Solved

proxy setting  require

Posted on 2006-07-17
5
192 Views
Last Modified: 2013-12-04
Proxy setup required by customer is as follows.
Content security: Control access to websites
The software should allow you to selectively block and allow websites on your network.
Restricted words:
Software should allow you to specify restricted words and phrases like: porn, xxx,sex etc. and add them to the restricted words list. Access to any URL or page, that has these words, should automatically be blocked.

The software should also be intelligent enough, not to block or flag educational or medical sites.


List of banned sites:
Software should allow you to add URLs of banned sites. Access to these sites is immediately blocked. Some notorious sites like www.hustler.com, www.playboy.com, etc. do not change their names. Such known sites need to be blocked outright.

Banned IP:
Websites can be accessed by entering the IP (Internet Protocol) number. The software should be able to translate the IP number to its website name and block access if it contains restricted words or is on the banned list.

For e.g. www.sex-circus.com can be accessed through its IP, http://198.63.10.71 when you use other Content Security software. Software's like Web and Mail Filter for Windows are intelligent enough to translate the IP to its URL and block it.

Filter Category:
The software should allow you to create category of filters for block and allow site. Sites related to the category can be listed there. For e.g. Pornography Category will have sites related to porn and all sites for this category are blocked. It should be possible to add or remove sites from block and allow category with a mouse click. Websites under business category should be allowed. Websites under non business category should not be allowed like rediffmail.com,hotmail.com etc.

Control remote file modification Block Spammer's e-mail ID and issue warnings and notifications

0
Comment
Question by:Farooque81
  • 3
5 Comments
 
LVL 12

Accepted Solution

by:
Phil_Agcaoili earned 250 total points
ID: 17122643
I suggest looking at a gateway solution like Websense or N2H2 that you can place on your network and use as a proxy (as you are requesting) in order for users to get Internet access.

Here's a site with a current and accurate list of content filtering solutions: http://www.timberlinetechnologies.com/products/contentfilt.html

If you are looking to provide filtering on the systems themselves, I suggest looking at CyberPatrol and Cybersitter.

Most, if not all, of these solution protect from banned sites, banned IPs, and provide a range of filtering categories.
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
ID: 17122662
I forgot to mention that N2H2 is now called Secure Computing SmartFilter.
0
 
LVL 12

Expert Comment

by:Phil_Agcaoili
ID: 17122681
Here's also a nice article on how to evaluate Web filtering technology:
http://www.isoc.org/inet2000/cdproceedings/8k/8k_5.htm
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Dropbox 3 72
Backup and restore to dissimilar hardware 7 82
software license audit 6 57
Allowing a local account for incoming Rdp but not outgoing Rdp 15 112
In our personal lives, we have well-designed consumer apps to delight us and make even the most complex transactions simple. Many enterprise applications, however, are a bit behind the times. For an enterprise app to be successful in today's tech wo…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Viewers will learn how to use the Hootsuite Dashboard.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now