?
Solved

how to block non domain user to access internet

Posted on 2015-01-16
3
Medium Priority
?
833 Views
Last Modified: 2015-01-22
hi,

We have windows server 2003 domain network with few window 7 and 8 desktop and laptop. few of our user use to bring there personal laptop in office and connect to office LAN and access the internet. we want to restrict access of internet to personal laptop.

Regards
Aditya
0
Comment
Question by:Aditya Arora
3 Comments
 
LVL 4

Expert Comment

by:Monika Bharti
ID: 40554942
There are different ways of tackling this:

1. Disable unused ports (which should obviously be the first line of defense).

2. Using port security on your switch makes it at least necessary that an attacker finds out a certain MAC address and connects to a specific port, which will stop most people from plugging their home devices into the company network. In addition to this you may activate a "suspend" mode for ports: The 1st time an invalid MAC address is detected on a port it will shut down and has to be reactivated manually by an admin.

3. Radius would obviously the most fitting solution for your problem. You can configure your Windows DC as a radius authentication server and then have your switches forward the authentications request using 802.1X. The result would be that anybody trying to access the network would have to enter their username and pw used on the DC. If it is not correct they will be isolated in a separate restrictive VLAN. Disadvantage: You need hardware that supports 802.1X and have to understand VLAN concepts. I will not go into details of RADIUS here. If you are interested feel free to ask.

If you want to get more information about Radius then go through this link:

http://technet.microsoft.com/en-us/library/cc302562.aspx
0
 
LVL 59

Assisted Solution

by:McKnife
McKnife earned 1000 total points
ID: 40555089
Normally, companies would only permit internet access via a proxy server and at that server, you would use ACLs to permit only (certain) domain users. Don't you use a proxy server?
Domain users can be limited to certain devices through the logon workstation list, so you have all the powers.
0
 
LVL 72

Accepted Solution

by:
Qlemo earned 1000 total points
ID: 40555327
A proxy won't protect against well-known and Internet-enabled users, unless it requires domain authentication (instead of prompting for credentials). If you know the creds, you type them in ...

A simple "filter" is to provide a distinct DHCP IP address pool - which is only used for non-domain PCs. "Regular" PCs have to be in a different IP address range, either with a specific DHCP pool and configuring a DHCP class on each client, or manually by using DHCP reservations (based on MAC address), or with static addresses (not using DHCP).
Then the Internet gateway can filter on LAN IP address, only allowing the well-known IP address range to go out. Not very safe, though, but will stop most users.
0

Featured Post

Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question