Solved

bypass problem

Posted on 2000-04-07
8
257 Views
Last Modified: 2010-04-11
hi
there is a small problem suppose some one could sort it out.
in our LAN we have 25 nodes, 3 servers and a router and all are connected in a star topology. some of the users are bypassing proxyserver by using netscape nevigator and directly connecting to the internet .is there any way to stop it.
regards
sanjib234
0
Comment
Question by:sanjib234
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 23

Expert Comment

by:slink9
ID: 2693046
I know you can customize IE using the Microsoft IEAK so that you control the settings and the functionality that the user has.  Is there something like this available for Navigator?
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 2694021
The only thing I can think of is by using default User or machine profiles for your users. This should work with NT and W9x workstations.
This will work in a Domain or workgroup, but in a workgroup, you may have to setup the profile on each machine, and not centrally.
You are going to need to read up on USER profiles for NT.
I hope this helps.
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2694240
You stop it by changing the router config so that it will only accept traffic destined for the Internet from the proxy server(s). Anything you try to on the clients can be undone by a clever user.
0
Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

 
LVL 3

Expert Comment

by:apadua
ID: 2696131
Jlevie has a good solution.

Another one, however, would fix your woes and also improve security.

Add a second card to your proxy server, and connect it directly to the router (and remove the router from the star). Now, only the proxy server has access to your router, and anyone on the internal network will HAVE TO go through it to access the Internet. Also, any potential hackers will find a proxy server between him and your users, improving a bit on security (At least those trojans won't work).

Good luck,


Andre
0
 
LVL 2

Accepted Solution

by:
pheur earned 100 total points
ID: 2707745
Configure the router so that only the proxy has internet access. Also you can allow clients to use only some protocols (e.g. telnet, IRC) if you wish. On most routers you can also allow only outgoing connections.
0
 
LVL 3

Expert Comment

by:apadua
ID: 2707999
pheur,

You answered exactly like jlevie. Please change your answer to a comment; he got here first :-)

Cheers,

Andre
0
 
LVL 3

Expert Comment

by:apadua
ID: 2708000
pheur,

You answered exactly like jlevie. Please change your answer to a comment; he got here first :-)

Cheers,

Andre
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2708303
Yeah, he's a newbie and seems to be just going to lots of questions, some active & some not so active and dropping a proposed answer on them (frequently just restating a pervious comment).
0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question