We use to have a Sonicwall firewall at my work that I would administrate. There is an application which parses the logs and shows web traffic statistics. So say project1999.com is 1% of the http traffic through the firewall, I was then able to break it down to see how often it was visited and by which local ip addresses. Then I can match up the local IP address with our internal database of local IP addresses finding out who exactly is visiting the site. Not that I gave a shit who did what unless you were getting viruses, using tons of bandwidth or I'm told to review your traffic from your manager. And when I'm told to review the traffic I just forward a report to them and they typically just have me block sites. Sonicwall also has a preset database of sites it believes should be blocked which you can enable (lazy way). ie anything having to do with games. I'd say p99 is rather obscure as far as games go so strange it would be listed there. Also each time you try to visit a blocked site the firewall can be set to alert admins. Heh I recall the girl outside my office would stream this awful pop station every single day and have it way too loud... so I just blocked the site and enjoyed the silence heh.
Being the admin my traffic didnt really matter... but what I did to get around the Sonicwall filters and logging was create a openSSH server at my home. The computer runs openSSH and I open ports on my home firewall for the application to use. I then use putty on my work computer to create a proxy to my ssh tunnel's ip address. Then set the browser settings to use that proxy. Basically I use my home router/firewall to browse the internet at work instead of the firewall at work. Even went so far to create an application to hide the putty window once I was connected haha... I wouldn't exactly recommend doing this cause you may have way better admins than myself that can catch you which may result in breaking your internet/network policy at work... working around the firewall may be a big deal to them... /shrug
|