Rob,

Look at this link:

http://www.surfcontrol.com/products/superscout_for_business/super_scout/inde
x.html

This package works together with MS Proxy and/or Checkpoint FW 1.

Great package with lot's of features

Greets

/B

> -----Original Message-----
> From: Rob Scott [SMTP:[EMAIL PROTECTED]]
> Sent: maandag 6 november 2000 21:07
> To:   [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject:      Selective blocking from inside nets to Internet?
> 
> Greetings,
> 
> I would like to ask for the expertise of this list regarding a matter of 
> selective blocking of traffic from inside a company to the 
> Internet.  Specific tools that we have or will soon have in place are 
> Checkpoint Firewall-1, Checkpoint Meta-IP for internal DNS (and user to 
> machine association via LDAP database), and a new tool called the 
> R-2000/XStop site blocking appliance from Logon Data.
> 
> Our highest level officers have decided on a stated policy course that is 
> at odds with what many of the departments think is effective business 
> practice (I tend to agree simply from a network management business 
> case).  I work at a company that has a large number of field offices 
> staffed by customer service agents and other hourly-paid service personnel
> 
> with very specific job tasks that require localized application access,
> and 
> we have four large call centers that also require specific application 
> access.  Our CEO has declared that we will provide Internet access for 
> everyone, but this makes life very difficult at the call centers and 
> customer service counters where the managers want the employees to be
> doing 
> their work rather than surfing the net.
> 
> Selective firewall blocking based on subnets will not work, 
> unfortunately.  The remote sites have too many exceptions (this manager 
> needs full access, that supervisor, etc...) and the rule housekeeping
> would 
> be a huge problem.
> 
> Using the Meta-IP product we will soon be able to associate a user with a 
> given (DHCP addressed) workstation for the duration of their login session
> 
> and store the resulting data in an LDAP database.  Supposedly Checkpoint 
> have integrated the ability of FW-1 to query this LDAP database to allow
> us 
> selective permissions through the firewall based on user names and/or NT 
> permission groups.  Unfortunately, our firewall VAR has no experience with
> 
> doing this sort of thing, and in fact it seems that few in business today 
> are doing such selective blocking of Internet access (with most it seems
> to 
> be an all or nothing proposition).
> 
> Would anyone out this audience care to propose or discuss any models of 
> selective blocking other than that provided by Checkpoint?  Has anyone 
> specifically validated the Checkpoint model of selective blocking in 
> practice, and if so what were the hard spots if any?
> 
> I'm open to all ideas and I hope that this question initiates a discussion
> 
> thread on this list.  I've inherited this selective blocking mess and your
> 
> contributions to my knowledge base are very much appreciated.
> 
> 
> Cheers.
> Rob
> 
>            Take chances, Get messy, Make mistakes.  (Miss Frizzle)
>                     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
>                      Rob Scott, mailto:[EMAIL PROTECTED]
>         Langley, Washington on Whidbey Island (a suburb with a moat)
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to