Solved

User Persmission and Internet Access Control

Posted on 2004-03-20
1
194 Views
Last Modified: 2010-03-18
I have setup Win2K Server as a domain. The Win2k is connected to the Internet. It is also connected to a local network running XP Pro through a second NIC. I am conecting to the Interner through the Server, however, I don't use server authintication, instead I log In locally and then the machines are set with the right IP addresses etc. I am not using ICS and instead I am using NAT provided by Routing and Remote Access.
With this configuration, the XP users have unlimited access to the outside world (Internet). I want to limit the access to the Internet. How could I device a method to limit local "users" and NOT machines to have limited access to the Internet during a day; something similar to "logon hours" with server authintication? This raisied the issue of logging on which I don't know how to do and I want to learn with this configuration.

Thank you.
0
Comment
Question by:Zainal062797
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
jamesreddy earned 250 total points
ID: 10641961
You could implement Internet Authentication Service which is fairly easy to setup in conjuntion with Routing and Remote Access.  This is a good paper on it that will provide you a lot of information on what you are suggesting.

http://www.microsoft.com/windows2000/techinfo/howitworks/communications/remoteaccess/ias.asp
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question