Security Basics mailing list archives
RE: Blocking Access to Non-domain computers
From: "DeGennaro, Gregory" <Gregory_DeGennaro () csaa com>
Date: Wed, 25 Aug 2004 07:14:18 -0700
You can use MAC filtering, however if you are really paranoid, you should use a CA server which can be extended to the network level using 802.1x. If you are not using Active Directory, you may want to migrate to AD and if you are paranoid, upgrade to Windows 2003 server and XP professional and take advantage of Ipsec Policy. http://www.microsoft.com/resources/documentation/WindowsServ/2003/all/de ployguide/en-us/Default.asp?url=/resources/documentation/WindowsServ/200 3/all/deployguide/en-us/dnsbj_ips_overview.asp It seems to work really nice and have heard many good things about ipsec policy. Of course, if you encrypt traffic and you use a NIDS, you will need to have man-in-middle devices to unencrypt and sniff the packets and re-encrypt or you will need a HIDS on all devices. Regards, Greg DeGennaro Jr., CISSP, CCNP Systems Engineer -----Original Message----- From: Andreas [mailto:andreas () inferno nadir org] Sent: Monday, August 23, 2004 12:16 PM To: security-basics () securityfocus com Subject: Re: Blocking Access to Non-domain computers Hello, On Thursday 19 August 2004 16:58, Brian Gehrke wrote:
I am running a W2K domain, using DHCP. Is it possible to block non-domain computers from getting an IP address from the DHCP server, so they will not be able to access the Internet through the network.
is dhcp by mac address (which of course can easily be spoofed) an option? regards, andreas ------------------------------------------------------------------------ --- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------ ---- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Re: Blocking Access to Non-domain computers, (continued)
- Re: Blocking Access to Non-domain computers Oleksandr Darchuk (Aug 25)
- Re: Blocking Access to Non-domain computers Alexandre Verriere (Aug 31)
- RE: Blocking Access to Non-domain computers Steven A. Fletcher (Aug 25)
- RE: Blocking Access to Non-domain computers Raoul Armfield (Aug 25)
- Re: Blocking Access to Non-domain computers Richard Boswell (Aug 26)
- Re: Blocking Access to Non-domain computers Don Voss (Aug 30)
- RE: Blocking Access to Non-domain computers Dan and Liz Boyson (Aug 30)
- Re: Blocking Access to Non-domain computers Balaji Prasad (Aug 31)
- RE: Blocking Access to Non-domain computers Raoul Armfield (Aug 25)
- RE: Blocking Access to Non-domain computers Steven A. Fletcher (Aug 25)
- RE: Blocking Access to Non-domain computers Barrie Dempster (Aug 30)
- RE: Blocking Access to Non-domain computers DeGennaro, Gregory (Aug 26)