There are similar challenges for network administrators in corporate networks and those running firewalls for authoritarian regimes about the use of proxies and VPN services. The issue is that not only do they allow individuals the freedom to conduct their internet activity without being tracked, a VPN will also prevent most aspects of logging taking place too.
If you imagine a company network it means that an individual could potentially conduct all sorts of behaviour from a company computer whilst sitting in a corporate office whilst at work. They could be downloading films, streaming Netflix or something perhaps much more sinister even. Obviously this is potentially a risk to both the network infrastructure and also potentially to the company’s reputation.
So how do you block the use of VPNs and proxies? For a corporate network there are actually many more options, and the simplest is probably to stop any sort of VPN and proxy being used in the first place. You can lock down the advanced settings in a web browser quite simply, for example the Internet Explorer Administration Kit (IEAK) allows you to configure and deploy an IE package which cannot be modified onto every client in your organisation. This stops proxies being used manually and VPN clients can be blocked by ensuring that standard users have no administrative access to their desktops.
It is certainly easier to block any installation than trying to track the use of VPNs particularly some of the most sophisticated ones. For example although you could potentially monitor logs in firewalls and routers for specific IP addresses which looked like VPNs some services allow you to switch to a range of IP addresses – Hide My VPN like the one in this video demonstrates:
As you can see if a service is rotated then identifying the VPN by it’s IP address is much more difficult. However blocking installation of the highlighted service Identity Cloaker can also be difficult as it has a mobile version which can be run directly from a USB disk.
You can see that proxies are fairly irrelevant today as they can be easily blocked, also most content filters can detect their use too. Significantly their use has now dropped globally for additional reasons mainly that they are mostly detected by websites which operate regional restrictions. It is the more sophisticated Virtual private networks which are the difficulty, particularly those equipped with various VPN hider technologies and advanced encryption.