[snip]
Do like I do here & have done elsewhere, Use 2 proxy servers, one in the DMZ
& one on the clean side of the network. The inside one handles all the AV
checking, authentication & logging of user access to the net, it then relays
the HTTP request upstream to the DMZ proxy. Very secure, very easy to manage
& damn hard to bypass as the inside proxy does not have a direct connection
to the internet.
Greg
--
Greg Hennessy
E-Security Mechanic Merrill Lynch - HSBC LTD
+44 020 7570 3046
--
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the [EMAIL PROTECTED]
This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses.
**********************************************************************
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================