SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Novell (NOVL) dirt cheap, good buy?

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Scott C. Lemon who wrote (28451)10/5/1999 4:37:00 PM
From: ToySoldier  Read Replies (1) of 42771
 
I have a couple minutes Scott, then yet another meeting (with Novell if you can believe that)....

Instead of responding each point, I get the idea of your responses. I agree in an ISP whereby the infrastructure is a few years old and their way of delivering the service is well entrench among a large user base, DS developed solutions would be extremely hard to transition to.

My local implementation of @HOME is only 1.5 years old and the userbase is still somewhat small - BUT their user management headaches are HUGE. Also, customer satisfaction on @HOME's service has a lot of critics - and a good part of it is based on @HOME's inability to proper control its User's activities. (the big joke is "100x faster than dialup" - I know myself and several of my buddies on @HOME are not getting 100X faster on a normal basis.

Anyway - I digress....

YES - if @HOME or one of their competitors implements an NDS authentication client and it is a condition of receiving service, then control can be attained. This includes the NAT gateways. WHY you ask....

Lets use an NDS-enabled firewall like BorderManager and I tell BorderManager to filter Internet access based on NDS user ID. So I say, Scott Lemon is not allowed to login to the @HOME NDS tree more than once. Now Scott Lemon sets up a NAT gateway behind his Cable Modem and plugs 10 home PCs on the ethernet behind the NAT gateway. Scott goes to his 1st PC and of course has to log into the @HOME NDS tree. Thats it, no other login's are allowed for you - the user. So you go through the NAT and head on out toward the @HOME firewall (bordermanager). BM says, "ohh your authenticated now as Scott Lemon, your allowed through)">

Now Scott lets his buddy on his second computer behind the NAT. The second computer asks Scott's buddy to authenticate into the @HOME NDS. Scott's friend is not allowed to use Scott's ID since single login restriction is enable. Scott's friend decides to ignore the login. Makes a request to go to the Internet site - BorderManager says "Hmmm - your not authenticated as anyone I know I can allow through - BYE BYE".

That is how NAT becomes useless as a cheating method within @HOME. A logical layer of security makes physical security hacks basically impossible for the most part - including the NAT concept. BorderManager that is configured to restrict internet access by NDS user-ID couldnt care less what your IP address is (legal or leveraged).

I do agree with you that the pain to develop a Directory Enabled solution is high, but the rewards and opportunities are greater.

Yes there may be a few peices missing, but most do exist.

I hope I answered most. Gotta Go!

Toy
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext