Solved

proxy setting  require

Posted on 2006-07-17
5
194 Views
Last Modified: 2013-12-04
Proxy setup required by customer is as follows.
Content security: Control access to websites
The software should allow you to selectively block and allow websites on your network.
Restricted words:
Software should allow you to specify restricted words and phrases like: porn, xxx,sex etc. and add them to the restricted words list. Access to any URL or page, that has these words, should automatically be blocked.

The software should also be intelligent enough, not to block or flag educational or medical sites.


List of banned sites:
Software should allow you to add URLs of banned sites. Access to these sites is immediately blocked. Some notorious sites like www.hustler.com, www.playboy.com, etc. do not change their names. Such known sites need to be blocked outright.

Banned IP:
Websites can be accessed by entering the IP (Internet Protocol) number. The software should be able to translate the IP number to its website name and block access if it contains restricted words or is on the banned list.

For e.g. www.sex-circus.com can be accessed through its IP, http://198.63.10.71 when you use other Content Security software. Software's like Web and Mail Filter for Windows are intelligent enough to translate the IP to its URL and block it.

Filter Category:
The software should allow you to create category of filters for block and allow site. Sites related to the category can be listed there. For e.g. Pornography Category will have sites related to porn and all sites for this category are blocked. It should be possible to add or remove sites from block and allow category with a mouse click. Websites under business category should be allowed. Websites under non business category should not be allowed like rediffmail.com,hotmail.com etc.

Control remote file modification Block Spammer's e-mail ID and issue warnings and notifications

0
Comment
Question by:Farooque81
  • 3
5 Comments
 
LVL 12

Accepted Solution

by:
Phil_Agcaoili earned 250 total points
ID: 17122643
I suggest looking at a gateway solution like Websense or N2H2 that you can place on your network and use as a proxy (as you are requesting) in order for users to get Internet access.

Here's a site with a current and accurate list of content filtering solutions: http://www.timberlinetechnologies.com/products/contentfilt.html

If you are looking to provide filtering on the systems themselves, I suggest looking at CyberPatrol and Cybersitter.

Most, if not all, of these solution protect from banned sites, banned IPs, and provide a range of filtering categories.
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
ID: 17122662
I forgot to mention that N2H2 is now called Secure Computing SmartFilter.
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
ID: 17122681
Here's also a nice article on how to evaluate Web filtering technology:
http://www.isoc.org/inet2000/cdproceedings/8k/8k_5.htm
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IT Asset Management 5 81
Securing a laptop that travels frequently 21 87
Automatic dictation/transcribing software 9 35
Application Crash 2 23
I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question