Solved

Transparent proxy with authentication

Posted on 2008-10-31
9
1,777 Views
Last Modified: 2013-11-16
Hello everyone,
Can someone advice me the best way to setup a Transparent proxy with authentication or something like it??
Thanks...
0
Comment
Question by:godwindotnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
9 Comments
 
LVL 14

Assisted Solution

by:grimkin
grimkin earned 400 total points
ID: 22848417
Hi,

Have you already got a firewall that you want to run a proxy with? Or are you looking to implement both firewall and proxy?

Your cheapest option would be to install a linux OS like CentOS on a box with at least 2 network cards and implement this as your firewall - easy to set up as per http://www.linuxmail.info/firewall-configuration-centos-5/

There are planty of howtos on the net on how to set up squid (good open source proxy) with linux e.g. http://www.cyberciti.biz/tips/linux-setup-transparent-proxy-squid-howto.html

If this is not what you're looking for then we need a bit more info ..

Hope this helps!

G
0
 

Author Comment

by:godwindotnet
ID: 22848451
Hello,
Thanks for those links...

I've tried a couple of firewalls windows and linux based ones...
ISA server,Kerio Winroute and Endian firewall.

But,what I exactly need is this...
Whenever a user on the LAN starts to browse,he should be redirected to a webpage requesting for credentials to maintain records.(This is something like what is in most wifi hotspots).
I need an exact implementation.
Endian firewall has it...but not in the free version unfortunately :(
So,what would be my next best option?
Thanks so much
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 100 total points
ID: 22848480
Websense and N2H2 Are supported with Cisco PIX/ASA to perform this function
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 14

Assisted Solution

by:grimkin
grimkin earned 400 total points
ID: 22848489
Squid will do this for you, check out this link for going from basic setup to authenticating users: http://www.brennan.id.au/11-Squid_Web_Proxy.htm
0
 
LVL 14

Accepted Solution

by:
grimkin earned 400 total points
ID: 22848493
0
 

Author Comment

by:godwindotnet
ID: 22848542
even Endian firewall uses squid....
But then I thought squid does not support transparent proxy with authentication?

Websense is cool....but then unfortunately its not free :-(
I'm looking for some open source stuff to manage the network users.
0
 

Author Closing Comment

by:godwindotnet
ID: 31511961
Thanks for the time...The ultimate solution was zeroshell.
0
 

Author Comment

by:godwindotnet
ID: 22864573
The solution was in pfsense,monowall and zeroshell out of which I chose zeroshell for my implementation.

SQUID is just too low level i feel as I'm new to using Linux ...and I think SQUID is only commandline based...?

I assume most of these Firewall Linux distro's use SQUID underneath

Thanks anyway
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 22886458
Thanq
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco ASA VPN Client Routing 8 58
Internet link load balancer 6 87
Deny permission ACL 16 44
Windows 2012 R2 HP Proliant 110 Gen9 multiple vlans on one NIC? 11 44
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question