Hi,
really nice tutorial :)

What about blocking some sites like dropbox, gdrive, etc. which are the
main channels through which files are nowadays leaking out of companies?

For instance, in the case of dropbox a single url would not be enough, just
look here:

https://ipdb.at/org/Dropbox

Same to block fbook or similar socials.

U could integrate ur schema with the use of tables but the real
breakthrough would be catching these applications at protocol level when
they try to login remotely. Managing tables of forbidden ip addresses is a
job in itself.
 Il 25/nov/2013 15:38 "Wesley MOUEDINE ASSABY" <open...@e-solutions.re> ha
scritto:

> Hi,
>
> A new how to about PF and relayd :
> http://www.mouedine.net/relayd
>
> Cheers,
>
> Wesley MOUEDINE ASSABY

Reply via email to