
U S E R S
User Guide |
ComSifter CS-8D Pro
6–16
blacklist. If so, the page is denied. If not, the ComSifter honors the browser’s request for a port at which time
the browser encrypts the data and the ComSifter is no longer able to see the data.
Pros
HTTPS transactions work properly, as ComSifter is not seen as a man-in-the-middle.
ComSifter has a chance to see if a site is on the blacklist—before it becomes encrypted.
Cons
Requires browser setup
May interfere with server packages (WSUS, Exchange, etc.), anti-virus software updates, etc., and will
require entering the proxy information into these programs. (Newer applications follow the proxy settings
used at the operating system level, making this less of an issue.)
Authenticating Proxy Mode
In addition to performing the functions of a standard proxy, an authenticating proxy also authenticates the user
to the proxy. This adds a layer of security to the ComSifter by only allowing authenticated users. More
importantly, it gives the ComSifter a method of automatically identifying the user. This data is then used by the
ComSifter to map the user to specific filters. This mode is required when using either Basic or NTLM
authentication methods.
Pros
Browser must authenticate with the proxy, which increases security, and gives the ComSifter a method of
retrieving a username automatically.
HTTPS transactions work properly, as ComSifter is not seen as a man-in-the-middle.
ComSifter has a chance to see if a site is on the blacklist—before it becomes encrypted.
Cons
Requires browser setup
May interfere with server packages (WSUS, Exchange, etc.), anti-virus software updates, etc., and will
require entering the proxy information into these programs. (Newer applications follow the proxy settings
used at the operating system level, making this less of an issue.)
May require additional debug to identify poorly written applications that are not proxy-aware.
Which is the right solution for our network?
Proxy mode is always the preferred setup. It is more robust—especially with HTTPS transactions—and gives
the network administrator much greater control over what client applications can access the Internet.
How to determine which proxy mode to use:
Basic
NTLM
IdentD
IP
No
Authentication
Transparent
Optional
Optional
Optional
Standard Proxy
Optional
Optional
Optional
Authenticating Proxy
Mandatory
Mandatory
Summary of Contents for CS-8D Pro
Page 1: ...ComSifter protect web users now User Guide Model CS 8D Pro Version March 26 2012 0326121500 ...
Page 153: ...F I L T E R S E T U P User Guide ComSifter CS 8D Pro 4 23 Figure 4 19 Modify Page RegEx ...
Page 194: ...U S E R S User Guide ComSifter CS 8D Pro 6 28 Figure 6 19 Windows Firewall ...
Page 215: ...U S E R S User Guide ComSifter CS 8D Pro 6 49 Figure 6 40 Add User ...
Page 219: ...U S E R S User Guide ComSifter CS 8D Pro 6 53 Figure 6 43 Add IP ...