Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Schools Learn About Security: Page 2 of 4

To find a better firewall solution, I researched a variety of products. I initially considered using a dedicated hardware-based firewall rather than running software on a server. However, products from Check Point and some others proved too expensive for the Pikes Peak BOCES. Other server-based solutions, like Microsoft's now discontinued Proxy server and the ISA server which replaces it, couldn't handle the size and complexity of Pikes Peak BOCES' network.

Finally, I came across a Linux-based product that could turn an inexpensive server into an all-purpose security device. The Astaro Security Linux, from Astaro Corp., handles the firewall, the Web content filtering, the Email blocking, virus protection, and the bandwidth management. I installed the product on a $1,500 off-the-shelf, Pentium 3 server with 512 megabytes of RAM.

The security appliance acts as a firewall to control the way all of the platform Web servers, which Pike Peak's BOCES manages, are exposed to the Internet. For example, as I administer the network, I can watch the Astaro logs work in real time and see various attempts to attack or exploit any software vulnerabilities. This capability prevents attackers from trying to take advantage of Web server software Pikes Peak BOCES doesn't want exposed to the Internet.

Pikes Peak BOCES, as with many school districts, struggles with the contradicting needs of providing students with Internet access, while protecting them from inappropriate content.

The easy solution to this problem is to install filtering software. Filtering software, though, has inherent problems. Key words set off false alarms and the purveyors of blocked sites find ways around the filters. The tradeoff is clear: provide open access and run the risk of exposing students to pornography, violence, scams, and other inappropriate content; or clamp down on the network and risk blocking legitimate traffic and hindering valid student research.