Hi Stu,
When you say “a few of my schools have sprung some leaks and I want to trace where it's coming from” I assume this means that some of the users have found a way around the firewall/proxy and you want to find out who they are and how they are doing this and block them again?
Can you give us any more details on what they are doing? If it is Skype traffic you are having problems with then it has some unique challenges.
Kind regards,
Craig.
Craig Harrison
Information Systems Manager
Helpdesk: +64 9 520 9230
Direct: +64 9 520 9238
Phone:
+64 9 520 9224 ext.7868
Mobile:
+64 21 222 4107
char...@diocesan.school.nz
P Please
consider the environment before printing this email. CAUTION: The information
contained in this email is confidential and may be legally privileged. If the
reader of this message is not the intended recipient you are hereby notified
that any use, dissemination, distribution, or reproduction of this message is
prohibited. Thank you.
Hi Bevan,
The reason I flag Skype in particular is that it can use https secure traffic on port 443 to bypass firewalls. Hence if you allow https traffic for your users then Skype may get out, and as this is encrypted traffic a firewall is often unable to look at the application level data to identify that it is Skype rather than say internet banking. Checking the destination IP will also be unsuccessful as this will be the IP of the remote client and hence on no lists. There are techniques that can be used to try and address this and probably your Juniper can break open the https stream if it has enough grunt for the processing required to do this in real time, but they each have their challenges with varying degrees of success.
Hence if Skype is Stu’s issue then he has a bigger problem than if it is just something like students using a proxy bypass site to get to Facebook when he thought it was blocked.
Kind regards,
Craig.
Indeed, slightly side topic in regards to Skype but it is more difficult to restrict BYOD but for computers in the school it is possible to restrict them with a Group Policy.
Bevan
On 19 June 2012 11:02, Craig Harrison <char...@diocesan.school.nz> wrote:
Hi Bevan,
The reason I flag Skype in particular is that it can use https secure traffic on port 443 to bypass firewalls. Hence if you allow https traffic for your users then Skype may get out, and as this is encrypted traffic a firewall is often unable to look at the application level data to identify that it is Skype rather than say internet banking. Checking the destination IP will also be unsuccessful as this will be the IP of the remote client and hence on no lists. There are techniques that can be used to try and address this and probably your Juniper can break open the https stream if it has enough grunt for the processing required to do this in real time, but they each have their challenges with varying degrees of success.
Hence if Skype is Stu’s issue then he has a bigger problem than if it is just something like students using a proxy bypass site to get to Facebook when he thought it was blocked.
Kind regards,
Craig.
From: techies-for-schools@googlegroups.com [mailto:techies-for-schools@googlegroups.com] On Behalf Of Bevan McNaughton
Sent: Tuesday, 19 June 2012 10:32 a.m.