
U S E R S
User Guide |
ComSifter CS-8D Pro
6–22
Authentication Methods (Pros and Cons)
Basic
NTLM
IdentD
IP
No
Authentication
What is
Identified
Assigned
username and
password
Currently
logged in
user
Currently
logged in user
IP of computer
Nothing
Source of
Identification
User/Application
Application
Computer
Computer
None
Additional
Software on
Client
Computers
No No
Yes
No
No
User Input
Requires a
username and
password at start
of browsing
session
None
None
None
None
Transparent
Proxy
No No
Yes
Yes
Yes
Explicit Proxy
Required
Required
Optional
Optional
Optional
Terminal
Services
Yes Yes
No No Yes
Browsers
Most current
browsers
IE, Chrome,
and FF—Yes
Doesn’t matter
Doesn’t matter
Doesn’t matter
Speed/
Efficiency
Good–
Requires 1+ extra
transaction per
connect
Usable–
Requires up
to 3 extra
transactions
Good–
Requires 1
extra
transaction
Excellent–
No extra
transactions
Excellent–
No extra
transactions
Security
(ability to spoof)
Difficult for
normal user, easy
for professional
Impossible
for normal
user, hard
for
professional
Possible for
knowledgeable
user, trivial for
professional
Difficult for
normal user
(depends on
administrative
rights)
, trivial for
professional
N/A
Username
Logged
Yes Yes
Yes
No No
Multi-Level
Filtering
Supported
Yes
Yes
Yes
Yes
No
Authentication
Configuration
Complexity
Minor Major
Major
Minor
None
Summary of Contents for CS-8D Pro
Page 1: ...ComSifter protect web users now User Guide Model CS 8D Pro Version March 26 2012 0326121500 ...
Page 153: ...F I L T E R S E T U P User Guide ComSifter CS 8D Pro 4 23 Figure 4 19 Modify Page RegEx ...
Page 194: ...U S E R S User Guide ComSifter CS 8D Pro 6 28 Figure 6 19 Windows Firewall ...
Page 215: ...U S E R S User Guide ComSifter CS 8D Pro 6 49 Figure 6 40 Add User ...
Page 219: ...U S E R S User Guide ComSifter CS 8D Pro 6 53 Figure 6 43 Add IP ...