Solved

User Persmission and Internet Access Control

Posted on 2004-03-20
1
192 Views
Last Modified: 2010-03-18
I have setup Win2K Server as a domain. The Win2k is connected to the Internet. It is also connected to a local network running XP Pro through a second NIC. I am conecting to the Interner through the Server, however, I don't use server authintication, instead I log In locally and then the machines are set with the right IP addresses etc. I am not using ICS and instead I am using NAT provided by Routing and Remote Access.
With this configuration, the XP users have unlimited access to the outside world (Internet). I want to limit the access to the Internet. How could I device a method to limit local "users" and NOT machines to have limited access to the Internet during a day; something similar to "logon hours" with server authintication? This raisied the issue of logging on which I don't know how to do and I want to learn with this configuration.

Thank you.
0
Comment
Question by:Zainal062797
1 Comment
 
LVL 9

Accepted Solution

by:
jamesreddy earned 250 total points
ID: 10641961
You could implement Internet Authentication Service which is fairly easy to setup in conjuntion with Routing and Remote Access.  This is a good paper on it that will provide you a lot of information on what you are suggesting.

http://www.microsoft.com/windows2000/techinfo/howitworks/communications/remoteaccess/ias.asp
0

Featured Post

Don't miss ATEN at NAB Show April 24-27!

Visit ATEN at NAB Show to learn how our "Seamlessly Entertaining" solutions deliver fast, precise video streaming without delays for the broadcasting and media environment. ATEN will showcase its 16x16 Modular Matrix Switch (VM1600) and KVM Over IP Solution (KE6900 series).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A brief overview to explain gateways, default gateways and static routes OR NO - you CANNOT have two default gateways on the same server, PC or other Windows-based network device. In simple terms a gateway is formed when a computer such as a serv…
FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question