Hi
I had a very similar problem to solve at work myself.
The recommendation I finally came up with to meet the business needs of...
1) Content filtering
2) Logging of Internet activity
3) Improved usage of Internet bandwidth
So we used...
1) PIX 520 UR with fail-over
2) WebSense content filtering
3) And add a cache engine using WCCP
4) Added a Private I syslog server/analyzer for detailed usage reports
If I also had the need to do authentication against an NT domain I would
have also added Cisco Secure ACS and had it use the NT SAM as it's database.
I guess you could also use the MS RADUIS server to authenticate against the
domain, but I have never used this so I can not guarantee that it will work.
HTH
--
John Hardman CCNP MCSE
""Raees Ahmed Shaikh"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi all,
>
> I just need some of the recommendations to install a PIX box 525 in our
> network, currently we have MS proxy in our network, Should I replace proxy
> with the PIX, or use two level of defense, comprising of PIX&Proxy. We
have
> some application level url filtering software running on that proxy as
well.
> Moreover the MS-proxy is using the NT Domain Security Model and thus using
> cut-through proxy feature, can that security be available if I go on, with
> PIX. Without the Ms-proxy is it possible to use the same NT database for
> cut-through authentication.
>
> Some helpful tips please which will help me in the designing process.
>
> Thanks in advance and Best Regards,
>
> Shaikh Raees,
>
> CCNP,CCNA,CCDA,MCSE,MCP,CNE,CCIE Written.
>
> [GroupStudy.com removed an attachment of type image/jpeg which had a name
of
> Glacier Bkgrd.jpg]
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=11339&t=11336
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]