Websense Web Security and Websense Web Filter
4. Under Protocol Management, indicate whether Network Agent should use this
NIC to filter non-HTTP protocols:
Check Filter non-HTTP protocol requests to activate the protocol
management feature. This allows Websense software to filter Internet
applications and data transfer methods, such as those used for instant
messaging, streaming media, file sharing, Internet mail, and so on. See
Filtering categories and protocols, page 38, and Working with protocols, page
214, for more information.
Check Measure bandwidth usage by protocol to activate the Bandwidth
Optimizer feature. Network Agent uses this NIC to track network bandwidth
usage by each protocol or application. See Using Bandwidth Optimizer to
manage bandwidth, page 221, for more information.
Configuring monitoring settings for a NIC
Use the Local Settings > NIC Configuration > Monitor List page to specify which
machines Network Agent monitors via the selected network interface card (NIC).
1. Under Monitor List, specify which requests Network Agent monitors:
All: Network Agent monitors requests from all machines it sees using the
selected NIC. Typically, this includes all machines in the same network
segment as the current Network Agent machine or NIC.
None: Network Agent does not monitor any requests.
Specific: Network Agent monitors only the network segments included in the
2. If you selected Specific, click Add, and then specify the IP addresses of the
machines Network Agent should monitor. See Adding or editing IP addresses,
page 367, for more information.
To remove an IP address or network range from the list, check the appropriate list
item, and then click Delete.
3. Under Monitor List Exceptions, identify any internal machines Network Agent
should exclude from monitoring.
For example, Network Agent could ignore requests made by CPM Server. This
way, CPM Server requests will not clutter Websense log data or any of the status
a. To identify a machine, click Add, and then enter its IP address.
b. Repeat the process to identify additional machines.
4. Click OK to cache your changes and return to the NIC Configuration page.
Changes are not implemented until you click Save All.
You cannot enter overlapping IP address ranges. If ranges
overlap, network bandwidth measurements may not be
accurate, and bandwidth-based filtering may not be