Solved

Trying to Use Vyatta as Transparent Proxy

Posted on 2011-03-15
3
2,704 Views
Last Modified: 2012-05-11
Hello.

I am trying to set up a web filter on a network without modifying the addressing structure of my network. I would like to block workstations from accessing websites restricted by a Vyatta webproxy service. However, I do not want to manually configure the workstations.

In a test environment, I can use the Vyatta as a router and transparently perform url filtering and netflow statstics, however I can not wrap my head around how to make this work as a bridge. I have read the bridging is done at the network level but is there a way to simulate bridging using routing/NAT, etc. I would appreciate any help.

In the diagram, rtr address is 192.168.2.1
vyatta-transparent-filter.jpg
0
Comment
Question by:Hamptonite
3 Comments
 
LVL 11

Accepted Solution

by:
donmanrobb earned 500 total points
ID: 35153015
It's simple enough to setup a bridge on vyata, for example

vyatta@R1# set interfaces bridge br0 address 192.168.2.22/24
vyatta@R1# set interfaces ethernet eth0 bridge-group bridge br0
vyatta@R1# set interfaces ethernet eth1 bridge-group bridge br0
vyatta@R1# commit

Would bridge eth0 & eth1 and give it an IP
0
 
LVL 69

Expert Comment

by:Qlemo
ID: 35373068
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ISP Change 14 63
How to simulate latency? 5 40
When syspreping a clone machine 7 47
nested esxi, NIC issues 1 32
Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question