
U S E R S
User Guide |
ComSifter CS-8D Pro
6–23
Authentication Methods Explained
BASIC ONLY
The ComSifter is not joined to a domain. When any browser/application opens to connect to the Internet, an
authentication popup appears. The user must enter a username and password that was previously entered into
the ComSifter Username Database.
Practical Application
Configuration
A small school has 20 fixed computers, and does not have a domain controller. The school wants to allow
users to bring in personal laptops to connect to the network.
Operation
When a browser is opened, an authentication popup will appear. The user must enter a username/password
combination that was previously entered into the ComSifter Username Database.
Note:
The user will not be re-asked for credentials unless one of the following is true:
•
The browser is closed, and then re-opened.
•
The user/browser makes no requests to the Internet for two (2) hours. (In
practice, this never happens.)
Method Pros and Cons
Pros
Any computer can access the Internet as long as they have an entry in the ComSifter Username Database.
No software needs to be installed on client computers.
Cons
User must enter username and password any time the browser is opened
Client applications (OS, anti-virus updates) will need to be added to the Client Program/Application Bypass
List.
This method is a two-stage process, adding a small amount of traffic overhead to the network.
Summary of Contents for CS-8D Pro
Page 1: ...ComSifter protect web users now User Guide Model CS 8D Pro Version March 26 2012 0326121500 ...
Page 153: ...F I L T E R S E T U P User Guide ComSifter CS 8D Pro 4 23 Figure 4 19 Modify Page RegEx ...
Page 194: ...U S E R S User Guide ComSifter CS 8D Pro 6 28 Figure 6 19 Windows Firewall ...
Page 215: ...U S E R S User Guide ComSifter CS 8D Pro 6 49 Figure 6 40 Add User ...
Page 219: ...U S E R S User Guide ComSifter CS 8D Pro 6 53 Figure 6 43 Add IP ...