Login information travels via Ethernet and/or Fiber optic cable to switch, then to server where Active Directory software verifies user and determines level of authorized access at the local (user) machine and network.
Users create content using software or peripheral devices.
User work is saved to storage folder on network
User sends Internet request (via sending URL)
Information is filtered by Cisco ASA 5510 Firewall and WebSense (for CIPA compliance) based on predefined access parameters.
Data is scanned by ESET malware protection
Information is viewed, downloaded, or displayed for educational use.