Hi, really nice tutorial :) What about blocking some sites like dropbox, gdrive, etc. which are the main channels through which files are nowadays leaking out of companies?
For instance, in the case of dropbox a single url would not be enough, just look here: https://ipdb.at/org/Dropbox Same to block fbook or similar socials. U could integrate ur schema with the use of tables but the real breakthrough would be catching these applications at protocol level when they try to login remotely. Managing tables of forbidden ip addresses is a job in itself. Il 25/nov/2013 15:38 "Wesley MOUEDINE ASSABY" <open...@e-solutions.re> ha scritto: > Hi, > > A new how to about PF and relayd : > http://www.mouedine.net/relayd > > Cheers, > > Wesley MOUEDINE ASSABY