ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Content Filtering

    IT Discussion
    12
    15
    1.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Markferron
      last edited by

      @Markferron said in Content Filtering:

      I've read a few threads in ML and, in general, people in general don't like combining firewalls and UTM devices/applications. Why is that?

      This is a huge topic on its own. But basically... because you want to treat security like a production workload, not a second class citizen. You'd never run production workloads by "just throwing them on the Domain Controller", why would you do so with security functions by throwing it on your router? You wouldn't, it's not an operational approach, nor a secure one.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @Markferron
        last edited by

        @Markferron said in Content Filtering:

        @travisdh1 I guess a proxy sounds right. I've never messed with one other than the one on my pfsense router at home. What would that look like? A static route to the proxy server from the firewall, I'm assuming?

        A proxy can be used for the most secure of needs. For most companies that need content filtering, DNS based is enough and that you can do with a service (a la StrongArm.io) or run yourself (a la PiHole.)

        ObsolesceO 1 Reply Last reply Reply Quote 0
        • Reid CooperR
          Reid Cooper
          last edited by

          If you can get away with just using DNS based filtering, it is so easy.

          1 Reply Last reply Reply Quote 0
          • black3dynamiteB
            black3dynamite
            last edited by

            If you were to use Pi-Hole, make sure your firewall is only allowing clients to use Pi-Hole IP for their DNS server.

            Another option, is PaloAlto URL Filtering Web Security.
            https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/url-filtering-pandb.html

            1 Reply Last reply Reply Quote 1
            • syko24S
              syko24
              last edited by

              A couple options I’ve used that work pretty well and are very affordable:

              https://www.dnsfilter.com

              And https://nxfilter.org is you want something self hosted

              D 1 Reply Last reply Reply Quote 0
              • D
                dave_c @syko24
                last edited by

                @syko24 said in Content Filtering:

                A couple options I’ve used that work pretty well and are very affordable:

                https://www.dnsfilter.com

                And https://nxfilter.org is you want something self hosted

                I have a client using DNSFilter as one of its security layers. So far, so good. And yes, very affordable.

                1 Reply Last reply Reply Quote 0
                • dbeatoD
                  dbeato
                  last edited by

                  I have used Untangle Content Filtering but it means another network device, and while not DNS based it does content filtering and can do tracking by username and password is connected to LDAP.

                  1 Reply Last reply Reply Quote 0
                  • dbeatoD
                    dbeato
                    last edited by

                    The post that @DustinB3403 was referring is this one
                    https://mangolassi.it/topic/16905/add-porn-blocking-to-your-pi-hole/

                    1 Reply Last reply Reply Quote 1
                    • ObsolesceO
                      Obsolesce @scottalanmiller
                      last edited by

                      @scottalanmiller said in Content Filtering:

                      @Markferron said in Content Filtering:

                      @travisdh1 I guess a proxy sounds right. I've never messed with one other than the one on my pfsense router at home. What would that look like? A static route to the proxy server from the firewall, I'm assuming?

                      A proxy can be used for the most secure of needs. For most companies that need content filtering, DNS based is enough and that you can do with a service (a la StrongArm.io) or run yourself (a la PiHole.)

                      I set up a whitelist-only Squidproxy server for certain user subnets, along with SARG for reporting, which is freaking awesome.

                      It works great, with so many more options and granularity freedom. You can also subscribe to some filtering lists to use on your Squid proxy too if you need that.

                      1 Reply Last reply Reply Quote 1
                      • dafyreD
                        dafyre
                        last edited by

                        An inline device might be a bit easier to handle for transparent proxying.

                        UBNT Router --> Web Proxy Device --> Rest of the network.

                        1 Reply Last reply Reply Quote 0
                        • 1 / 1
                        • First post
                          Last post