Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


How to "isolate" a PC on the network

Posted on 2005-03-16
Medium Priority
Last Modified: 2013-12-04
I need to keep one PC on our network isolated somehow.  It's in a doctor's lounge in the hospital.  Office politics being what they are, the doctors are allowed unrestricted use of the internet, using Internet Explorer (because their stock ticker streaming broadcast doesn't work right under Firefox!).  I know it's a big security hole, but I've been told that no restrictions are to be put on it.  Right now they log on to the domain and are a part of the network (Windows 2000 domain).  They don't need to access anything on the domain such as files or printers (though I won't be surprised if they ask for that in the future).  
Is there any way to keep their system "isolated" or quarantined somehow so that whatever problems they might bring onto their system (viruses, spyware, etc) don't compromise the security of the rest of the network? An individual firewall or something that keeps "them" separate from "us"?


Question by:maharlika
  • 3
  • 2
LVL 25

Accepted Solution

mikeleebrla earned 500 total points
ID: 13556754
1. remove this machine from the domain
2.  have them log in with a local account.
3. ideally this one computer should be connected to its own ISP connection and connect TOTALLY serperate from the existing LAN

if 3 isn't an option put this one computer on its own segment of the router/firewall and dont allow ANY traffic to go from this computer to the rest of the lan.
LVL 15

Assisted Solution

wingatesl earned 500 total points
ID: 13560502
Definately remove it from the domain, make  local account. Give the computer a static ip address. on that computer, change the route for your network say to a nonexistent ipand giv e it a metric of 1. the computer will have no clue how to route any traffice on the inside network

Author Comment

ID: 13566739

this sounds like what I want to do;  please explain how to do this:
How do I change the route for the network to a non-existent IP and still have it be able to access the internet?  ALso, what is meant by "give it a metric of 1"?  Are these steps done in the TCP/IP settings?

Thank you.
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

LVL 25

Expert Comment

ID: 13566832
he is talking about using the route add command:  see below:

LVL 15

Expert Comment

ID: 13567604
you would use the command "route add mask metric 1
                                                                            ^   internal netword                                 ^non existent ip
the reason you can still access the internet is because the default gateway is still there. we are just saying" to connect to the internal network we have to route through this non existent computer/router/whatever

LVL 25

Expert Comment

ID: 13567662
you would also want to add the "-p" switch to it to make it a persistant route so it wouldn't go away after each reboot.

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Is your OST file inaccessible, Need to transfer OST file from one computer to another? Want to convert OST file to PST? If the answer to any of the above question is yes, then look no further. With the help of Stellar OST to PST Converter, you can e…
Suggested Courses
Course of the Month11 days, 4 hours left to enroll

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question