Solved

bypass problem

Posted on 2000-04-07
8
255 Views
Last Modified: 2010-04-11
hi
there is a small problem suppose some one could sort it out.
in our LAN we have 25 nodes, 3 servers and a router and all are connected in a star topology. some of the users are bypassing proxyserver by using netscape nevigator and directly connecting to the internet .is there any way to stop it.
regards
sanjib234
0
Comment
Question by:sanjib234
8 Comments
 
LVL 23

Expert Comment

by:slink9
ID: 2693046
I know you can customize IE using the Microsoft IEAK so that you control the settings and the functionality that the user has.  Is there something like this available for Navigator?
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 2694021
The only thing I can think of is by using default User or machine profiles for your users. This should work with NT and W9x workstations.
This will work in a Domain or workgroup, but in a workgroup, you may have to setup the profile on each machine, and not centrally.
You are going to need to read up on USER profiles for NT.
I hope this helps.
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2694240
You stop it by changing the router config so that it will only accept traffic destined for the Internet from the proxy server(s). Anything you try to on the clients can be undone by a clever user.
0
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

 
LVL 3

Expert Comment

by:apadua
ID: 2696131
Jlevie has a good solution.

Another one, however, would fix your woes and also improve security.

Add a second card to your proxy server, and connect it directly to the router (and remove the router from the star). Now, only the proxy server has access to your router, and anyone on the internal network will HAVE TO go through it to access the Internet. Also, any potential hackers will find a proxy server between him and your users, improving a bit on security (At least those trojans won't work).

Good luck,


Andre
0
 
LVL 2

Accepted Solution

by:
pheur earned 100 total points
ID: 2707745
Configure the router so that only the proxy has internet access. Also you can allow clients to use only some protocols (e.g. telnet, IRC) if you wish. On most routers you can also allow only outgoing connections.
0
 
LVL 3

Expert Comment

by:apadua
ID: 2707999
pheur,

You answered exactly like jlevie. Please change your answer to a comment; he got here first :-)

Cheers,

Andre
0
 
LVL 3

Expert Comment

by:apadua
ID: 2708000
pheur,

You answered exactly like jlevie. Please change your answer to a comment; he got here first :-)

Cheers,

Andre
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2708303
Yeah, he's a newbie and seems to be just going to lots of questions, some active & some not so active and dropping a proposed answer on them (frequently just restating a pervious comment).
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco switch suggestion 5 66
VMware ESXi vswitch - performance question 2 81
Slow Internet Connection 9 57
Hidden network 2 10
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question