Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1819
  • Last Modified:

Transparent proxy with authentication

Hello everyone,
Can someone advice me the best way to setup a Transparent proxy with authentication or something like it??
Thanks...
0
godwindotnet
Asked:
godwindotnet
  • 4
  • 3
  • 2
4 Solutions
 
grimkinCommented:
Hi,

Have you already got a firewall that you want to run a proxy with? Or are you looking to implement both firewall and proxy?

Your cheapest option would be to install a linux OS like CentOS on a box with at least 2 network cards and implement this as your firewall - easy to set up as per http://www.linuxmail.info/firewall-configuration-centos-5/

There are planty of howtos on the net on how to set up squid (good open source proxy) with linux e.g. http://www.cyberciti.biz/tips/linux-setup-transparent-proxy-squid-howto.html

If this is not what you're looking for then we need a bit more info ..

Hope this helps!

G
0
 
godwindotnetAuthor Commented:
Hello,
Thanks for those links...

I've tried a couple of firewalls windows and linux based ones...
ISA server,Kerio Winroute and Endian firewall.

But,what I exactly need is this...
Whenever a user on the LAN starts to browse,he should be redirected to a webpage requesting for credentials to maintain records.(This is something like what is in most wifi hotspots).
I need an exact implementation.
Endian firewall has it...but not in the free version unfortunately :(
So,what would be my next best option?
Thanks so much
0
 
Pete LongConsultantCommented:
Websense and N2H2 Are supported with Cisco PIX/ASA to perform this function
0
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

 
grimkinCommented:
Squid will do this for you, check out this link for going from basic setup to authenticating users: http://www.brennan.id.au/11-Squid_Web_Proxy.htm
0
 
godwindotnetAuthor Commented:
even Endian firewall uses squid....
But then I thought squid does not support transparent proxy with authentication?

Websense is cool....but then unfortunately its not free :-(
I'm looking for some open source stuff to manage the network users.
0
 
godwindotnetAuthor Commented:
Thanks for the time...The ultimate solution was zeroshell.
0
 
godwindotnetAuthor Commented:
The solution was in pfsense,monowall and zeroshell out of which I chose zeroshell for my implementation.

SQUID is just too low level i feel as I'm new to using Linux ...and I think SQUID is only commandline based...?

I assume most of these Firewall Linux distro's use SQUID underneath

Thanks anyway
0
 
Pete LongConsultantCommented:
Thanq
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

  • 4
  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now