how to block non domain user to access internet

hi,

We have windows server 2003 domain network with few window 7 and 8 desktop and laptop. few of our user use to bring there personal laptop in office and connect to office LAN and access the internet. we want to restrict access of internet to personal laptop.

Regards
Aditya



There are different ways of tackling this:
1. Disable unused ports (which should obviously be the first line of defense).

2. Using port security on your switch makes it at least necessary that an attacker finds out a certain MAC address and connects to a specific port, which will stop most people from plugging their home devices into the company network. In addition to this you may activate a "suspend" mode for ports: The 1st time an invalid MAC address is detected on a port it will shut down and has to be reactivated manually by an admin.

3. Radius would obviously the most fitting solution for your problem. You can configure your Windows DC as a radius authentication server and then have your switches forward the authentications request using 802.1X. The result would be that anybody trying to access the network would have to enter their username and pw used on the DC. If it is not correct they will be isolated in a separate restrictive VLAN. Disadvantage: You need hardware that supports 802.1X and have to understand VLAN concepts. I will not go into details of RADIUS here. If you are interested feel free to ask.

If you want to get more information about Radius then go through this link:
http://technet.microsoft.com/en-us/library/cc302562.aspx



There are different ways of tackling this:
1. Disable unused ports (which should obviously be the first line of defense).

2. Using port security on your switch makes it at least necessary that an attacker finds out a certain MAC address and connects to a specific port, which will stop most people from plugging their home devices into the company network. In addition to this you may activate a "suspend" mode for ports: The 1st time an invalid MAC address is detected on a port it will shut down and has to be reactivated manually by an admin.

3. Radius would obviously the most fitting solution for your problem. You can configure your Windows DC as a radius authentication server and then have your switches forward the authentications request using 802.1X. The result would be that anybody trying to access the network would have to enter their username and pw used on the DC. If it is not correct they will be isolated in a separate restrictive VLAN. Disadvantage: You need hardware that supports 802.1X and have to understand VLAN concepts. I will not go into details of RADIUS here. If you are interested feel free to ask.

If you want to get more information about Radius then go through this link:
http://technet.microsoft.com/en-us/library/cc302562.aspx



Normally, companies would only permit internet access via a proxy server and at that server, you would use ACLs to permit only (certain) domain users. Don't you use a proxy server?
Domain users can be limited to certain devices through the logon workstation list, so you have all the powers.



A proxy won't protect against well-known and Internet-enabled users, unless it requires domain authentication (instead of prompting for credentials). If you know the creds, you type them in ...

A simple "filter" is to provide a distinct DHCP IP address pool - which is only used for non-domain PCs. "Regular" PCs have to be in a different IP address range, either with a specific DHCP pool and configuring a DHCP class on each client, or manually by using DHCP reservations (based on MAC address), or with static addresses (not using DHCP).
Then the Internet gateway can filter on LAN IP address, only allowing the well-known IP address range to go out. Not very safe, though, but will stop most users.





Share this

Related Posts

There was an error in this gadget