
C O M S I F T E R O P E R A T I O N
User Guide |
ComSifter CS-8D Pro
7–2
Network Flow
1. Client/User requests a web site (
Path 1
).
2. ComSifter queries Client/User for identification (username) (
Path 4
).
3. Identd on Client/User responds with username (
Path 1
).
4. ComSifter looks up username in database and determines filter to be applied to page.
5. ComSifter checks internal cache for page. If locally cached, ComSifter goes to step 8.
6. If not locally cached, ComSifter requests page from Internet (
Path 2
).
7. Page is retrieved from Internet (
Path 3
).
8. If clean, ComSifter serves page to Client/User (
Path 4
). If not clean, ComSifter sends "Access Denied"
page (
Path 4
).
How ComSifter Filters
Two levels of filtering insure that ComSifter will stop inappropriate content:
1. ComSifter first checks the requested domain/URL against its Exception IP List to see if the site is
excepted.
2. Next ComSifter checks the domain/URL against it Exception Site list to see if it is excepted.
3. Next ComSifter checks the domain/URL against its blacklist. The list has over 500,000 entries—
categorized by content.
4. ComSifter then loads the complete page into memory and scans every word on the page. It then applies
the CSphrase Filter Technology to determine if the page is acceptable or not.
5. If acceptable, the page is sent to the requesting computer.
6. If the page is deemed unacceptable, the “Access Denied” page is sent to the requesting computer.
Order of Precedence
Following is the Order of Precedence ComSifter uses when filtering. ComSifter will process the first rule that
matches. Once a rule has matched ComSifter stops rule processing.
An example would be a download ban of all EXE files. EXE would be entered in the appropriate Banned
Extension List. However, you would like to allow users to download from a trusted site. If that site were placed
in the Exception Site List then the rule would stop when it matched in the Exception Site List.
1. Bypass Computer
2. Bypass User
3. Hours of Operation
4. Full Exception Domain List
5. Full Exception URL List
6. Blanket Block
7. Blocked
Computer
8. Blocked
User
9. Banned URL List
10. Blanket IP Block
11. Banned Domain List
12. Banned MIME List
13. Banned Extension List
14. CSphrase Filter Exception Words/Phrases
15. CSphrase Filter Banned Words/Phrases
16. CSphrase Filter Weighted Words/Phrases
Содержание CS-8D Pro
Страница 1: ...ComSifter protect web users now User Guide Model CS 8D Pro Version March 26 2012 0326121500 ...
Страница 153: ...F I L T E R S E T U P User Guide ComSifter CS 8D Pro 4 23 Figure 4 19 Modify Page RegEx ...
Страница 178: ...U S E R S User Guide ComSifter CS 8D Pro 6 12 User Management Utilities Figure 6 14 User List Management ...
Страница 194: ...U S E R S User Guide ComSifter CS 8D Pro 6 28 Figure 6 19 Windows Firewall ...
Страница 215: ...U S E R S User Guide ComSifter CS 8D Pro 6 49 Figure 6 40 Add User ...
Страница 219: ...U S E R S User Guide ComSifter CS 8D Pro 6 53 Figure 6 43 Add IP ...
Страница 227: ...U S E R S User Guide ComSifter CS 8D Pro 6 61 Figure 6 51 Delete a Domain URL to the Client Program Application Bypass ...
Страница 229: ...U S E R S User Guide ComSifter CS 8D Pro 6 63 Figure 6 53 Turning off Merge with Comsift Maintained Bypass List ...
Страница 231: ...U S E R S User Guide ComSifter CS 8D Pro 6 65 Figure 6 55 Turning off Merge with Exception Domain List ...