R3000 Troubleshooting
Installation |
SYMPTOM: The R3000 is installed but it does not appear to be filtering or blocking traffic.Confirm whether or not the R3000 is receiving/capturing traffic. Use the 'Realtime Traffic log' to verify whether or not the R3000 is logging traffic: SYSTEM > Diagnostics > View Log File: Realtime Traffic Log (shadow.log). If the log file is empty there are a few things to check:
|
SYMPTOM: The R3000 is capturing/logging traffic but block pages are still not being presented when expected or a 'Page Cannot be Displayed' error page shows in the browser.How the R3000 blocks – When the R3000 blocks a web page access attempt, it sends a redirect/block packet in the form of a "spoofed" packet back to the end-user workstation/browser. That is, the R3000 sends the requesting workstation a packet masquerading as the Web Servers response. The redirect packet points the web browser on the end-users workstation to the R3000s block page(you can also specify an alternate block page but for the sake of this scenario, it is assumed that the default on-box block page is used). The block page on the R3000 is accessed on port 81. While that is happening the R3000 also sends a TCP Reset packet to the Web Server terminating the conversation it was preparing to have with the requesting workstation. If sites are being blocked or if sites are blocked but block pages aren't being displayed, investigate some of the options/settings below:
|
SYMPTOM: The R3000 does not appear to be able to download the library or patches.This can be verified via the status information on the HOME page/tab of the R3000 as well as by viewing the Library Update Log (Library > Updates > Library > Library Update Log: View Log) or the Patch Update Log (System > Patch > Patch Update Log). You may find it necessary change the Log Level from 1 to 2 in order to see more verbose information regarding errors. This can be changed via Library > Updates > Configuration. Changing the log level in the middle of a Library/Patch download attempt will have any impact. You will need to initiate a new download after the log level has been changed.
|
SYMPTOM: The R3000 is installed but HTTPS/SSL based traffic is being negatively impacted.The R3000 has a configuration option called HTTPS Filtering Level (SYSTEM > Control> Filter). This setting controls how the R3000 analyzes HTTPS/SSL based traffic and when a block will be issued. NOTE: There are four basic levels to choose from. If Medium (default) or High is selected, it is imperative that the R3000 be able to access the internet via HTTPS / Port 443. One quick way to determine whether or not the R3000 is
causing the problem is to temporarily turn the HTTPS Filtering
Level to NONE and confirm whether or not the problem persists. If a valid website is being blocked as a result of the HTTPS Filtering Level, there are two options available to allow access to or "Whitelist" the site:
What follows is a breakdown of the different HTTPS Filtering Levels and when the R3000 will block traffic: None: The R3000 will not analyze HTTPS/SSL based content. Low: The R3000 will take the IP Address of the destination/target server (from the destination IP of the request packet) and compare it against the URL Library to see if the IP Address is categorized. When will the R3000 block a request? When will the R3000 block a request? Medium (+ Forward lookup to validate qualified DNS): Same as Medium except the R3000 will also perform a Forward DNS Lookup on the site captured in the certificate details. When will the R3000 block a request? High: The R3000 will take the destination IP Address of the captured HTTPS Request, perform a Reverse DNS Lookup and compare the results to the site name/hostname provided in the certificate. When will the R3000 block a request? High (+ Library Lookup to overturn DNS Decision): If this option is selected, a category lookup on the destination IP Address of the HTTPS request packet is performed in addition to the other checks. The categorization of the IP Addresses, if it exists, and policies surrounding the category will overrule the decision the R3000 comes to based on the DNS check performed in the HIGH setting. |
General Configuration |
SYMPTOM: A profile has been applied to a user/group/IP Address that should not result in any sites being blocked yet sites continue to be blocked.Minimum Filtering Level(MFL) – The Minimum Filtering
Level is an umbrella filtering profile/policy that sits on top
of any IP Group or LDAP based filtering profile (except for
the Domain Default Rule). NOTE: The Minimum Filtering Level also impacts Exception
URLs and Override Accounts. To modify the impact the MFL has
on Override Accounts and/or Exception URLS, review the settings
under the 'Min. Filter Bypass' tab while on the MFL configuration
page. |
SYMPTOM: The R3000 appears to be responsible for blocking some internal network traffic or in some cases access to legitimate websites. When blocked from accessing websites the default block page presents the blocked URL as: pattern://{IP Address}How can this be confirmed and is there a way to "Whitelist" sites/traffic from the Pattern based detection Engine?
|
SYMPTOM: After adding a site to a category or deleting a site from a category, the R3000 does not appear to have applied the changes.Reload Library button – If changes are made to the Library be sure to click the 'Reload Library' button as the final step. There will be situations where multiple changes may need to be made to the Library in one exercise. The Reload Library button does not need to be depressed after every addition or deletion. Just one Reload after all changes have been made. NOTE: It could take anywhere from 2-5 minutes for the Library to reload and the changes to take effect. |