On Wed, 20 Feb 2002, Matthew Palmer wrote:

> On Wed, 20 Feb 2002, Richard Hayes wrote:
> 
> > A organisation has public access terminals connected to a Telstra cable 
> > connection.  They use a Netgear router that  allocates a 192.168.0.x DHCP 
> > address on every client login.
> > 
> > There is no filtering on the services.
> > 
> > Using Squidguard (or similar) how can you enforce using the proxy?
> 
> You can't.  Unless you can stop connections to port 80 to addresses outside
> the local network, people can just connect to wherever they please.
> 
> Get rid of the Netgear router, and put a Linux firewall/router/DHCP server
> in there instead.  If you're really squeezed for machines (can't afford a
> 486?) then put the Squidguard machine in as the router.

But surely blocking outgoing port 80 is pretty much the requirement?

  eg:
     interface Telstra0
      access-group FORCE-PROXY out

     access-list FORCE-PROXY tcp permit eq 80 host web-proxy.example.com
     access-list FORCE-PROXY tcp deny eq http any
     access-list FORCE-PROXY ip permit any

Then people have to configure a proxy to get web access.

People can still run web traffic over other ports in this
scenario.  So if you want to be super-sure then deny
all outgoing traffic and proxy all application protocols
through the web proxy machine (eg: have a DNS and e-mail
forwarder).

This isn't particularly nice, as visitors need to configure
their machines.  See if Netgear support WCCP and set
up a transparent proxy.  With a kernel patch you can
configure Squid on Linux to be a WCCP transparent web proxy
server.

Regards,
Glen

-- 
Glen Turner                                 Network Engineer
 (08) 8303 3936      Australian Academic and Research Network
 [EMAIL PROTECTED]          http://www.aarnet.edu.au/
--
 The revolution will not be televised, it will be digitised

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to