Answer the question
In order to leave comments, you need to log in
Organization of the work of schoolchildren at computers at school?
Good afternoon!
Please tell me the easiest and most convenient way to solve the following problem.
There is a desire to make work more convenient, I want:
Answer the question
In order to leave comments, you need to log in
It seems to me that it is better to use 2 servers for your tasks.
1. Domain controller (Win 2003) Actually, the domain controller itself, DNS, file dumping are done by standard means, quotas are also configured using Windows tools, for each user to mount a shared folder like \\server\login\
> More complicated: Floating profiles, this will allow users to see " own" desktop on any computer, but it's more complicated about quotas ...
2. Access restriction, proxy (Linux / FreeBSD) The
question here is whether you need traffic control / accounting, if not, then just squid in transparent mode, if yes, then again squid, but opaque and the choice of authentication by IP / by NTLM login.
> More complicated: As a variant of Squid+SAMS with NTLM authentication, well, or any other traffic rhyme.
>Easier: If the task is only to block access to certain sites, perhaps you should think about the OpenDNS service, or on the Windows DNS server, close the necessary domains.
PS You can also raise the file cleaner on Linux, and leave Windows as a purely domain controller. Under the proxy, any system unit is suitable, under Windows it would be better to have a dual-core one.
PPS Of course, you can get by with one server using virtualization, or raise squid / kerio under Windows, but 2 servers are better ...
Do not forget to add to the blacklist and update the lists of proxies + anonymizers. Schoolchildren now know all this. Although it will not be difficult for some to raise the proxy itself, if there is a desire.
Transparent proxy + firewall + router -> ZeroShell - has a transparent proxy with traffic scanning using ClamAv. True, it will be necessary to catch up a little with a planer to fit your needs.
I wonder if it is possible to use virtual machines for this task? The more I think about it, the more difficult it is to find the reasons for the refusal.
- you can “at the touch of a button” deploy a virtual machine from a typical image for a new account.
- we are not afraid of breakdowns
- complete freedom of action for the user
- you can work on very weak machines, and even on diskless ones
What do you think?
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question