Solved

Transparent proxy with authentication

Posted on 2008-10-31
9
1,781 Views
Last Modified: 2013-11-16
Hello everyone,
Can someone advice me the best way to setup a Transparent proxy with authentication or something like it??
Thanks...
0
Comment
Question by:godwindotnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
9 Comments
 
LVL 14

Assisted Solution

by:grimkin
grimkin earned 400 total points
ID: 22848417
Hi,

Have you already got a firewall that you want to run a proxy with? Or are you looking to implement both firewall and proxy?

Your cheapest option would be to install a linux OS like CentOS on a box with at least 2 network cards and implement this as your firewall - easy to set up as per http://www.linuxmail.info/firewall-configuration-centos-5/

There are planty of howtos on the net on how to set up squid (good open source proxy) with linux e.g. http://www.cyberciti.biz/tips/linux-setup-transparent-proxy-squid-howto.html

If this is not what you're looking for then we need a bit more info ..

Hope this helps!

G
0
 

Author Comment

by:godwindotnet
ID: 22848451
Hello,
Thanks for those links...

I've tried a couple of firewalls windows and linux based ones...
ISA server,Kerio Winroute and Endian firewall.

But,what I exactly need is this...
Whenever a user on the LAN starts to browse,he should be redirected to a webpage requesting for credentials to maintain records.(This is something like what is in most wifi hotspots).
I need an exact implementation.
Endian firewall has it...but not in the free version unfortunately :(
So,what would be my next best option?
Thanks so much
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 100 total points
ID: 22848480
Websense and N2H2 Are supported with Cisco PIX/ASA to perform this function
0
Defend Your Organization from The Greatest Threats

Looking to fill the gaps in your security? Bring together information from the network, endpoint and threat intelligence feeds to really see what's happening in your organization. Join the WatchGuardians in their adventures fighting cyber crime!

 
LVL 14

Assisted Solution

by:grimkin
grimkin earned 400 total points
ID: 22848489
Squid will do this for you, check out this link for going from basic setup to authenticating users: http://www.brennan.id.au/11-Squid_Web_Proxy.htm
0
 
LVL 14

Accepted Solution

by:
grimkin earned 400 total points
ID: 22848493
0
 

Author Comment

by:godwindotnet
ID: 22848542
even Endian firewall uses squid....
But then I thought squid does not support transparent proxy with authentication?

Websense is cool....but then unfortunately its not free :-(
I'm looking for some open source stuff to manage the network users.
0
 

Author Closing Comment

by:godwindotnet
ID: 31511961
Thanks for the time...The ultimate solution was zeroshell.
0
 

Author Comment

by:godwindotnet
ID: 22864573
The solution was in pfsense,monowall and zeroshell out of which I chose zeroshell for my implementation.

SQUID is just too low level i feel as I'm new to using Linux ...and I think SQUID is only commandline based...?

I assume most of these Firewall Linux distro's use SQUID underneath

Thanks anyway
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 22886458
Thanq
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question