file. This event stops the program working properly. The
parameter is the file name. Check this file exists and the module has rights to read it.
Modules: CM, AS, WF
505
Cannot read at %s file
This error appears when the program cannot read a file. This event stops the program working properly. The
parameter is the file name. Check this file exists and the module has rights to read it.
Modules: CT, AS, QR, RD
506
Cannot write at %s file
This error appears when the program cannot write in a file. This event stops the program working properly.
The parameter is the file name. Check this file exists and the module has rights to write it.
Modules: CT, CM, AS, RD
507
Bad content in %s file
WebSafe Personal Operation Guide
14-5
This error appears when the program expects different content from a file. This event stops the program
working properly. The parameter is the file name. Check that this file exists, the module has rights to read it
and it is not corrupt.
Modules: CM, AS,
508
Unable to find %s file
This error appears when the program cannot find a file on the disk. This event stops the program working
properly. The parameter is the file name. Check this file exists and the module has rights to read it
Modules: PM
509
Cannot parse line at %s file correctly. Ignoring data.
This error appears when the program cannot understand a line in a file. The program will ignore the line, but
it can stop the program working properly. The parameter is the file name. Check file content and syntax of
the line.
Deprecated
510
Cannot parse line at %s file correctly. Bad field: %s.
This error appears when the program cannot understand a line in a file because it contains an incorrect field.
The program will ignore the line, but it can stop the program working properly. The first parameter is the file
name and the second is the bad field data name. Check file content and syntax of the field in the line.
Deprecated
511
Cannot save data correctly at %s file
This error appears when the program cannot save data in a file. It can stop the program working properly.
The parameter is th e file name. Check this file exists and the module has rights to write it.
Modules: AS
512
Cannot reload %s file
This error appears when the program cannot reload data from a file. It can stop the program working
properly. The parameter is the file name. Check this file exists and the module has rights to read it.
Deprecated
513
Error appending line in %s file, line: %s.
This error appears when the module cannot add a line to a file used for caching results (LDAP users for CM or
antispam analysis results for AS for instance)
Modules: CM, AS
514
Corrupted line: [%s] %s, in file %s.
This error appears when the module cannot read a line from a caching file (LDAP users for CM or antispam
analysis results for AS for instance). This line from the file will be ignored.
Moduels: CM, AS
515
Bad line length in %s file, line: %s.
This error appears when the module read a line from a caching file which is shorter than it should be. This
line from the file will be ignored.
Modules: CM, AS
516
14-6
Bad key in %s file, line: %s.
WebSafe Personal Operation Guide
This error appears when the key read from a caching file which is not properly written (it should be Hex digit
key). This line from the file will be ignored.
Modules: CM, AS
517
Bad key or line length in %s file, line: %s.
This error appears when the key read from a caching file which is as long as it should be (32). This line from
the file will be ignored.
Modules: CM, AS
518
Bad line length reading timestamp in %s file, line: %s.
This error appears when the module cannot read a timestamp from a caching file. This line from the file will
be ignored.
Modules: CM, AS
519
Couldn't open file (%s) for writing.
This error appears when the module cannot open the caching file for writing.
Modules: CM, AS
520
Error encoding file (%s) for writing.
This error appears when writing the caching file, the line to write cannot be enconded.
Modules: CM, AS
521
Error renaming file (%s) to (%s).
This error appears when the caching file cannot be renamed
Modules: CM, AS
522
Cannot truncate %s file in %s bytes
Deprecated
523
Cannot get %s file size
Deprecated
524
Cannot erase file %s: %s
Deprecated
525
Path size %s is higher than max allowed %s
Deprecated
526
Error on stat(%s):%s.
Deprecated
527
Cannot open %s directory. Check filesystem and permissions
Deprecated
528
Memory pool: malloc required of size %s but ChunkSize=%s
Deprecated
WebSafe Personal Operation Guide
14-7
529
Memory pool: no free one
Deprecated
530
Very unclear case, surely due to previous crash, or shortage of electricity : %s%s
Deprecated
531
Memory pool: bad alloc(%s):%s
Deprecated
532
Failed to consolidate database %s into %s.
This appears when there is an error while calculating the accumulated data for one log.
Modules: RM
533
Failed to add %s - %s to memory database.
Deprecated
534
Failed to add record to dynamic database '%s'.
This appears when there is an error while trying to add new records to the accumulated data for one log.
Modules: RM
535
Failed to add record to table %s of memory database.
Deprecated
536
Failed to add value '%s' to dynamic database '%s'.
This appears when there is an error while trying to add a new value to the accumulated data for one log.
Modules: RM
537
Failed to accumulate backup database %s into %s.
This appears when there is an error while trying to accumulate the backup database.
Modules: RM
538
Failed to create dynamic database %s.
This appears when trying to create a new database of accumulated data.
Modules: RM
539
Failed to create static database %s.
This appears when trying to create a new static database of accumulated data.
Modules: RM
540
Failed to check integrity of just accumulated database %s.
This appears when trying to open an accumulated database.
Modules: RM
541
Failed to dump accumulation to static database %s.
This appears when trying add new register to the accumulated database
14-8
WebSafe Personal Operation Guide
Modules: RM
542
Failed to dump static database %s.
This appears when trying add new register to the database
Modules: RM
543
Failed to flush dynamic database %s.
If it wasn’t posible to flush the dynamic database
Modules: RM
544
Failed to get %s value cursor from database %s.
Fails if it was not posible to get the cursor from a database while creating a report
Modules: RM
545
Failed to get next %s value from database %s.
Fails if it was not posible to get a value from a database while creating a report
Modules: RM
546
Failed to get next record from table %s from database %s.
Fails if it was not posible to get the next record cursor from a database while creating a report
Modules: RM
547
Failed to get table %s record cursor from database %s.
Fails if it was not posible to get the cursor from a table from a database while creating a report
Modules: RM
548
Failed to open static database %s.
It was not possible to open a static BBDD
Modules: RM
549
Failed to populate navigation times from %s into %s.
This error appears when the record was accumulated in a superior unit
Modules: RM
550
Failed to move accumulated database from %s to %s.
This error appears when it was not posible to move the accumulated record from one database to another
Modules: RM
551
Failed to rebuild dynamic database %s from detail file.
This error appears when it was not possible to create again the dynamic database from the detailed logs
Modules: RM
552
Hour change failed, workmode %s not found.
This error appears when it was not possible to read the workmode to change the hour
WebSafe Personal Operation Guide
14-9
Modules: RM
553
Failed to set core limit.
This error appears during the startup of the module if it was not posible to set the core limit. If it’s
configured Exit on limit error, the module will exit
Modules: RM
554
Failed to set file limit.
This error appears during the startup of the module if it was not posible to set the file limit. If it’s configured
Exit on limit error, the module will exit
Modules: RM
555
Error performing migration
This error appears if there is an error during a migration from an old database to the current one.
Modules: RM
556
Failed to migrate database %s, unknown work mode %s.
This error appears if there is an error during a migration from an old database to the current due to one
work mode
Modules: RM
557
Failed to create table %s migrating database %s.
This error appears if there is an error during a migration from an old database to the current one while
creating a table.
Modules: RM
558
Failed to add value %s to value table %s migrating database %s.
This error appears if there is an error during a migration from an old database to the current one while
adding a value to a table in the new BBDD.
Modules: RM
559
Failed to add record to table %s migrating database %s.
This error appears if there is an error during a migration from an old database to the current one while
adding a record.
Modules: RM
560
Failed to read programmed report instance %s.
This error appears if there is an error reading the programmed report instance (it was not possible to open
the file)
Modules: RM
561
Failed to load programmed report instance %s.
This error appears if there is an error loading the programmed report instance
Modules: RM
562
Failed to create programmed report instance %s.
This error appears if there is an error creating the programmed report instance
14-10
WebSafe Personal Operation Guide
Modules: RM
563
Failed to save programmed report instance %s.
This error appears if there is an error writing the programmed report instance
Modules: RM
564
Failed to open programmed report instance %s.
This error appears if there is an error open the programmed report instance
Modules: RM
565
Failed to migrate file %s.
This error appears if there is an error migrating a file to the current format
Modules: RM
566
Failed to copy detail file %s.
This error appears in a migration, if there is an error copying a deailed file from the old database.
Modules: RM
567
Failed to move detail file %s.
This error appears in a migration, if there is an error moving a deailed file from the old database.
Modules: RM
568
Failed to sort database %s in %s.
This error appears if the database is not sorted.
Modules: RM
569
Failed to upgrade: Unknown work mode %s.
This error appears if it’s not posible to know the work modes while starting an upgrade
Modules: RM
570
Error performing upgrade.
This error appears whe it was not possible to upgrade the database
Modules: RM
571
Failed to upgrade database %s, backup file %s already exists.
This error appears while trying to upgrade a database and the backup file already exist
Modules: RM
572
Failed to open database %s.
This error appears while trying to upgrade a database and it was not posible to open the database
Modules: RM
573
Failed to create database %s.
This error appears while trying to upgrade a database and it was not posible to create a database.
WebSafe Personal Operation Guide
14-11
Modules: RM
574
Failed to upgrade database %s.
This error appears while trying to upgrade a database and it was not posible to upgrade one database.
Modules: RM
575
Failed to upgrade detailed log %s, backup file %s already exists.
This error appears while trying to upgrade a database and it was not possible to upgrade dauled log because
the backup file already exist.
Modules: RM
576
Failed to open detailed log %s.
This error appears while trying to upgrade a database and it was not posible to open the detailed log file.
Modules: RM
577
Failed to create detailed log %s.
This error appears while trying to upgrade a database and it was not possible to create the new detailed log
file.
Modules: RM
1001
Cannot create socket %d
This error appears when the program cannot create a communication socket. It can stop the program
working properly. The parameter is the socket number. Check that no other application is using that port or
change the port number in the configuration files.
Modules: CT, AS, RD
1002
Cannot create socket listening at %d port.
This error appears when the program cannot create a communication socket listening at a port. It can stop
the program working properly. The parameter is the port number. Check that no other application is using
that port or change the port number in the configuration files.
Modules: CT
1003
Cannot connect at socket %d.
This error appears when the program cannot connect with a communication socket. It can stop the program
working properly. The parameter is the socket number. Check that the socket is listening and that the
module can access it (no firewall).
Deprecated
1004
Cannot accept communication with socket %d
This error appears when the program cannot accept a communication with a socket. It can stop the program
working properly. The parameter is the socket number.
Deprecated
1005
%s RPC service not available.
Deprecated
1006
Cannot listen at socket %d
This error appears when the program cannot listen at a communication socket. It can stop the program
14-12
WebSafe Personal Operation Guide
working properly. The parameter is the socket number.
Modules: AS, WF
1007
Cannot read at socket %d
This error appears when the program cannot read at a communication socket. It can stop the program
working properly. The parameter is the socket number. Check that the other end has not closed the socket
before the communication has been completed.
Deprecated
1008
Cannot read at socket %d. Socket exception %s
This error appears when the program cannot read at a communication socket. It can stop the program
working properly. The first parameter is the socket number and the second is the description of the socket
error.
Deprecated
1009
Cannot write at socket %d
This error appears when the program cannot write at a communication socket. It can stop the program
working properly. The parameter is the socket number. Check that the other end has not closed the socket
before the communication has been completed.
Modules: WF
1010
Error binding at socket %d
This error appears when the program cannot bind with a communication socket. It can stop the program
working properly. The parameter is the socket number. Check that no other application is using that port or
change the port number in the configuration files.
Modules: CT, AS, WF
1011
%s request is ill formed at server %s
This error appears when the program finds ill-formed requests for a server. It can stop the program working
properly. The first parameter is the request name and the second is the server name that receives the
request. Check that the protocol syntax used by the other end is correct.
Modules: QR
1012
Unexpected response received from server. %s
This error appears when the program receives an unexpected response from a server. It can stop the
program working properly. The parameter is the server name that responds.
Modules: PM, QR
1013
%s server bad configure
This error appears if using the old license control when trying to send an email informing about License
expiration and in the SMT server returns a Warning message (between 200 and 400)
Modules: CM
1014
setsockopt() failed. %s
This error appears when trying to modify the options of a socket reused in ICAP server of the WF module
Modules: WF
1015
Cannot enable address reuse at socket %d
WebSafe Personal Operation Guide
14-13
This error appears when the program cannot activate the socket address reuse flag. The parameter is the
number of the specified socket.
Deprecated
1016
Unable to get %d port
Deprecated
1017
Cannot establish communication with %s server.
This error appears when the program cannot establish communication with a server. It can stop the program
working properly. The parameter is the server name. Check that the specified server is up and running and
that it can be accessed from this server.
Modules: CT, CM, AS, WF, RD
1018
Cannot disable Nagle's algorithm at socket %d
This error appears when the program cannot disable the Nagle’s algorithm at a socket. This algorithm
reduces the bandwidth used. The parameter is the number of the specified socket.
Deprecated
1019
RpcServerUseProtseq() failed. %s
Unable to listen to TCP/IP protocol using RPC. Check that the RPC service is running.
Modules: WF
1020
RpcEpRegister() failed. %s
Unable to register to RPC server. Check that the RPC service is running
Modules: WF
1021
RpcServerInqBindings() failed. %s
Unable to register interface and binding endpoints with the endpoint mapper. Check that the RPC service is
running
Modules: WF
1022
RpcServerListen() failed. %s
Unable to listen RPC requests. Check that the RPC service is running
Modules: WF
1023
RpcServerRegisterAuthInfo() failed. %s
Unable to register authentication service. Check that the RPC service is running
Modules: WF
1024
RpcServerRegisterIf() failed. %s
Unable to register RPC server. Check that the RPC service is running.
Modules: WF
1025
fcntl F_GETFL error
Unable to get information about the socket descriptor.
Modules: AS, WF
14-14
WebSafe Personal Operation Guide
1026
fcntl F_SETFL error
Unable to set socket descriptor information.
Modules: AD, WF
1027
Cannot make socket %d non-blocking.
Deprecated
1028
Communication error with %s server %s
This error appears when the program has an error during communication with a server. It can stop the
program working properly. The first parameter is the server type and the second is its name. Check that the
specified server is up and running and can be accessed from this server.
Modules: CT, CM
1029
IPv6 is not supporting for SNMPv1. You must use as a minimum SNMPv2
1030
%s email discarded for client %s: %s
1501
Cannot create %s thread
This error appears when the program cannot create a thread. It can stop the program working properly. The
parameter is the thread number. Check that the server has enough resources (disk space, RAM, available
socket descriptors).
Modules: CT
1502
Cannot create %s threadpool.
This error appears when the program cannot create a threadpool. It can stop the program working properly.
The parameter is the thread number. Check that the server has enough resources (disk space, RAM,
available socket descriptors).
Modules: CT, RM, WS
1503
Cannot init %s thread
This error appears when the program cannot initialize a single thread. It can stop the program working
properly. The parameter is the thread number.
Deprecated
1504
Cannot start %s thread.
This error appears when the program cannot start a single thread. It can stop the program working properly.
The parameter is the thread number.
Modules: CM
1505
Cannot get stack size at %s thread
This error appears when the program cannot get the stack size of a thread. It can stop the program working
properly. The parameter is the thread number.
Deprecated
1506
Cannot set stack size at %s thread
This error appears when the program cannot change the stack size of a thread. It can stop the program
working properly. The parameter is the thread number.
Deprecated
WebSafe Personal Operation Guide
14-15
1507
Cannot find a free thread to handle web request. Not processed.
Deprecated
1508
Cannot get enough memory for %s
This error appears when the program cannot allocate enough memory for an internal variable. It can stop
the program working properly. The parameter is the variable name. Check that the server has enough
resources (disk space, RAM).
Modules: CT, AS, WF
1509
Cannot format %s to %s data types.
Deprecated
1510
Cannot load LDAP settings: server <%s> ill formed at file %s
Deprecated
1511
Thread %s throws an exception that cannot be caught.
This error is produced when a thread launches an exception the program does not catch. It can stop the
program working properly but it does not exit. The parameter is the thread name or number.
Modules: PM
1512
Connection dropped because all thread are busy.
This error appears when the program cannot get a free thread for a connection. The connection will be
dropped. It can stop the program working properly.
Modules: AS
1513
Error querying LDAP: %s
Deprecated
1514
Out of memory.
Deprecated
1515
Threadpool %s timeout expired. Connection refused.
Deprecated
1516
Cannot create threads
This error appears when the program cannot create one or more required threads. It can stop the program
working properly.
Modules: WF
1517
Cannot renew Kerberos certificate %s :%s
Modules: CM
1518
Interface %s not optimized: error retriving interface driver
Modules: CT
1519
Interface %s not fully optimized: error configuring IRQ %s affinity
Modules: CT
1520
14-16
Interface %s not fully optimized: the number of RSS queues doesn't match the number of threads
WebSafe Personal Operation Guide
Modules: CT
2001
Unable to create %s
This error appears when the program cannot create an object (process, internal structure, etc.). It can stop
the program working properly. The parameter is the object name.
Modules: PM, CM, CT, AS, QR
2002
Unable to find %s
This error appears when the program cannot find an object (process, internal struct, etc.). It can stop the
program working properly. The parameter is the object name.
Modules: PM, CM, AS
2003
Unable to kill %s
This error appears when the program cannot kill a process or subprocess. It can stop the program working
properly. The parameter is the process name. Check the module has rights to perform this operation.
Modules: PM
2004
Unable to launch %s
This error appears when the program cannot launch a subprocess. It can stop the program working properly.
The parameter is the subprocess name. Check the module has rights to perform this operation.
Modules: PM
2005
Unable to load %s
This error appears when the program cannot load an object (process, internal struct, datafile, etc.). It can
stop the program working properly. The parameter is the object name.
Modules: PM, CT, CM, AS, WF
2006
Unable to reload %s
This error appears when the program cannot reload an object (process, internal struct, datafile, etc.). It can
stop the program working properly. The parameter is the object name.
Modules: PM, CM, AS, WF
2007
Unable to open %s
This error appears when the program cannot open a disk cache.
Modules: AS
2008
Unable to start %s
This error appears when the program cannot start a subprocess. It can stop the program working properly.
The parameter is the subprocess name.
Modules: PM, AS, WF, WS
2009
Unable to set %s
This error appears when the program cannot set the value of an object. This error appears when the
program cannot load an object (process, internal struct, datafile, etc.). It can stop the program working
properly. The parameter is the object name.
Modules: AS
WebSafe Personal Operation Guide
14-17
2010
Unable to decode analyzer %s file
Deprecated
2011
Cannot start %s service
Deprecated
2012
Cannot create %s service
This error appears when an Optenet module cannot create a system service (TCP, UDP, etc.). The parameter
is the name of the service. Only for Windows OS.
Modules: WF
2013
Bad number of parameter received by %s function
This error appears when a function in the program receives a bad number of parameters. The parameter is
the function name.
Deprecated
2014
Bad parameter received by %s function
This error appears when a function in the program receives a parameter that the function does not expect.
The para meter is the function name.
Modules: AS
2015
Cannot accumulate log data from %s server.
Deprecated
2016
Unable to continue %s
Modules: PM
2017
License %s has expired, please contact %s to renew
Deprecated
2018
LsaEnumerateTrustedDomains failed. %s
Deprecated
2019
OpenPolicy Failed. %s
Deprecated
2020
OpenSCManager failed. %s
Deprecated
2021
OpenService failed. %s
Deprecated
2022
Parameter too long for string buffer
Deprecated
2023
Registering sig handler: %s
Unable to register this signal handle. The process could not capture it.
Modules: WF
14-18
WebSafe Personal Operation Guide
2024
%s service failed. %s
This error appears when the service in the SOAP call is not the correct one.
Modules: CM
2025
RegisterServiceCtrlHandler failed %s
Unable to register the service in the Service Control Manager
Modules: PM, WF, QR, WS
2026
SetServiceStatus failed. %s
The service could not report its status to the Service Control Manager.
Modules: PM, WF, QR, WS
2027
StartServiceCtrlDispatcher failed. %s
Unable to start the service control dispatcher due to reported error.
Modules: PM, WF, QR, WS
2028
DeleteService failed. %s
Unable to delete this service.
Deprecated
2029
Cannot load filter <%s> settings: ill formed at file %s
Deprecated
2030
Cannot load quarantine <%s> settings: ill formed at file %s
Deprecated
2031
Cannot load reporter <%s> settings: ill formed at file %s
Deprecated
2032
%s server isn't configured.
Deprecated
2033
Cannot start synchronization server: %s
Deprecated
2034
Cannot get line from file while loading %s
Deprecated
2035
Cannot read mail from disk: %s
This error appears when it was not possible to read one mail from disk
Modules: QR
2036
Unable to reload %s. %s
Deprecated
2037
Unable to register %s service for %s client.
WebSafe Personal Operation Guide
14-19
Deprecated
2038
Flush-Fail to create the crash file.
This error appears when it was not posible to flush the messages for debugging to a debug file log.
Modules: QR, RD
2039
Unable to send mail through server %s. %s
This error appears when it was not possible to send an unblocked email using the SMTP server cofigured
Modules: QR
2040
Cannot get mail message from %s user
Deprecated
2041
License %s error: %s. %s.
This error is produced when an Operation module could not check its license. The first parameter is the
description of the error produced. The second one is the action of the module that reported the message
(e.g. connection closed).
Deprecated
2042
License %s exceeded. %s.
This error is produced when an Operation module tries to check its license and its limits are exceeded. The
parameter is the description of the error produced.
Deprecated
2043
Unable to register %s
This error appears when an Operation module cannot register some services (TCP, UDP, etc.) in the system.
The parameter is the name of the service. Only for Windows OS.
Modules: WF
2044
Cannot bind params at Soap request %s
This error appears when the parameters received in a SOAP communication do not match with the Soap
request specification. It causes the requests to be discarded. The parameter is the request name.
Modules: RM
2045
Error code %s received at Soap Request %s
This error appears when a Soap request made by the program is answered by the server with an error code.
The first parameter is the error code and the second is the request name.
Modules: RM
2046
Error: Unable to restore backup: %s
This error appears when the program cannot restore a backup. It can stop the program working properly.
The parameter is a test explaining the error produced during the restoration.
Deprecated
2047
Error starting event buffer thread for the module: %s
Deprecated
2048
14-20
Error loading configuration for the module: %s
WebSafe Personal Operation Guide
Deprecated
2049
Error allocating event buffer for the module: %s
Deprecated
2050
Overwriting event buffer for the module: %s
Deprecated
2051
Error inserting event (priority [%s], count [%s]) for the module: %s
This error appears when the module cannot add an event for one module
Modules: CM
2052
Previous error allocating event buffer for the module: %s
This error appears when the module cannot allocate memory for the event
Modules: CM
2053
Stopping %s module because %s
Only for BGP mode. This error appears when there was a reloading while running and failed stop everything
or in case of manual stop of the BGP mode
Modules: CT
2054
Cannot start %s module because %s
Only applies to BGP deployment mode when it was not possible to start the BGP thread.
Modules: CT
2055
Cannot add sender to White List: %s
This error appears when the module was not able to add the sender to a white list after unblocking the
email.
Modules: QR
2056
Central Manager %s is asking for transactions with a state that this CM cannot assure it will get all changes
that have been made from that state %s
If this happens, check the connectivity between the modules and their transactions states. Execute a setup,
clean database and profiles.
Modules: CM
2057
Unable to finalize %s Antivirus
Deprecated
2058
Error scanning for viruses
Deprecated
2059
Unable to load the %s Antivirus database
WebSafe Personal Operation Guide
14-21
Deprecated
2060
Unable to initialize the %s Antivirus engine
Deprecated
2061
%s Antivirus Shared Memory initialization failed
Deprecated
2062
Unable to load the %s' Antivirus' dll
Deprecated
2063
Unable to initialize %s Antivirus
This error appears when the module cannot load one AV engine
Modules: AS
2064
Unable to update the %s antivirus database
This error appears when the module cannot download the AV updates file from the Central Manager
Modules: AS
2065
Parameter %s does not exist
This error appears when the arguments in a DKIM sign (AS module) or in the License (CM) are not OK
Modules: CM, AS
2066
Parameter %s has an invalid value
This error appears when the module if the DKIM sign has a bad prívate key
Modules: AS
2067
Error deleting resolved host: %s
Deprecated
2068
Timeout to remove element = [%s]
Deprecated
2069
Communication error while sending responset to TdE %s
Deprecated
2070
ResDir does not have a MANAGER classname instance defined to communicate with.
Deprecated
2071
14-22
Unable to read Global.conf configuration file from declared Manager.
WebSafe Personal Operation Guide
Deprecated
2072
Unable to read Local Configuration file from declared Manager.
Deprecated
2073
Unable to read OWS identifier from Local.conf file.
Deprecated
2074
External tool %s failed. See log %s. Additional info: %s
Deprecated
2075
No users analysed in directories of Directories.conf. Please check config and filesystems. Reattempting
soon to read data.
Deprecated
2076
%1 No Primary Servers are available.
Deprecated
2077
%4:%2 Server has not been responding for a long time.%5
Deprecated
2078
Antivirus module couldn't load. %s
Deprecated
2079
Antivirus inactive. No analysis done.
Deprecated
2080
Unable to update antivirus.
Deprecated
2081
Unable to start antivirus file monitor.
Deprecated
2082
Unable to perform software upgrade %s
Deprecated
2083
The number of clients has reached an intolerable not permitted amount for your license. The correct
operation of the system is not guaranteed.
Modules: CM
2084
The license control key has been tampered with. The correct operation of the system isn't guaranteed any
longer.
WebSafe Personal Operation Guide
14-23
Modules: CM
2085
Module %s is asking for transactions with a state that this CM cannot assure it will get all changes that
have been made from that state %s
This happens if there has been a rotation
in the transaction file and the module is asking for old
transactions.
Modules: CM
Warning Events
3001
Cannot open %s file
This warning appears when the program cannot open a file. If this event occurs repeatedly, the program may
stop working properly. The parameter is the file name.
Modules: AS, RM
3002
Cannot close %s file
This warning appears when the program cannot close a file. If this event occurs repeatedly, the program may
stop working properly. The parameter is the file name.
Modules: RM
3003
Cannot create %s file.
This warning appears when the program cannot create a file. If this event occurs repeatedly, the program
may stop working properly. The parameter is the file name.
Modules: AS, WF
3004
Cannot delete %s file
This warning appears when the program cannot delete a file. If this event occurs repeatedly, the program
may stop working properly. The parameter is the file name.
Modules: RD, RM
3005
Cannot load %s file
This warning appears when the program cannot load a file. If this event occurs repeatedly, the program may
stop working properly. The parameter is the file name.
Modules: CT, WF
3006
Cannot move %s file
This warning appears when the program cannot move a file. If this event occurs repeatedly, the program
may stop working properly. The parameter is the file name.
14-24
WebSafe Personal Operation Guide
Modules: RM
3007
Cannot rename %s file
This warning appears when the program cannot rename a file. If this event occurs repeatedly, the program
may stop working properly. The parameter is the file name.
Modules: AS
3008
Cannot read at %s file
Deprecated
3009
Cannot write at %s file
This warning appears when the program cannot write in a file. If this event occurs repeatedly, the program
may stop working properly. The parameter is the file name.
Modules: CM, AS, WF, RM
3010
Unable to find %s file
This warning appears when the program cannot find a file on the disk. If this event occurs repeatedly, the
program may stop working properly. The parameter is the file name.
Modules: PM, AS
3011
Carriage-return linefeed not found at %s file
Deprecated
3012
Blank line close at %s file
Deprecated
3013
Permission denied to %s file
Deprecated
3014
Cannot parse %s file's line correctly.
This warning appears when the program cannot parse a line in a file. If this event occurs repeatedly, the
program may stop working properly. The parameter is the file name.
Modules: CM, RM
3015
Access to %s file must be exclusive
Deprecated
3016
Bad content for %s file.
This warning appears when the content of a file is different to what the program expects. If this event occurs
repeatedly, the program may stop working properly. The parameter is the file name.
Modules: AS
3017
Cannot open %s directory
Deprecated
WebSafe Personal Operation Guide
14-25
3018
Cannot close %s directory
Deprecated
3019
Cannot create %s directory
Deprecated
3020
Cannot delete %s directory
Deprecated
3021
Cannot move %s directory
Deprecated
3022
Cannot rename %s directory
Deprecated
3023
Cannot read at %s directory
Deprecated
3024
Cannot write at %s directory
Deprecated
3025
Unable to find %s directory
Deprecated
3026
Not a valid directory
Deprecated
3027
Cannot get list of files at %s directory
Deprecated
3028
Access violation. %s
Deprecated
3029
%s signal received.
This warning appears when the program receives an external signal from the OS or from another program.
The parameter is the signal type (SIGTERM, SIGINT, etc.)
Modules: CM
3030
Cannot load %s or %s
This warning is produced when an Operation module tries to load two related resources (e.g. two files) and
one or both of them cannot be loaded. The parameters are the names of the resources.
Modules: WF
3031
Unable to reload database
This warning is produced when a Filtering Module cannot reload the database used during traffic analysis.
The filtering module will use the old database.
Modules: WF
3032
14-26
Exception %s raised in communication with %s
WebSafe Personal Operation Guide
This warning is produced when an exception is thrown by an Operation module during a communication.
The first parameter is the name or the type of exception thrown. The second one is the name of the server
to which the module was connected.
Modules: CM
3033
Cannot read %s in file %s
This warning is produced when an Operation module cannot read an argument from a file. The first
parameter is the name of the missing argument and the second is the name of the file.
Modules: WF
3034
Unacceptable configuration in %s. Discarding changes
Deprecated
3035
Cannot get %s groups from %s. Warning: %s
This warning is produced when a filtering module cannot get user groups in a LDAP server. The first
parameter is the name of the group, the second is the name of the LDAP server and the third is the received
warning message.
Modules: CM, WS
3036
Unable to create process %s
This warning appears when an Operation module cannot create a subprocess. If this event occurs
repeatedly, the program may stop working properly. The parameter is the subprocess name.
Modules: PM, WF
3037
Wrong group_membership_query for user %s from %s.
The LDAP query for searching user groups (first %s) in LDAP server (second %s) is wrong. Please check LDAP
configuration parameters, especially GroupMembershipQuery parameter.
Modules: CM, WS
3038
Wrong user_membership_query for user %s from %s.
The LDAP query for searching user groups (first %s) in LDAP server (second %s) is wrong. Please check LDAP
configuration parameters, especially the UserMembershipQuery parameter.
Modules: CM, WS
3039
Wrong nested group_membership_query for user %s from %s.
The LDAP query for searching nested groups of user groups (first %s) in LDAP server (second %s) is wrong.
Please check LDAP configuration parameters, especially the GroupMembershipQuery parameter.
Modules: CM, WS
3040
Discarding URL %s in Heritrix' job %s
This warning appears when the URL to insert is not well formed
Modules: WF
3041
mywrite: warning in %s. Exiting.
This warning appears when the module cannot write the translated html line to the language desired
Modules: WF
WebSafe Personal Operation Guide
14-27
3042
Unable to start %s
This warning appears when the program cannot start a non-critical subprocess. The parameter is the
subprocess name
Modules: PM
3043
Cannot open %s process
This warning appears when the program cannot open a non-critical subprocess. The parameter is the
subprocess name.
Modules: PM
3044
Unable to set value into %s registry key.
Deprecated
3045
Unable to read %s flag from %s
Deprecated
3046
fcntl F_GETFL warning
Unable to get information about the socket descriptor.
Modules: WF
3047
fcntl F_SETFL warning
Unable to set information of socket descriptor.
Modules: WF
3048
Warning thread: %s
This warning appears when a module cannot perform an operation in a thread. The parameter is the
description of the operation
Modules: WF
3049
Threadpool incomplete. %d threads created.
This warning appears when the program cannot finish creating a threadpool. The parameter is the number
of threads already created.
Modules: WF
3050
Warning %s in LDAP %s
This warning appears when a module receives an error while working with the LDAP server. The first
parameter is the description of the error and the second is the name of the LDAP server.
Modules: CM, WS
3051
Warning %s in LDAP %s. DN: %s
This warning appears when a module receives an error while working with LDAP server with DN. The first
parameter is the description of the error, the second is the name of LDAP server and the third is the name of
the DN
Modules: CM, WS
3052
License %s warning. %s.
This warning is produced when an Operation module receives a warning during its license check. The
14-28
WebSafe Personal Operation Guide
parameter is the description of the received warning (license period expired, too many users, etc.).
Modules: CM
3053
glob() error
This warning appears when the glob method does not work properly. Glob is used in Linux systems to find all
the entries in a directory. If glob’s search fails, some internal processes will not be executed.
Modules: PM, CT, CM, WF, QR, RM, WS
3054
Unable to read line
This warning appears when an Operation module cannot read a line of the transaction state file.
Modules: CM, WF,
3055
Cannot contact URL database server %s. Warning: %s
This warning appears when a Filtering Module cannot contact the URL database server (the URL database is
used by the filterin g module to find out if it should allow or deny a request). The first parameter is the name
of the server. The second one is the description of the warning.
Check the connecivity between the module and the CentralManager
Modules: WF
3056
Receiving URL database. Warning: %s
Deprecated
3057
Unable to receive URL database. Warning: %s
Deprecated
3058
Warning in request: %s
This warning appears when an Operation module detects a problem in a request made to it. The parameter
is the description of the problem (bad arguments, message too long, etc).
Modules: PM, CT, CM, WF, WS
3059
Unable to continue manager
Only when running the WebFilter under Windows. This warning appears when the WebFilter tryes to start
up a WebServer but it’s not possible to creat the main thread.
Modules: WF
3060
%s content exceeds 16 KB
Only in ICAP deployment mode. This warning appears when a Filtering Module receives a RESPMOD ICAP
preview message that exceeds 16KB. The message will be dropped.
Modules:WF
3061
Processing error
Deprecated
3062
Error in configuration: %s
In case the file is not compulsory for running properly, the process will continue considering the file as
empty. If the file is required, a critical alarm will appear and process will be restarted. Check the file and do a
setup of the module.
WebSafe Personal Operation Guide
14-29
Modules: CM
3063
IP address: [%s]. Warning: %s
Only un Proxy deployment mode. This warning appears when an Operation module finds something wrong
with an IP address. The first parameter is the bad IP address. The second one is the description of the
problem (bad format, too long, etc.).
Modules: WF
3064
Username: [%s]. Warning: %s
This warning appears when an Operation module finds something wrong with a user name. The first
parameter is the bad user name. The second one is the description of the problem (bad format, too long,
etc.).
Modules: WF
3065
Unable to connect to transaction server.
This warning appears when an Operation module cannot connect with the transaction server. This server is
used by the module to receive all new updates.
Modules: AS, WF
3066
Unable to write url database.
This warning appears when a Filtering Module cannot write the URL database received from a server. The
filtering module will use the old URL database.
Check space disk and write permissions
Modules: WF
3067
Error getting update package.
Deprecated
3068
Error unpacking updates package. %s
This warning appears when a Filtering Module cannot understand an update package for its URL database.
The parameter is the description of the problem at the package
Modules: AS, WF
3069
Line %s cannot be accumulated. %s field missing.
Deprecated
3070
Line %s cannot be accumulated. Error while parsing.
Deprecated
3071
Unable to find %s configuration key.
This warning appears when a configuration key does not appear in the configuration files. The parameter is
the key name.
Modules: CT, RM
3072
Line %s cannot be computed. %s field missing.
Deprecated
3073
14-30
Report Query ill formed. No %s Specified.
WebSafe Personal Operation Guide
Modules: RM
3074
Unable to seek end of file %s
Deprecated
3075
Unable to seek begin of file %s
Deprecated
3076
Unable to seek start point of file %s
Deprecated
3077
Unable to insert %d message in message exception list
Deprecated
3078
Socket accept error
This warning appears when the WebFilter runs a WebServer but there is a socket accept exception.
Modules: WF
3079
Cannot check user %s from %s.
This warning appears when a module is unable to validate a user in an LDAP server. The first parameter is
the user name and the second is the name of the LDAP server.
Modules: CM, WS
3080
Line %s cannot be computed. Error while parsing.
This warning appears when there is an error parsing a log line received from a module
Modules: RM
3081
Event buffer length for the module [%s]: %s
This warning appears when the module is writing more than 50% of the buffer size for repeated times
Modules: CM
3082
Too many lines discarded while processing log file %s
Deprecated
3083
Discarded programmed report %s wrong parameters in file %s
This warning appears when the Reporter.conf file has a wrong parameter in the programmed report.
Modules: RM
3084
Unable to truncate %s file in %s bytes
WebSafe Personal Operation Guide
14-31
This warning appears when the WebFilter tries to read the “redir.html” file but its length is bigger than a
specified value
Modules: WF
3085
External tool %s failed. See in log %s. Additional info: %s
Deprecated
3086
inconsistency in internal computing: %s
Deprecated
3087
Accumulated file %s has an invalid name.
This warning appears when the accumulated file name is properly formed
Modules: RM
3088
Failed to open database %s to process report.
This warning appears when it is not possible to open a database to process a report
Modules: RM
3089
Failed to execute report '%s' with id '%s'.
This warning appears when the Repport cannot execute the report specified
Modules: RM
3090
Failed to load report result file '%s'.
This warning appears when the Repport module cannot load a file with the results
Modules: RM
3091
Failed to create report instance based on '%s'.
This warning appears when the Reporter module cannot create a report instance
Modules: RM
3092
Failed to create report instance based on '%s' for client '%s'.
This warning appears when the Reporter module cannot create a repport instance a certain client
Modules: RM
3093
Failed to execute report '%s' with id '%s' for client '%s'.
This warning appears when the Repoter module cannot execute a report from a client
Modules: RM
3094
14-32
Failed to send mail for programmed report '%s' to receivers '%s'.
WebSafe Personal Operation Guide
This warning appears when the Repoter module cannot send an email for a programmed report to a set of
reveivers
Modules: RM
3095
Failed to send mail for programmed report '%s' for client '%s' to receivers '%s'.
This warning appears when the Repoter module cannet send an email for a client programmed report
Modules: RM
3096
Failed to execute programmed report '%s'.
This warning appears when the Repoter module cannot execute a programmed report
Modules: RM
3097
Failed to execute programmed report '%s' for client '%s'.
This warning appears when the Repoter module cannot execute a programmed repport for a client
Modules: RM
3098
Programmed report %s does not have a known legacy format, skipping migration.
This warning appears when the Repoter module cannor migrate a programmed report (old format) because
it has an unknown format.
Modules: RM
3099
Scripting engine exception '%s' executing script '%s' from configuration file '%s'.
Modules: RM, WS
3100
Cannot execute script %s, scripting engine has not been configured.
This warning appears when the module cannot execute a script because it is not configured
Modules: RM, WS
3101
Ignoring workmode %s found at %s because it is not present in the current configuration.
This warning appears when the Repoter module ignores a workmode because it is nor present in the current
configuration
Modules: RM
3102
The number of clients created has surpassed the permitted amount for your license.
Deprecated
3103
The number of clients is still far above the permitted amount for your license. The correct operation of the
system might still be affected.
Deprecated
WebSafe Personal Operation Guide
14-33
3501
Cannot create socket %d
Deprecated
3502
Cannot create socket listening at %d port.
Deprecated
3503
Cannot accept at socket %d
Deprecated
3504
Cannot bind at socket %d. Rebinding.
Deprecated
3505
Cannot connect at socket %d.
Deprecated
3506
Cannot read at socket %d
Deprecated
3507
Cannot write at socket %d
This warning appears when it is not possible to write some data in a socket
Modules: LIB
3508
Socket %d timeout expired
Deprecated
3509
Suspicious socket %d write 0 bytes.
This warning appears when the program writes 0 bytes at a socket. If this event occurs repeatedly, the
program may stop working properly. The parameter is the socket number.
Modules: WF
3510
Cannot establish communication with %s. %s.
This warning appears when the program cannot establish communication with a server. The first parameter
is the server name and the second is the connection error description.
Modules: CM, QR, RD, RM
3511
Request %s to %s ill formed.
This warning appears when the program finds an ill-formed request for a specific server. The request will be
discarded by the program. The first parameter is the request name and the second is the server name that
receives the request.
Modules: QR, WS
14-34
WebSafe Personal Operation Guide
3512
Request %s to %s is unknown
This warning appears when the program finds an unknown request for a specific server. The request will be
discarded by the program. The first parameter is the request name and the second is the server name which
receives the request.
Modules: AS, RD
3513
Request %s to %s is missing
Deprecated
3514
Request %s is too long.
Deprecated
3515
Request %s is too short.
Deprecated
3516
Response %s from %s ill formed.
This warning appears when there is an error in the CM response because it is illformed for GetUser SOAP
Modules: CT
3517
Response %s from %s is unknown
This warning appears when there is an unknown answer in the response for downloading the logs from a
module to the repoter
Modules: RM
3518
Response %s from %s is missing
This warning appears when there is a missing parameter in the license check or while trying to update the
software (update only available in OSE solution)
Modules: CT, CM
3519
Response %s is too long.
Deprecated
3520
Response %s is too short.
Deprecated
3521
Response from %s server has been ignored.
This warning appears when there is no response from a server.
Modules: CM
WebSafe Personal Operation Guide
14-35
3522
Response %s from %s server unexpected.
This warning appears when the answer to a call has wrong number of parameters, or the type is not the
expected.
Modules: CT, CM, WF, QR, RM
3523
Cannot parse %s response correctly.
This warning appears when the answer to a call cannot be parsed properly because there are missing
parameters
Modules: CM, AS, QR, RD, RM
3524
Command %s to %s ill formed.
Deprecated
3525
Command %s to %s is unknown
Deprecated
3526
Command %s to %s is missing
Modules: PM
3527
Too few parameters for command %s
Deprecated
3528
Command %s is too long.
Deprecated
3529
Command %s is too short.
Deprecated
3530
Reply %s from %s ill formed.
Deprecated
3531
Reply %s from %s is unknown
Deprecated
3532
Cannot listen at socket %d
Deprecated
3533
Reply %s from %s is missing
Deprecated
3534
14-36
Too few parameters for reply %s
WebSafe Personal Operation Guide
This warning appears there is no response or is empty.
Modules: CM
3535
Reply %s is too long.
Deprecated
3536
Reply %s is too short.
Deprecated
3537
Reply from %s server has been ignored.
Deprecated
3538
Cannot send packet %s
Deprecated
3539
Cannot receive the packet's body %s
Deprecated
3540
Cannot receive the packet's header: %s
Deprecated
3541
Bad packet length (%d)
Deprecated
3542
Connection to %s server lost before receiving a complete bod
Deprecated
3543
Connection to %s server lost before the end of the transaction
This warning appears whe the connection with a server was down before the end of the communication
Modules: LIB
3544
Connection closed by server %s.
This warning appears when the connection to a server was closed without response
Modules: QR
3545
Communication to %s undefined
Deprecated
3546
Parameter %s not found
Deprecated
WebSafe Personal Operation Guide
14-37
3547
Cannot get event from %s server: %s
Deprecated
3548
Received event from unknown %s server %s
Deprecated
3549
ICAP modify_respmod not implemented
Deprecated
3550
ICAP preview_reqmod not implemented
Applies only to ICAP deployment mode
Modules: CM
3551
Received RESPMOD without body
RESPMOD ICAP message dropped because it has no body.
Modules: WF
3552
Received ICAP_REQMOD with preview without body
Deprecated
3553
%s ldap_search_s failed. %s
This warning appears if the CM cannot find an LDAP.
Modules: CM
3554
%s ldap_simplebind failed. %s
Deprecated
3555
%s field cannot exist for ICAP 1.0
Deprecated
3556
%s NetGetDCName cannot be found. %s
Deprecated
3557
%s NetGetDCName failed. %s
Deprecated
3558
%s NetGetDCName get an invalid name. %s
Deprecated
3559
14-38
Cannot get groups from %s. Error: %s
WebSafe Personal Operation Guide
This warning appears when an Operation module is unable to get groups from the LDAP server. The first
parameter is the user name and the second is the warning message received.
Modules: WS
3560
Cannot get users from %s. Error: %s
This warning appears when an Operation module is unable to get users from the LDAP server. The first
parameter is the name of the LDAP server and the second is the warning message.
Modules: CM, WS
3561
%s NetQueryDisplayInformation failed. %s
Deprecated
3562
%s NetUserGetGroups cannot get groups. %s
Deprecated
3563
%s NetUserGetGroups failed. %s
Deprecated
3564
%s size exceeds %s
Deprecated
3565
Cannot delete %s server %s: it doesn't exist
Deprecated
3566
Cannot add %s server %s
This warning appears when the program must add a server to a list of servers of the same type (e.g. log
servers, quarantine servers) and it cannot be inserted. The first parameter is the type of server and the
second is its name.
Modules: CM
3567
Cannot modify %s server %s
Deprecated
3568
Cannot get new logons from DCAgent %s
This warning appears when a module is unable to get the last logged on users in Windows Domains
controlled by the DCAgent. The parameter is the name of the DCAgent
Modules: CM
3569
Cannot get new logs from filter %s
This warning appears when the module request is too long
WebSafe Personal Operation Guide
14-39
Modules: CM
3570
Cannot get host by name: %s.
Deprecated
3571
Connection TCP closed (partial chunk)!
Deprecated
3572
Cannot read pipe from process %s
Deprecated
3573
Error number communication.
Deprecated
3574
No group received from %s
Deprecated
3575
No user received from %s
Deprecated
3576
Received event Registration for %s server.
Deprecated
3577
Received event Deregistration for %s server but not exists %s
Deprecated
3578
Received %s update package damage. %s
This warning appears when an Operation module receives a damaged update package. The first parameter is
the type of package (the resource must be updated) and the second is the description of the problem at the
package.
Modules: WF
3579
Received a corrupted notification from %s
Deprecated
3580
TCP/IP error in SMTP client. %s.
This warning appears when the Radius module cannot write in the SMTP socket due to several reasons
Modules: RD
3581
Authentication error in server %s
This warning appears when the authentication fails with the QSyncClient
14-40
WebSafe Personal Operation Guide
Modules: QR
3582
Response doesn't begin with %s protocol signature
This warning appears when the program receives a response from a server that does not begin with the
correct protocol start. The response will be discarded by the program. The parameter is the protocol name.
Modules: LIB
3583
Illegal %s protocol version
This warning appears when the program receives a response from a server using an unexpected version of
the protocol. The response will be discarded by the program. The parameter is the protocol name.
Modules: LIB, RD
3584
Response doesn't have a complete %s protocol header
This warning appears when the program receives a response from a server with an incomplete protocol
header. The response will be discarded by the program. The parameter is the protocol name.
Modules: LIB
3585
Response length doesn't match with declared length in %s protocol header.
This warning appears when the program receives a response from a server whose length does not match the
length declared inside the protocol header. The response will be discarded by the program. The parameter is
the protocol name.
Modules: LIB
3586
Request %s received from an unauthenticated %s server
This warning appears when received a SendMail request from an unauthenticated quarantine node
Modules: QR
3587
Cannot read communication channel with %s. %s.
Deprecated
3588
Cannot write communication channel with %s. %s.
Deprecated
3589
Bad sequence of commands at %s server
Deprecated
3590
Cannot load %s log workmode
Deprecated
3591
Cannot reload %s log workmode. Work mode hasn't been modified.
This warning appears when it was not possible to load a workmode.
Modules: RM
WebSafe Personal Operation Guide
14-41
3592
Cannot get remote file %s from CentralManager module
This warning appears when an Operation module cannot get a file from the Central Manager. Normally the
file is a configuration file that must be reloaded. The parameter is the name of the remote file.
Modules: AS, WF
3593
Parameter %s has an invalid value
Only in BGP deployment mode. This warning appears when the parameter read from the config file (for BGP
configuration) has not a valid value
Modules: CT
3594
Cannot get machine identifier
Deprecated
3595
Dropped radius event due to bad ip %d
Deprecated
3596
Cannot contact Icap Service %s reason %s
Deprecated
3597
%s has exceeded its used sockets limit (%s) to reach at: %s
Modules: PM
3598
%s has recovered its used sockets limit (%s) to reach at: %s
Modules: PM
3599
%s was killed to exceed its used sockets limit (%s) to reach at: %s
Modules: PM
3600
%s has exceeded its used pipes limit (%s) to reach at: %s
Modules: PM
3601
%s has recovered its used pipes limit (%s) to reach at: %s
Modules: PM
3602
%s was killed to exceed its used pipes limit (%s) to reach at: %s
Modules: PM
3603
%s has exceeded its used files limit (%s) to reach at: %s
Modules: PM
3604
%s has recovered its used files limit (%s) to reach at: %s
Modules: PM
3605
%s was killed to exceed its used files limit (%s) to reach at: %s
Modules: PM
3606
Cannot close socket %d: %s
Deprecated
14-42
WebSafe Personal Operation Guide
3607
NTLM authentication limit exceeded: %s
-
This warning appears when using NTLM authentication and:
The Server response with error: Too many userids
There is an NTLM authentication limit exceeded
Back to normal limit
Modules: CT
3608
NTLM authentication back to normal: %s
Deprecated
3609
Cache|MaxFileDescriptors limit %d reached
This warning appears when the cache service has reached the maximum file descriptors configured
Modules: CT
3610
Cache|MaxFileDescriptors back to normal
This warning appears when the cache service returned to less than maximum file descriptors configured
Modules: CT
3611
Cannot send %s email for client %s: %s
3612
Failed to send SMS for programmed report '%s' for client '%s' to receiver '%s'.
This warning appears when it was not possible to send an SMS with the programmed report of a client
Modules: RM
3613
Failed to send SMS for programmed report '%s' to receiver '%s'.
This warning appears when it was not possible to send an SMS with the programmed report
Modules: RM
3614
Failed to send SMSs for programmed report '%s' for client '%s'. Wrong parameters in programmed report
configuration.
This warning appears when it was not possible to send an SMS with the programmed report of a client
because there are a wrong parameter in the configuration
Modules: RM
3615
Failed to send SMSs for programmed report '%s'. Wrong parameters in programmed report configuration.
This warning appears when it was not possible to send an SMS with the programmed report of because
there are a wrong parameter in the configuration
Modules: RM
3616
Could not send SMS to receiver '%s'.
This warning appears when it was not possible to send an SMS
Modules: RM
4001
Cannot get enough memory for %s
Problems for allocating memory, the process will continue running successfully. Check the Memory
available.
WebSafe Personal Operation Guide
14-43
Modules: CM, AS, WF
4002
There isn't enough free space in disk
This warning appears when the program cannot find the necessary space to write some information on the
disk. If this event occurs repeatedly, the program may stop working properly.
Modules: AS, QR
4003
Cannot set default thread attributes: %s
This warning appears when the default thread settings cannot be set. The parameter is the problem
description.
Modules: PM, LIB
4004
Cannot get default thread stack size: %s
This warning appears when the default thread stack size cannot be set. The parameter is the problem
description
Modules: PM, LIB
4005
Cannot change default thread stack size: %s
This warning appears when the default thread stack size cannot be changed. The parameter is the problem
description.
Modules: LIB
4006
A detached thread shouldn't be deleted
Deprecated
4007
Cannot find free socket thread to handle requests from port %d. Not processed.
This warning appears when the program does not have any free threads to receive an external request from
a port. The requests will not be processed by the program. The parameter is the number of the specified
port.
Modules: PM, CM, WF, RM, WS
4008
Thread pool empty for 60 seconds. Connection rejected.
Deprecated
4009
Cannot convert chunk size (%d)
Deprecated
4010
Bad signature at %s
This warning appears when the Anstispam module finds some errors reading the antispam database for
categories, content analisys, md5…
Modules: AS
4011
Cannot create %s thread
This warning appears when an Operation module cannot create a thread that listens to requests from a
service. The parameter is the name of the service.
Modules: WF
4501
14-44
Unable to get OPTENET running mode. Running ICAP mode
WebSafe Personal Operation Guide
Deprecated
4502
Unable to load %s file. Using default settings.
Deprecated
4503
Unable to send license %s expired message.
Deprecated
4504
Unable to start %s .Port busy. Waiting up to 5 minutes.
This warning appears when the port is busy and cannot start the service.
Modules: PM, WF, RM, WS
4505
Webserver's user trying to gain access to forbidden path %s.
Deprecated
4506
%s server not found. Using 127.0.0.1.
Deprecated
4507
Unable to get %d port. Using default
Deprecated
4508
Timer wait not found. Using %d.
Deprecated
4509
Cannot update %s
Deprecated
4510
Quarantine %s disabled: %s
-
This warning appears when the quarantine has been disable because of:
storage path is too long
Cannot seek in file
Cannot get file size
Cannot repair broken file
Cannot open the file
Cannot alloc enougth memory
Modules: AS
4511
Quarantine node %s doesn't have the correct password
This warning appears when quarantine node doesn’t have the correct password
Modules: QR
4512
Quarantine node %s isn't configured
Deprecated
4513
Quarantine node authenticated as %s requests a second authentication
This warning appears when the Quarantine was already authenticated and request for a second
authentication
Modules: QR
WebSafe Personal Operation Guide
14-45
4514
Filter node %s doesn't have the correct user/password
Deprecated
4515
Filter node %s isn't configured
Deprecated
4516
Filter node %s isn't configured
Deprecated
4517
User not found for client %s
Deprecated
4518
Client %s not found for email account
Deprecated
4519
Client %s not found in provision
This warning appears when the client was not provisioned while trying to remove the client
Modules: CM
4520
Received invalid service type %s
This warning appears when there is service to remove is not valid while trying to remove the service from
the client
Modules: CM
4521
Cannot get initial count number for client %s
This warning appears when there is an error trying to get the initial contract units of a client
Modules: CM
4522
Client %s not found in modification provision
This warning appears when trying to modify a client provision but the service type requested is not valid
Modules: CM
4523
Received invalid operation type %s
This warning appears when trying to execute an invalid operation
Modules: CM
4524
Received invalid number of operations: %d
This warning appears when trying to execute an invalid number of operations
Modules: CM
4525
Received invalid creation type %s
This warning appears when trying to provision and antispam client with an invalid type
Modules: CM
4526
Received duplicated message %s
This warning appears when trying to execute a duplicated order
14-46
WebSafe Personal Operation Guide
Modules: CM
4527
Provisioning message %s not found
This warning appears when there is not consistent info in the historic file of provisioning orders
Modules: CM
4528
Provisioning message %s not hoped
This warning appears when trying provisioning an order with the same identifier but similar type (not the
same)
Modules: CM
4529
Provisioning %s message %s not found
This warning appears when trying to execute an order to remove not found
Modules: CM
4530
Cannot download dictionary.
This warning appears when cannot download the content dictionary for WebFilter or Antispam Filter
Modules: CM
4531
Duplicated key %s loading language %s file
Deprecated
4532
Unable to parse line loading language %s file
Deprecated
4533
%s server %s isn't configured.
This warning appears when the configuration the server is not OK (Listening port, IP Address,…)
Modules: AS
4534
Unable to save %s file. Changes will be lost.
This warning appears when it was not possible to save the new key requested for Kerberos to the
Global.conf file. This change won’t arrive to the modules.
Modules: CM
4535
Unable to load quarantined mail. %s
Modules: QR
4536
Bad unblock code to quarantined mail.
Modules: QR
4537
Connection with server %s but it must be with server %s
Modules: QR
4538
Http error while calling %s Soap service.
Modules: LIB, PM
4539
The load is too high in %s server.
WebSafe Personal Operation Guide
14-47
Modules: LIB
4540
%d module disabled. License is off.
Deprecated
4541
Message %s too long
Deprecated
4542
%s data too long
Modules: RM
4543
Unable to get %d port. Out of range.
Deprecated
4544
Parameter %s out of range. Using %s value
This warning appears when the program receives a parameter that is out of range. The program will use a
default value. The first parameter is the name of the bad parameter and the second is the default value
used.
Modules: PM, CT, CM, AS, WF, QR, RM
4545
Cannot load authentication cache. %s
Deprecated
4546
Cannot download %s succesfully. %s
This warning appears when the program cannot download the file with the updated transactions.
Modules: CT, CM, AS
4547
Cannot scan for viruses current request: %s
This warning appears when the programm cannot scan for viruses because The egine is not initialized
Modules: WF
4548
Warning: Code %s received at Soap Request %s
This warning appears when there is an error in the SOAP received. The message includes the error message
receive and the SOAP call that fails.
Modules: WF
4549
Unable to process %s request. %s
This error appears when it was not posible to process the request. The message includes a description with
the reason why this was not possible.
Modules: CT, RD
4550
Ip %s was already in use by client %s now it is associated to client %s
This warning message appears when a current IP address that was asociated to one client now is associated
to another client.
Modules: CM
4551
Over Number of failures while trying to contact Central Manager
This warning appears when it was not possible to contact with the Central Manager for a numer of times.
14-48
WebSafe Personal Operation Guide
Modules: PM, AS
4552
CCOTTA Under % WAP/Mobile Web requests
Deprecated
4553
CCOTTA Over % WAP/Mobile Web requests
Deprecated
4554
CCOTTA Under Mobile Web URL request per second
Deprecated
4555
CCOTTA Over Mobile Web URL request per second
Deprecated
4556
CCOTTA Over Number of lost frames
Deprecated
4557
CCOTTA Under URL request per second
Deprecated
4558
CCOTTA Over URL request per second
Deprecated
4559
CCOTTA Under WAP URL request per second
Deprecated
4560
CCOTTA Over WAP URL request per second
Deprecated
4561
CentralManager Under Number of available threads for SOAP requests: %s
This warning appears when the Central Manager is running out of threads to answer all the SOAP requests.
Check the following parameter: MaxNumberOfTransactions
Modules: CM
4562
CentralManager Over Number of failures contacting database: %s
This warning appears when there were an over number of failed attemps to comunicate with provision DB
Modules: CM
4563
CentralManager Over Number of failures contacting IWF database server: %s
This warning appears when there were an over number of failed attemps to comunicate with IWF Server
Modules: CM
4564
CentralManager Over Number of times core data was missing in Authentication cache: %s
This warning appears when the MSISDN username is not found in WF cache, so WF asks to CM for the user
Modules: CM
4565
CentralManager Over Number of wrong user authentication warnings: %s
This warning appears when there was an over number of user login (operator/administrator) invalid
WebSafe Personal Operation Guide
14-49
Modules: CM
4566
CentralManager Over Number of requests for user info: %s
This warning appets when there was a client is not found in cache for IP assignment
Modules: CM
4567
CentralManager Over Number of authenticated users in cache: %s
This warning appears when there was an over number of validated users in cache
Modules: CM
4568
CentralManager Over Time between updates from the IWF server: %s
This warning appears when there was an over time between updates from the IWF
Modules: CM
4569
Reporter Over % Log server requests erroneous / processed
Deprecated
4570
Reporter Over Total log size
Deprecated
4571
WebFilter Under % of mobile web pages blocked
Deprecated
4572
WebFilter Over % of mobile web pages blocked
Deprecated
4573
WebFilter Under % of total pages blocked
Deprecated
4574
WebFilter Over % of total pages blocked
Deprecated
4575
WebFilter Under % of wap pages blocked
Deprecated
4576
WebFilter Over % of wap pages blocked
Deprecated
4577
WebFilter Under Number of available threads for HTTP requests
Deprecated
4578
WebFilter Under Number of available threads for ICAP requests
Deprecated
4579
WebFilter Under Number of available threads for WAP requests
Deprecated
4580
14-50
ProcessMonitor Under Time between a module going down
WebSafe Personal Operation Guide
Deprecated
4581
Warning in configuration: %s
This warning appears when there is a wrong value in one key read from a configuration file. Check the file
and the parameter mentioned
Modules: PM, CT
4582
%s is running.
This warning appears to notify that the process mentioned is running
Modules: PM
4583
%s is not running.
This warning appears to notify that the process mentioned is not running
Modules: PM
4584
%s is responding.
This warning appears to notify that the process mentioned is running and responding (normal operation)
Modules: PM
4585
%s is not responding.
This warning appears to notify that the process mentioned is not responding. In this case, the PM will stop
the process and restart again.
Modules: PM
4586
Machine has exceeded its used CPU limit (%s %%) to reach at: %s %%
This warning appears to notify that CPU has exceeded the configured limit.
Modules: PM
4587
Machine has less than its free Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that free Memory is less than the configured limit.
Modules: PM
4588
Machine has less than its free Disk limit (%s MB) to reach at: %s MB (file system %s)
This warning appears to notify that free Disk is less than the configured limit.
Modules: PM
4589
%s has exceeded its CPU limit (%s %%) to reach at: %s %%
This warning appears to notify that the module specified has exceeded the CPU limit configured. This is a
limit for warning. There is another limit that cannot superate the module. If the module superates this
second limit, it’ll be killed and another message will be sent (see message 4590)
Modules: PM
4590
%s was killed to exceed its CPU limit (%s %%) to reach at: %s %%
This warning appears to notify that the module specified was killed because it has exceeded the CPU limit
configured.
WebSafe Personal Operation Guide
14-51
Modules: PM
4591
%s has exceeded its Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the module specified has exceeded the Memory limit configured. This is
a limit for warning. There is another limit that cannot superate the module. If the module superates this
second limit, it’ll be killed and another message will be sent (see message 4592)
Modules: PM
4592
%s was killed to exceed its Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the module specified was killed because it has exceeded the Memory
limit configured.
Modules: PM
4593
%s has exceeded its Virtual Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the module specified has exceeded the Virtual Memory limit configured.
This is a limit for warning. There is another limit that cannot superate the module. If the module superates
this second limit, it’ll be killed and another message will be sent (see message 4594)
Modules: PM
4594
%s was killed to exceed its Virtual Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the module specified was killed because it has exceeded the Virtual
Memory limit configured.
Modules: PM
4595
Machine has recovered its used CPU limit (%s %%) to reach at: %s %%
This warning appears to notify that the CPU is again under the limit configured.
Modules: PM
4596
Machine has recovered its free Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the free Memory is again more than the limit configured.
Modules: PM
4597
Machine has recovered its free Disk limit (%s MB) to reach at: %s MB (file system %s)
This warning appears to notify that the free Disk is again under the limit configured.
Modules: PM
4598
%s has recovered its CPU limit (%s %%) to reach at: %s %%
This warning appears to notify that the module specified is again under the CPU limit configured.
Modules: PM
4599
%s has recovered its Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the module specified is again under the Memory limit configured.
Modules: PM
4600
%s has recovered its Virtual Memory limit (%s MB) to reach at: %s MB
This warning appears to notify that the module specified is again under the Virtual Memory limit configured.
14-52
WebSafe Personal Operation Guide
Modules: PM
4601
Maximum number of %s connections reached. Please, raise %s
Check the file and the parameter mentionned
Modules: CT
4602
%s filter is rejecting connections. Transparent proxy bypassed.
Deprecated
4603
Line corrupted in file %s. Checksum: %s. Line %s
Check space disk and write permissions
Modules: LIB, CM, AS, WF
4604
%s request data error. Return code [%s]: %s.
This message appears when Radius is receiving Event of no provisionning clients
Modules: RD
4605
Module %s is asking for transactions with a state that CM cannot assume it will get all changes that have
been made from that state %s
This warning appears when the Central Manager has rotated the transaction file and the modules are asking
for old transaction.
Modules: CM
4606
CCOTTA Over FTP URL request per second
Deprecated
4607
CCOTTA Under HTTPS URL request per second
Deprecated
4608
CCOTTA Over HTTPS URL request per second
Deprecated
4609
CCOTTA Under FTP URL request per second
Deprecated
4610
Performance Warn: %s. See note %s
This warning appears when the number of connection that the module are handling are near the limit
configured (AS) or the MS Domain Server requires message signing. Read the note indicated.
Modules. PM, CT, AS
4611
Unable to execute transaction %s
Deprecated
4612
Cannot parse received Id %s
Deprecated
4613
Cannot insert transaction in response
WebSafe Personal Operation Guide
14-53
Deprecated
4614
Cannot parse received transaction %s
Deprecated
4615
Cannot insert received transaction %s in memory
Deprecated
4616
Unhandled exception in %s servant: %s
This warning appears when there was an exception in the module. The message indicates the error and the
process that sends the exception.
Modules: LIB, AS
4617
Unhandled exception in %s servant
This warning appears when there was an undefined exception in the module. The message indicates the
error and the process that sends the exception.
Modules: LIB, AS
4618
Over the memory fragment threshold %d
Deprecated
4619
Soap Call: Authentication Not accepted by AllowedRequests
Deprecated
4620
Response error %s : %s : %s
Deprecated
4621
no_blocking_write:: %s
Deprecated
4622
Exiting in emergency, without doing all users, it is because there are only %d seconds left before end of
allowed range of execution (file Programation.conf)
Deprecated
4623
Machine has more reception errors than its limit (%s) to reach at: %s (NIC %s)
This warning appears to notify that there are more receptions errors than the limit configured.
Modules: PM
4624
Machine has recovered its reception errors limit (%s) to reach at: %s (NIC %s)
This warning appears to notify that has recover from the limit configured of receptions errors (this is the
antitrap of 4623)
Modules: PM
4625
Machine has more transmission errors than its limit (%s) to reach at: %s (NIC %s)
This warning appears to notify that there are more transimssion errors than the limit configured.
Modules: PM
4626
14-54
Machine has recovered its transmission errors limit (%s) to reach at: %s (NIC %s)
WebSafe Personal Operation Guide
This warning appears to notify that has recover from the limit configured of transmission errors (this is the
antitrap of 4625)
Modules: PM
4627
Filesystem has not pass SMART Health test (%s) to reach: %s (filesystem %s)
This warning appears to notify that the filesystem has not passed the SMART Health test indicated.
Modules: PM
4628
Filesystem has passed SMART Health test (%s) to reach: %s (filesystem %s)
This warning appears to notify that the filesystem has passed the SMART Health test indicated.
Modules: PM
4629
Line %s discarded in workmode %s, database feeder database has not been initialized.
Modules: RM
4630
Line %s discarded in workmode %s, database feeder mapping has not been initialized.
Modules: RM
4631
Line %s discarded in workmode %s, database feeder record buffer has not been initialized.
Modules: RM
4632
No suitable record table found in static database %s to feed memory database table %s.
Deprecated
4633
Interface %s is just used by the bridge %s.
Modules: CT
4634
Failed to export results for programmed report '%s' to the file '%s' for client '%s'.
Modules: RM
4635
Failed to export results for programmed report '%s' to the file '%s'.
Modules: RM
4636
Couldn't send file to ftp server '%s:%s' with the user '%s'.
Modules: RM
4637
Couldn't copy file to destination '%s'.
Modules: RM
4638
Couldn't sent mail to receivers '%s'.
Modules: RM
4639
Couldn't process task in '%s'. %d attempts left.
Modules: RM
4640
%4:%2 Server is not Responding. %5
Deprecated
4641
DNS resolution errors, %s
WebSafe Personal Operation Guide
14-55
Modules: CM
4642
None DNS domain could be resolved
This warning appears when the module was not able to resolve the DNS. Please check the DNS conf at O.S:
/etc/resolv.conf
Modules: CM
4643
Analysis cancelled, ScanId %d.
Deprecated
4644
Update cancelled.
Deprecated
4645
Cannot send snmp trap %d
This warning appears if the module was not able to send a SNMP trap.
Modules: PM
4646
%s Discarded Jumbo frames at interface %s, maximun packet size %s
Discarded
4647
Interface %s not optimized: unsupported OS driver %s
This warning appears when CCOTTA module doesn’t know the interface driver. If this happens CCOTTA
cannot optimize it so will work without any optimization
Modules: CT
4648
Interface %s not optimized: the OS doesn't support receive side scaling queues
This warning appears if the interface driver doesn’t support for optimization. If this happens CCOTTA cannot
optimize it so will work without any optimization.
Modules: CT
4649
Error resolving %s from whitelist: %s
4650
No IP address found for whitelist domain: %s
4651
Interface %s not fully optimized: the number of RSS queues doesn't match the number of threads
This warning appears if the interface driver is not properly configured. Please, review the driver
configuration.
Modules: CT
Informative Events
5001
%s license is off.
Deprecated
5002
%s server started. Waiting for up to connections.
Deprecated
14-56
WebSafe Personal Operation Guide
5003
%s shutdown completed.
Deprecated
5004
%s closed.
Deprecated
5005
%s configuration loaded successfully.
Modules: PM
5006
%s configuration updated successfully.
Deprecated
5007
%s created successfully.
This info message appears when the item described in the message (DKIM signature, Disk cache,
Provisionning report…) was createf successfully.
Modules: PM, CM, AS, WS
5008
%s default configuration loaded.
Deprecated
5009
%s finished.
This info message appears when the indicated action (Kerberos key reneval, Antivirus update, URLs
resolution, database crp update, database consolidation…) was finished.
Modules: CM, AS, WF, QR
5010
%s started successfully.
This info message appears when the indicated action (Module, URL resolution, Disk cache, database
update… ) started succesfully
Modules: PM, CT, CM, AS, WF, QR, RD, RM
5011
%s was killed.
This info message appears to inform that the process indicated was killed
Modules: PM
5012
%s was stopped
This info message appears when the module is stopped. After that, the module exist.
Modules: AS, WF, QR, RM, WS
5013
Connection to %s server %s established
This info message appears when the module has established connection with the server indicated
Modules: CT, QR
5014
Connection to %s server %s finished
This info message appears when the module losted the connection with the server indicated
Modules: CT, QR, RM
5015
Connection to %s server %s restored
WebSafe Personal Operation Guide
14-57
This info message appears when the module was able to restire a connection with the server indicated
Modules: CM, AS, WF, QR, RM
5016
Loaded all the messages from filter %s
This info message appears when the module has loaded all the mails from the filter indicated.
Modules: QR
5017
New %s server connection defined:%s
This info message appears when there is a new connection to the Quarantine server
Modules: QR
5018
%s server %s updated successfully
Deprecated
5019
%s server listening at %s.
Deprecated
5020
user/groups from ip successfully
Deprecated
5021
%s loaded
This info message appears when the module has loaded the info indicated in the message (client info, user
info, client package, configuration file…)
Modules: CT, CM, AS, QR
5022
License %s checked successfully.
Deprecated
5023
Commutation %s server
Deprecated
5024
%s reloaded successfully.
This info message appears when the module has reloaded the lists
Modules: AS, WF
5025
%s removed from disk.
This info message appears when the module remove from disk a client (because of timeout expiration (CM),
the stale messages from quarantine file (AS) or the stale indexes (QR)
Modules: CM, AS, QR
5026
Exception captured. %s
Deprecated
5027
Created thread for %s successfully
Deprecated
14-58
WebSafe Personal Operation Guide
5028
Created threadpool for %s successfully
Deprecated
5029
%s loaded successfully
This info message appears when the module has loaded the lists successfully (AS), or the Antivirus Engine
(WF) or another list indicated in the message.
Modules: AS, WF
5030
%s contacted successfully
This info message appears when the module has contacted successfully with the URL database server.
Modules: WF
5031
%s was stopped
This info message appears when the module was stopped
Modules: PM, CT, WF
5032
Closing ICAP server
Only in ICAP deployment mode. This info message appears when the module close the I server.
Modules: WF
5033
Exiting %s. All owned threads destroyed
This info message appears when the module is going to exit and close all the threads.
Modules: WF
5034
Starting Consolidation.
This info message appears when the module has started a database consolidation
Modules: WF
5035
Consolidation terminated.
This info message appears when the module has finished the database consolidation
Modules: WF
5036
ADMIN-ACTION: %s
This info message appears when the module has a request to the compress file log
Modules: WF
5037
SOAP request: %s
WebSafe Personal Operation Guide
14-59
This info message appears when the module receives a SOAP request for exiting. The module will exist.
Modules: CM, WF
5038
%s already running.
This info message appears to notify that there is already running the URLs resolution, upgrade of the
software (only enterprise solution) or provisioning report,
Modules: CM
5039
Process %s has to wait for other processes to be started.
Deprecated
5040
Process %s suspended
This info message appears when CT cannot connet with the filter to send the traffic (ping action fails).
Modules: CT
5041
Process %s resumed
This info message appears when CT reconnet with the filter to send the traffic (ping action fails).
Modules: CT
5042
Process suspension for more than 8 minutes detected for %s
Deprecated
5043
Process %s has PID=%s
Deprecated
5044
Process %s is set to EXHAUSTED MODE. Maximum number of retries to be started within allowed seconds
reached.
Deprecated
5045
Starting %s accumulation
The reporter module has started to accumulate the data specified
Modules: RM
5046
%s accumulation terminated.
The reporter module has finished to accumulate the data specified
Modules: RM
5047
%s index load is up to date.
The module is loading the info requested (detailed or accumulated logs) or if the list is already updated
14-60
WebSafe Personal Operation Guide
Modules: CM, RM
5048
Received transaction for SMS: %s
This info message appears when the CM has received a transaction for sending SMS with the parameters to
send
Modules: CM
5050
SMS successfully sent: %s
This info message appears when the CM has sent the SMS successfully
Modules: CM
5051
No transactions.
This info message appears when the Unified Server has no transactions to the CM.
Modules: CM
5052
%s successfully updated.
This info message appears when it was updated the AV in the module
Modules: CM, AS, WF
5053
Couldn't download list: %s
This info message appears when it was not possible to download the list indicated in the message
Modules: CM, AS, WF
5054
Possible error in file's integrity: %s
This info message appears when there could be an integrity error in the list updated.
Modules: CM, AS
5055
File %s has been successfully downloaded.
This info message appears when the module has downloadad the list indicated in the message
Modules: CM, AS, WF
5056
UnblockingRequest: %s
This info message appears when the module receives an unblocking request from the user.
Modules: CM
5057
%s removed from memory.
Deprecated
WebSafe Personal Operation Guide
14-61
5058
Some packets lost
Deprecated
5059
%s has been detected.
This info message appears when the module detect a custom kernel
Modules: CT
5060
%s actual version is %s
This info message appears to show the current version of the module
Modules: CT
5061
%s download in progress.
This info message appears when the module is currently downloading the Antivirus database or the list
database
Modules: CM
5062
SMS not sent: %s
This info message appears when it was not possible to send the SMS
Modules: CM
5063
Packet processing time avg=%sus max=%sus
This info message appears to inform about the average and the maximum time of package processing
Modules: CT
5064
DNS lookup time avg=%sus max=%sus
This info message appears to inform about the average and the maximum time of DNS lookup
Modules: CT
5065
Key %s is obsolete, use %s instead.
Deprecated
5066
There were lost %s packet(s) at interface %s
This info message appears to inform that there were some packet loses in the indicated interface. This loses
could be due to High traffic volume (CCOTTA cannot process the traffic)
Modules: CT
5067
Before: %s
This message appears to:
14-62
WebSafe Personal Operation Guide
-
Indicate the accumulated activation requests
Accumulated SMS requests
Compacting the database
Before starting a process
Modules: CM
5068
After: %s
This message appears to:
-
Indicate the accumulated activation requests
Accumulated SMS requests
Compacting the database
After finishing a process
Modules: CM
5069
%d%% Filtered
This message appears to indicate the porc filtered
Modules: WF
5070
Transaction not processed: %s
This message appears to indicate that the transaction indicated was not precessed
Modules: CM, AS
5071
Statistics dump: %s
This message appears to present statistics about the cps received, cps sent…
Modules: RD
5072
%s Antivirus initialized
Deprecated
5073
%s Antivirus finalized
Deprecated
5074
Invalid connection to %s server
This message appears to indicate that it was not possible to connect to the license server or to the proxy to
check the license
Modules: CM
5075
Cannot parse %s response correctly.
Only for the Enterprise solution. This message appears during the software update to indicate that it was not
possible to check the status of the installation update when asking to the OSSInstaller
WebSafe Personal Operation Guide
14-63
Modules: CM
5076
File %s has been requested by %s
This message appears to indicate the file that was requested by SOAP call
Modules: CM
5077
%s checked
Only for the Enterprise solution. This message appears to indicate that there are no newer version to update
Modules: CM
5078
File %s has not changed at %s server. Download not needed
Deprecated
5079
%s consolidation successfully
Deprecated
5080
Master restored, backup deactivated.
Deprecated
5081
Icap Service %s contacted successfully
Deprecated
5082
Bad DatosAdicionales parameter type, a RECORD with two element is requiered.
Deprecated
5083
Bad parameter type datosAdicionales->OCTO_NU_ADMINS = %s
Deprecated
5084
Add lstOperaciones -> %s = %s
Deprecated
5085
AdditionalData->OCTO_NU_ADMINS = %s
Deprecated
5086
AdditionalData->NUM_OCURRENCIAS = %s
Deprecated
5087
AdditionalData->DIRECCION_CORREO_1 = %s
Deprecated
5088
14-64
AdditionalData->TIPO_CREACION = %s
WebSafe Personal Operation Guide
Deprecated
5089
Add codServicio-> %s = %s
Deprecated
5090
AdditionalData->USER_ID_COL = %s
Deprecated
5091
Add Units Provision-> %s = %s
Deprecated
5092
AdditionalData->OPERACIONES(0) = %s
Deprecated
5093
AdditionalData->OPERACIONES(1) = %s
Deprecated
5094
AdditionalData->Equipos(0) = %s
Deprecated
5095
AdditionalData->Equipos(1) = %s
Deprecated
5096
AdditionalData->Cantidades(0) = %d
Deprecated
5097
AdditionalData->Cantidades(1) = %d
Deprecated
5098
Sending response (%d) to AXIS-TdE initial request
Deprecated
5099
Result sent to Central Manger ERR = %d
Deprecated
5100
External Execute
Deprecated
5101
Getting response from AXIS
Deprecated
WebSafe Personal Operation Guide
14-65
5102
Not connected ... retrying connection with AXIS
Deprecated
5103
Conection refused with AXIS
Deprecated
5104
Receiving response from AXIS
Deprecated
5105
Issue arise due to: %s - %s
Deprecated
5106
Data Received from AXIS -> MENS_NO_MENSA = %s, MENS_NU_MENSA = %s, MENS_IN_TIPMEN = %s
Deprecated
5107
Error in %s
This message appears to indicate a general error described in the message:
“IP notification address max retries exceeded”
“BGP FSM neighbor state – event”
Modules: CT
5108
Request data – assigned
Deprecated
5109
Complementary data – assigned
Deprecated
5110
Processing values of: -%s-.
Deprecated
5111
Sending request to Central Manager
Deprecated
5112
Communication error with Central Manager
Deprecated
5113
Response sent to AXIS-TdE
Deprecated
5114
14-66
Issue creation AXIS-TdE
WebSafe Personal Operation Guide
Deprecated
5115
MARCADO request sent to AXIS-TdE
Deprecated
5116
##########
Deprecated
5117
-Cumplimentation- Error TdE:\r\nOrderNumber=%s, %s:%s, without -Cumplimentation-:
Deprecated
5118
Central Manager requests issue creation %s
Deprecated
5119
SendError issue creation AXIS-TdE
Deprecated
5120
Issue creation finished ok AXIS-TdE
Deprecated
5121
Communication error with AXIS-TdE
Deprecated
5122
Provisioning finished
Deprecated
5123
SOAP Request: Stop service.
Deprecated
5124
SOAP Request: Start service.
Deprecated
5125
SOAP Request: Deleting cache.
Deprecated
5126
SOAP Request: Reload configuration file.
Deprecated
5127
SOAP Request: Exit.
Deprecated
5128
ITR: %s
Deprecated
5129
HTMOPT ReadFile - File not found: %s <--Deprecated
5130
Error OWS: ReplaceAddressInStack not possible
Deprecated
WebSafe Personal Operation Guide
14-67
5131
TemplateFile: %s
Deprecated
5132
ERROR: Template: %s, Error count = %s
Deprecated
5133
HTTPCleanRequest = %s
Deprecated
5134
HTTPRequestAuth = %s
Deprecated
5135
OWS Version %s (build date - %s) for WINDOWS XP,NT,2000
Deprecated
5136
OWS Version %s (build date - %s) for LINUX Red Hat 9.x
Deprecated
5137
Timeout in Request (Now-Time From Request)=%s
Deprecated
5138
Number of available threads PORT(%s) = %s
Deprecated
5139
%d Threads created.
Deprecated
5140
AXIS Request: %s
Deprecated
5141
Manager Request to complete PROVISION:%s
Deprecated
5142
Received an undefined provision result: %d
Deprecated
5143
ATLAS: servicioSincrono received.
Deprecated
5144
SincronousService NOT authenticated.
Deprecated
5145
SincronousService authenticated.
Deprecated
5146
Parameter interpretation begin.
Deprecated
5147
14-68
RequestData->NumeroOrden = %s
WebSafe Personal Operation Guide
Deprecated
5148
RequestData->tipoJalon = %s
Deprecated
5149
RequestData->codInt1Uo = %s
Deprecated
5150
RequestData->codInt2Uo = %s
Deprecated
5151
RequestData->intCentro = %s
Deprecated
5152
RequestData->intLocalizacion = %s
Deprecated
5153
RequestData->secuenciaActuacion = %s
Deprecated
5154
RequestData->versionActuacion = %s
Deprecated
5155
RequestData->unidadOperativa = %s
Deprecated
5156
RequestData->grupoOperativo = %s
Deprecated
5157
Page not found, path relative to ROOT = %s
Deprecated
5158
%s Packet Lost events happened at interface %s Total Packet Lost %s
Deprecated
5159
Information about configuration: %s
-
This message appears to indicate:
The number of dynamic packet allocated and the total used
Info about the use of ssl (if using ssl acceleration, ssl engine, if there is an error in the engine, if its cavium engine…)
Modules: CT
5160
Unknown file %s
Deprecated
5161
Report event: %s
-
Only for BGP deployment mode. This message appears to indicate info about the status of BGP:
BGP WF communication is established
BGP Default GW is reachable
WebSafe Personal Operation Guide
14-69
-
Default GW reachability has been lost
Modules: CT
5162
Unclear case, surely due to previous crash, or shortage of electricity : %s%s. Can cope with it.
Deprecated
5163
%s alive
Deprecated
5164
Executting ssl accelaration %s
Deprecated
5165
%s errors writting a packet at interface %s maximun packet size %s
This message appears to indicate that there were errors writing a packet. Indecates the interfaces and the
maximum packet size
Modules: CT
5166
Accumulation dumped to static database %s.
This message appears to indicate that the accumulation calculated has been saved in the database
Modules: RM
5167
Database %s consolidated into %s.
This message appears to indicate the database that was consolidated and the destination path
Modules: RM
5168
Removed old database %s.
This message appears to indicate the database that has been removed
Modules: RM
5169
Removed temporal database %s.
This message appears to indicate that it was remove a temporal database
Modules: RM
5170
Temporal database %s is not corrupted, moving to its final destination and removing old fragments.
This message appears to indicate after a fall of the module, that the temporal database used before the fall
is OK so that the Reporter process it to a final destination
Modules: RM
5171
Database fragment %s removed.
This message appears to indicate after a fall of the module that the fragments detected could not be used so
they are removed
Modules: RM
5172
Database %s backed up to %s.
This message appears to indicate the indicated database was backed up
Modules: RM
14-70
WebSafe Personal Operation Guide
5173
Backup accumulation result dumped to %s.
This message appears to indicate that the accumulated results were saved in a destination path
Modules: RM
5174
Dynamic database %s rebuilt from detail file.
This message appears to indicate that the database is built with the data from a detail file
Modules: RM
5175
Started consistency check of '%s'.
This message appears to indicate that the repoter is checkinf the consistency of the indicated database
Modules: RM
5176
Finished consistency check of '%s'.
This message appears to indicate that the consistency check has finished
Modules: RM
5177
Executed report '%s' with id '%s'.
This message appears to indicate that the reporter is executing a defined report.
This message appears to indicate Modules: RM
5178
Executed report '%s' with id '%s' for client '%s'.
This message appears to indicate the reporter is executing a defined report for a certain client
Modules: RM
5179
Executed programmed report '%s'.
This message appears to indicate the reporter is executing a programmed report
Modules: RM
5180
Executed programmed report '%s' for client '%s'.
This message appears to indicate the reporter is executing a programmed report for a certain client
Modules: RM
5181
Static database %s dumped.
This message appears to indicate the static database was dumped
Modules: RM
5182
Starting accumulation on database '%s'.
This message appears to indicate the reporter is starting the accumulation on a certain database
Modules: RM
5183
Enlisting '%s' to be accumulated over '%s'.
This message appears to indicate that the indicated database was enlisted to be accoumlated
Modules: RM
WebSafe Personal Operation Guide
14-71
5184
Database %s moved to %s.
This message appears to indicate that the database indicated was moved to another path
Modules: RM
5185
Starting migration
This message appears to indicate that the reported has started a new migration
Modules: RM
5186
Migration completed
This message appears to indicate that the migration was completed
Modules: RM
5187
Migrating databases
This message appears to indicate that the reporter is migrating all the databases
Modules: RM
5188
Migrating database %s
This message appears to indicate the database that the reporter is migrating
Modules: RM
5189
Migrating programmed report instances
This message appears to indicate it is migragint programmed report to the current version
Modules: RM
5190
Migrating programmed report instance %s
This message appears to indicate the programmed report that is currently migrating
Modules: RM
5191
Migrating file %s.
This message appears to indicate the file that the reporter is currently migrating
Modules: RM
5192
Migrating detail %s (copy).
This message appears to indicate the detail file that is migrating to another copy
Modules: RM
5193
Migrating detail %s (move).
This message appears to indicate the detail file that is migrating to another path
Modules: RM
5194
Scripting engine message '%s' received executing script '%s' from configuration file '%s'.
This message appears to indicate that the scripting engine is running a script from the indicated
configuration file
Modules: RM, WS
14-72
WebSafe Personal Operation Guide
5195
Scripting engine output '%s' received executing script '%s' from configuration file '%s'.
This message appears to indicate the output of the script executed by the scripting engine
Modules: RM, WS
5196
Workmode %s ignored. Unable to load Reporter configuration.
This message appears to indicate that one workmode is ignored because it was not possible to load from the
configuration file
Modules: RM
5197
Received DCAgent response (%s) with more than %s bytes.
Deprecated
5198
%1 At least a Primary Server is available again.
Deprecated
5199
%1 At least a Server is available again.
Deprecated
5200
%1 Has been re-configured properly.
Deprecated
5201
%4:%2 Connection to Server has been restored.
Deprecated
5202
%4:%2 Connection to Server has been restored.
Deprecated
5203
Download limit reached for %s.
This message appears to indicate that is was reached the download limited in a LDAP query.
Modules: CM
5204
Starting upgrade.
This message appears to indicate that an upgrade process has been started
Modules: RM
5205
Upgrade completed.
This message appears to indicate that the upgrade process has been completed
Modules: RM
5206
Upgrading databases.
This message appears to indicate the databases are being upgraded during the upgrade process.
Modules: RM
5207
Database %s is up to date.
This message appears to indicate that the database is updated
Modules: RM
WebSafe Personal Operation Guide
14-73
5208
Database %s successfully upgraded.
This message appears to indicate that the database has been successfully upgraded
Modules: RM
5209
Detailed log %s is up to date.
This message appears to indicate the indicated log is updated
Modules: RM
5210
Detailed log %s successfully upgraded.
This message appears to indicate that the detailed log has been upgraded
Modules: RM
5211
Antivirus module loaded.
Deprecated
5212
Analysis started, ScanId %d.
Deprecated
5213
Analysis done, ScanId %d.
Deprecated
5214
Update finished.
Deprecated
5215
System analysed: %s objects analysed, %s infected.
Deprecated
5216
AV Library Version %s; AV Engine Version %s; AV Updater Version %s; SW Version %s; Num.virus %s
Deprecated
5217
%d%% Filtered by cpu%d
Deprecated
5218
The service %s changed its status to %s
Not implemented yet
5219
Interface %s optimized: %s
This message appears to indicate that the network interface driver is known and that CCOTTA has optimized
it
Module: CT
5220
The IP address %s from blacklist has been removed because it belongs to whitelist: %s
Not implemented yet
Only for WOLF solution.
Module: CM
5221
14-74
The IP address %s from blacklist has been removed because it exceeds the maximum traffic threshold
WebSafe Personal Operation Guide
Only for WOLF solution.
Module: CM
5222
%s email discarded for client %s: %s
The oldest email for a client is discarded because a new email for that client is pending to send (welcome to
the service email)
Module: CM
7001
%s SOAP service restored
This message appears to indicate that there is a http error while calling ManagerSoap
Module: CT
7002
%s HTTP service restored
This message appears to indicate that http service for SOAP calling was restored
Module: CT
7003
The created number of clients has reached the permitted amount for your license. The correct operation
of the system should have been recovered.
Module: CM
7004
The license control key has been restored. The correct operation of the system should have been
recovered.
Module: CM
7005
%s email for client %s sent successfully
This message appears to indicate that there was sent a wellcome email to the client.
Module: CM
10001
OWS Debug: %s
Not implemented yet
WebSafe Personal Operation Guide
14-75
Appendix B: OST General Categories
Importance of Categories within OST
Static lists used within the Filtering Modules of OST contain URLs that are categorized.
URL lists are expanded using URL list generators, which enable the use of wildcards in
URL specifications. Each URL is part of one to “N” classification categories available.
Figure 14-1: Categorization of URLs
Classification categories are groups of URLs which facilitate the administration and
definition of profiles (types of services, such as young, teen, mature and adult).
14-76
WebSafe Personal Operation Guide
Classification categories are used to define rules. Rules are hierarchical and there are
three major levels: (a) General lists, (b) Operator lists and (c) End-User lists. The
precedence of rules matches this order, so Operator list rules will be valid for all EndUsers and if there is a conflict between rules, the rule with the higher priority is applied.
URL Classification within categories has two major levels — (a) General and (b)
Operator — so the Operator is able to place a URL directly in a category and that
classification will be applied to End-Users, even though it is not considered a General
classification. So, for example, URLs can be linked to categories as shown in the
following table:
General
Categories
http://www.google.com/* Search Engine
URL
http://www.leisure.com/*
…
Games, Gambling,
Pay Per Surf
…
Operator’s Categories
Operator Categories
Operator Category 1 (Operator can
define new categories and link URLs to
them)
Pornography, Operator Category 2
…
Available Categories
The available General Categories are listed below:
WebSafe Personal Operation Guide
14-77
14-78

Anonymizers: Websites that allow users to browse the Internet
and access Internet content without being registered by third
parties.

Anorexia and Bulimia: Websites dedicated to promoting and
encouraging eating disorders.

Art: Websites that provide information about the arts, e.g.
museums, sculpture, photography, literature, etc.

Banks and Financial Institutions: Websites of banks and
financial institutions worldwide.

Banners: Advertising banners that form part of a website.

Blogs: Websites where people can publish their diaries and any
experiences, comments, ideas, etc. they wish to share over the
Internet.

Bombs: Websites that explain how to prepare, make, build and use
explosives and explosive devices.

Chat: Websites where end users can communicate with other users
in real time.

Computing: Websites with information relating to hardware,
software, the Internet, etc.

DNS Services: Blocks access to Dynamic DNS Services.

Drugs: Websites that encourage the drug use or provide contacts
and locations where drugs can be bought. This category does not
include general information or preventive measures on drugs.

Economy: Websites with content on stock markets, banking,
financial investments, insurance, etc.

Education: Websites of schools, universities, academies and
centers that offer training courses.

Employment: Websites for job searches; this category also
includes head hunters and any content they may include on the
Internet.

Dating: Match-making websites through which the user can meet
other people, make friends, find a partner, etc.

Directory and Street maps: Websites that include city and street
maps, as well as contact information such as addresses, telephone
numbers, etc.

Forums: Websites that invite users to participate in discussions on
predetermined topics.
WebSafe Personal Operation Guide

Gambling: Websites providing access to online gambling such as
casinos and any other online services that allow an end user to
place bets.

Games: Websites where user can play online games or download
computer games.

Government: Websites of public entities and institutions, such as
ministries, government departments, city councils, the European
Union and any other URL or web page that provides information
regarding government institutions from around the world.

Hackers: Websites where one can find information on hacking,
pirated and illegal software as well as software used for hacking.

Health: Websites where you can find non-scientific information
about illnesses and how to cure them.

Hosting domains: Hosting websites from where Internet domains
can be obtained.

Information: Websites that provide general information on traffic
conditions, weather, etc.

Instant Messaging Servers: Websites where Instant Messaging
software (e.g. MSN Messenger, Yahoo Messenger, etc.) can be
downloaded.

Legal: Websites containing information on legal matters.

Leisure: Websites containing information on what to do during
free time, e.g. films, plays, books, restaurants, hobbies, etc.

Logos/Ringtones: Websites where images and/or ringtones
(monophonic or polyphonic melodies) for cell phones can be
downloaded.

Malware: Websites containing malicious code or programs such
as viruses or Trojans.

Models: Websites containing photographs of models. Websites
where this type of photographs shows models fully or partially
naked are included in the pornography category.

Music: Websites where users can purchase or download music, or
get information on singers and music groups in general.

P2P Servers: Websites that make it possible for users to share or
download legal and illegal files. This category also includes
websites that contain P2P applications and programs.
WebSafe Personal Operation Guide
14-79
14-80

Pay-per-surf: Web pages which allow people to earn money on
the Internet by receiving e-mails, surfing certain web pages,
subscribing to free offers, etc.

Personal Websites: Personal websites created by users all over the
world to present themselves or specific topics of interest to them.

Pornography: Websites with a pornographic and erotic content.
This category includes access to chat rooms where this type of
material can be found.

Portals: Websites offering a wide range of content (e.g. news,
leisure, sport, games, music, etc.) all in one place.

Press: Online neOSTapers or magazines.

Racism: Websites with contents of an openly xenophobic nature
or that promote and/or defend racist behavior based on culture,
race, religion, ideology, etc.

Remailers: Web pages that readdress or transform other web
pages.

Search engines: Websites used for content searches and browsing
on the Internet (google.com, yahoo.com, altavista.com,
alltheweb.com, etc.).

Sects: Websites on organizations universally accepted as sects.
Within this category URLs are included on organizations that
promote directly or indirectly: (i) group, animal or individual
injuries, (ii) esoteric content (iii) content that sets a bad example
for young children: that teaches or encourages children to perform
harmful acts or imitate dangerous behavior, (iv) content that
creates feelings of fear, intimidation, horror, or psychological
terror, (v) Incitement or depiction of harm against any individual
or group based on gender, sexual orientation, ethnic, religious or
national identity.

Sexuality: Websites that provide information on sex, sex and
teenagers, sexual education etc., without pornographic content.

Shopping: Websites for online shopping.

Society: Websites with content relating to celebrities, fashion,
home improvement, etc.

Sport: Websites that provide content relating to sports, sports
teams, etc.
WebSafe Personal Operation Guide

Spyware: Websites containing spyware. Spyware is software that
collects confidential and general information from a PC and
transmits it to a third party. All this takes place without the
knowledge and/or consent of the user.

Telecommunications: Websites that provide information about
landline telephony, cell phones, internet connections, etc.

Travel: Travel agency portals and websites with information on
cities, hotels and transportation.

Violence: Websites and/or web pages that provide openly violent
content and/or that promote violence or defend it.

VoIP: Voice over IP. Web pages that provide access to
applications that provide live voice transmission via the internet,
using TCP/IP protocols.

Webmail: Websites that provide Webmail services where you can
send and receive e mails from any personal computer with an
Internet connection (Hotmail, Yahoo, Gmail, etc.).
*On many occasions, the same website may be included in two or more categories at
the same time.
WebSafe Personal Operation Guide
14-81
Appendix C: Border Gate Protocol
Border Gateway Protocol (BGP) is a protocol used by ISPs registered on the Internet to
exchange routing tables. It requires a router that has been configured with each neighbor
that will exchange the routing information it has stored. A feature of BGP is that it
exchanges routing information between autonomous systems at the same time as
guaranteeing a choice of direct routes free of loops.
OST 6.04 includes some BGP functionalities. Specifically, it can be used to interact
with installations that use this protocol under certain conditions:
14-82

It is not compatible with a standard installation. The installation of
OST using BGP has specific features that make it different to a
traditional installation. The result is that many service features are
affected, mainly those related to content analysis, which is not
possible in this type of installation.

It can only filter by connection. The content filter in a BGP
installation works using lists of blocked URLs. The client makes a
request using a router and CCOTTA. If the requested URL is on
the preloaded lists of the filtering module, the request is rejected
and the default page or a custom blocking page is shown. If the
requested URL is not on the lists, the page is delivered to the client
through the router, without passing through the filtering module.

The Reporter service generates information in certain situations.
The information saved in the logs relates only to traffic that passes
through the filtering module, something that does not necessarily
happen with this type of installation. Using BGP, most traffic
passes directly from the client to the external server without
passing through CCOTTA or another filtering module.

The main advantage is that it enables a minimal degree of filtering
of restricted pages using small machines that can provide service
to large numbers of users.
WebSafe Personal Operation Guide