?
Solved

Transparent proxy with authentication

Posted on 2008-10-31
9
Medium Priority
?
1,800 Views
Last Modified: 2013-11-16
Hello everyone,
Can someone advice me the best way to setup a Transparent proxy with authentication or something like it??
Thanks...
0
Comment
Question by:godwindotnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
9 Comments
 
LVL 14

Assisted Solution

by:grimkin
grimkin earned 1200 total points
ID: 22848417
Hi,

Have you already got a firewall that you want to run a proxy with? Or are you looking to implement both firewall and proxy?

Your cheapest option would be to install a linux OS like CentOS on a box with at least 2 network cards and implement this as your firewall - easy to set up as per http://www.linuxmail.info/firewall-configuration-centos-5/

There are planty of howtos on the net on how to set up squid (good open source proxy) with linux e.g. http://www.cyberciti.biz/tips/linux-setup-transparent-proxy-squid-howto.html

If this is not what you're looking for then we need a bit more info ..

Hope this helps!

G
0
 

Author Comment

by:godwindotnet
ID: 22848451
Hello,
Thanks for those links...

I've tried a couple of firewalls windows and linux based ones...
ISA server,Kerio Winroute and Endian firewall.

But,what I exactly need is this...
Whenever a user on the LAN starts to browse,he should be redirected to a webpage requesting for credentials to maintain records.(This is something like what is in most wifi hotspots).
I need an exact implementation.
Endian firewall has it...but not in the free version unfortunately :(
So,what would be my next best option?
Thanks so much
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 300 total points
ID: 22848480
Websense and N2H2 Are supported with Cisco PIX/ASA to perform this function
0
Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

 
LVL 14

Assisted Solution

by:grimkin
grimkin earned 1200 total points
ID: 22848489
Squid will do this for you, check out this link for going from basic setup to authenticating users: http://www.brennan.id.au/11-Squid_Web_Proxy.htm
0
 
LVL 14

Accepted Solution

by:
grimkin earned 1200 total points
ID: 22848493
0
 

Author Comment

by:godwindotnet
ID: 22848542
even Endian firewall uses squid....
But then I thought squid does not support transparent proxy with authentication?

Websense is cool....but then unfortunately its not free :-(
I'm looking for some open source stuff to manage the network users.
0
 

Author Closing Comment

by:godwindotnet
ID: 31511961
Thanks for the time...The ultimate solution was zeroshell.
0
 

Author Comment

by:godwindotnet
ID: 22864573
The solution was in pfsense,monowall and zeroshell out of which I chose zeroshell for my implementation.

SQUID is just too low level i feel as I'm new to using Linux ...and I think SQUID is only commandline based...?

I assume most of these Firewall Linux distro's use SQUID underneath

Thanks anyway
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 22886458
Thanq
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question