This articles talks about the different options for setting up user identification in the Smoothwall Filter and Firewall.
There are a range of different authentication and identification systems available in the Smoothwall, but which is the best for my needs?
Although we are unable to advise categorically on the best identification method for your circumstance, this table may give a guide as to the options you can consider for different circumstances:
|Type of device||Type of use||I want to….||Recommended solution|
|Chromebook||Given to students or users and taken home||….filter users seamlessly on or off site||Cloud Filter|
|Bring your own device (BYOD)||Phones, tablets, personal laptop||….let users use their own devices in my organization||BYOD (RADIUS/802.1x)|
Desktop or laptop which doesn't leave your network
Used on and off site
|….trust the Active Directoy logs to identify my users||IDex Agent|
|….filter users seamlessly on or off site||Cloud Filter|
|Communal work-rooms||Studies or libraries which are static on site and have regular user changes||….know the individual username||Idex Agent if Windows worksations|
|Communal work-rooms||Studies or libraries which are static on site and have regular user changes||….let users be filtered with core filtering policies, without their individual username||No Authentication|