Need to Restrict Internet Access in a Workgroup
Need to Restrict Internet Access in a Workgroup
Hey everyone, I'm looking for a suggestion on following scenario in my client's office.
Workgroup of 13 workstation (11 xp machines , 2 Vista) and 1 Win 2K3 server.
Sonicwall TZ 170 Standard OS
Trend Micro Client / Server Security Suite.
2 Networked Oki printers
Basically, the client would like to completely restrict Internet access for ONLY 4 people in the workgroup. I've though about implementing content filtering, but from what i've seen, it only allows to filter out various category of websites, not block internet access completely.
Is there a way/solution to completely block Internet access for specific PCs in a workgroup without affecting access to other network resources?
Your input is much appreciated.
Regards,
TB
Workgroup of 13 workstation (11 xp machines , 2 Vista) and 1 Win 2K3 server.
Sonicwall TZ 170 Standard OS
Trend Micro Client / Server Security Suite.
2 Networked Oki printers
Basically, the client would like to completely restrict Internet access for ONLY 4 people in the workgroup. I've though about implementing content filtering, but from what i've seen, it only allows to filter out various category of websites, not block internet access completely.
Is there a way/solution to completely block Internet access for specific PCs in a workgroup without affecting access to other network resources?
Your input is much appreciated.
Regards,
TB
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
Access to all local network resources...yes. The gateway just tells a computer how to get to a different network (such as the Internet).
Now..for your Trend Micro updates...I'm assuming you have a main server which runs centralized antivirus management on your network. If so..yes..it'll still get updates from this local servers mirror. If you're talking about workstations still gettiing updates from Trend Micros internet based public servers..then no.
Now..for your Trend Micro updates...I'm assuming you have a main server which runs centralized antivirus management on your network. If so..yes..it'll still get updates from this local servers mirror. If you're talking about workstations still gettiing updates from Trend Micros internet based public servers..then no.
MORNING WOOD Lumber Company
Guinness for Strength!!!
Guinness for Strength!!!
Well, it is a centralized server but I’m actually using an older box (Win2k SVR -which was previously the DB sever as the Virus Server console.
So basically, the workstations are not looking at the same machine for Database access and virus definition updates. I assume that would be a problem, right ?
So basically, the workstations are not looking at the same machine for Database access and virus definition updates. I assume that would be a problem, right ?
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
If this antivirus update server is still on your local network...no problem Removing the gateway entry only takes away the ability of the workstations to get to the internet...to "leave" your local area network. Think of the gateway as an onramp to the internet highway for all computers on your network. Without this onramp..they're stuck on your network...can't get out.TeddyTed wrote:Well, it is a centralized server but I’m actually using an older box (Win2k SVR -which was previously the DB sever as the Virus Server console.
So basically, the workstations are not looking at the same machine for Database access and virus definition updates. I assume that would be a problem, right ?
MORNING WOOD Lumber Company
Guinness for Strength!!!
Guinness for Strength!!!
YOSTC, I went with your suggestion and all looks well except, now I’m not able to connect to those workstations via remote desktop because they're outside the DHCP scope on the TZ 170. I typically connect to the Antivirus security server and then connect to workstations on the network.
Looks like that's going to be the trade off.
Thanks,
TB
Looks like that's going to be the trade off.
Thanks,
TB
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
That's not making sense...it's still the same subnet, example..if you Sonicwall is 192.168.1.1, the rest of your network is 192.168.1.xxx.....the workstations getting IP starting at say...192.168.1.100, the server of course static....at something like 192.168.1.10, you don't run DNS on the server..so you can use your Sonicwall for that..192.168.1.1, would also be the gateway. So do these 4x rigs at something outside the DHCP pool..like 192.168.1.20, 192.168.1.21, etc. Subnet mask on all something like 255.255.255.0
MORNING WOOD Lumber Company
Guinness for Strength!!!
Guinness for Strength!!!