Brian Henning wrote:

The reason I don't want to use IP-based rules is that our problem users are probably resourceful enough to try resetting their IPs.

But yeah, I was already on that track; glad to have some encouraging suggestions. :-)

Thanks!
~B

So I'm like 5 days late in replying to this... but do you think they're not also resourceful enough to change their MAC addresses? You could do it by switch port if you're feeling particularly script-happy (and have basic managed switches), but what keeps them from plugging into a new switch port? If you're feeling like doing it right, use a managed switch and 802.1x to lock them into a separate VLAN, from which controlling access is a simple matter of only allowing http through squid from the subnet associated with that VLAN. Anything else just helps you sleep better at night, thinking you've actually achieved some controls they can't get around. But perhaps sleep or plausible deniability is all you're really after.

Aaron S. Joyner
--
TriLUG mailing list        : http://www.trilug.org/mailman/listinfo/trilug
TriLUG Organizational FAQ  : http://trilug.org/faq/
TriLUG Member Services FAQ : http://members.trilug.org/services_faq/

Reply via email to