Sunteți pe pagina 1din 9

PROXY SERVER

Proxy:-
A server that sits between a client application, such as a web browser and a real
server. It intercepts all request to the real server to see if it can fulfill the requests itself.
It not, it forwards the request to the real server.
Proxy servers have two main purposes.

Improve performance:-

Proxy server can improve performance for groups of user. This is because it
saves the results of all requests for a certain amount of time. Consider the case when
both user x requests a certain web page, which we will call page1 some time later, user 4
requests the same page instead of forwarding the request to the web server when page 1
resides, which can be a time consuming operation. The proxy server simply returns the
page 1 that it already fetched for user x. Since the proxy server is often an the same
network as the user, this is a much faster operation. Real proxy server supports 100’s ib
1000’s of users.

Filter requests:-

Proxy server can also be used to filter requests. For example, a company might
use a proxy server to prevent its employees from accessing a specific set of websites.

Cbay:-

Proxy Server online market place for buying and selling proxy server.

1. A proxy server keeps on enormous cache of the most asked for web pages all in
one place and in your own part of the world.

Why they need:-

1. P.S can be used to anonymize your web surfing

2. Specialized proxy servers can filter out unwanted content, such as material.
3. PS can afford some protection against hacking attacks

4. Some proxy servers can even translate pages into your own language before
passing them onto you.
Anonymous proxies and Internet Privacy:-

Anonymous proxies hide your real IP address (Sometimes information) from


websites that you visit. There are tow sorts, ones you can use the same way as the non-
anonymous proxies above and web based anonymousness.

Ex:- proxy 1 space proxy com:8080 port


Proxy.at1. net setter.com:80

Free server proxies:-

Free serve use a technique called port forwarding on their gateways, to force all
http traffic through their proxy servers (anything on port-80) so even through you have
not set up your browser to use a proxy you will be using one.

Def:-

A Proxy is a device which allows connection to the internet. It sits b/w


workstations on a network and the internet, allowing for a secure connection, allowing
only certain ports or protocols to remain open. When a client requests a page, the request
is sent to the proxy server, which relays it to the site. When the request is received from
the site, it is forwarded back to the user. Proxy servers can be used to log internet use and
block access to prohibited sites.

It basically holds the most commonly and recently used content from the world
wide web for users in order to provide quicker access and to increase server security. This
is common for an ISP especially if they have slow link to the Internet. Proxy servers are
also constructs that allow direct internet access from behind a firewall. They open a
socket on the server, and allow communication via that socket to the internet. For
example, if your computer is inside a protected network, and you want to browse the
web, you would setup a proxy server on a firewall. The proxy server would be configure
to allow requests from your computer trying for port 80,to connect to its port 1080, and it
would then redirect all requests to the proper places.

Proxy servers are the second kind of firewall . They make network connections to
the user.

There are two types of proxy servers.

1. Socks proxies

2. Application proxies

Socks proxies work like an old telephone switch board that cross wires the user’s
connections through the system to another outside connection.

Application proxies basically let some other computer on software act as a firewall.
For example, a user telnets to another computer and then telnets from those to the outside
world. The proxy server can authenticate users by requiring login and will deliver data
back to the user according to its filtering result.

It can also log traffic if setup to do so. More commonly proxy servers today are either
an application gateway or circuits level gateway. They run on top of the operating system
and process packets at the OSI layer 7 level. This means they can maintain a stable
session state and offer user authentication (login), plus , because they work at the highest
OSI layer, security is very high. The drawback is that it requires significant CPU power
and the high security of checking all layers of the packet means increased latency.

Some common proxies are the access proxy, facades, remote proxies and virtual
proxies. An access proxy is used to enforce a security policy on access to a server or data
providing object. A façade is a single interface to multiple underlying objects. The
remote proxy is used to mask or shield the client object from the fact that the underlying
object is remote.

A virtual proxy is used to perform lazy or just-in-time instantiation of the real


object.
Net proxy:

Net proxy provides simultaneous internet access to multiple users on your


network using just a single internet accountof practically any type(modem, Ison, cable
modem, Dsl, lased line etc).

Next proxy includes a powerful web cache to boost performance and reduce
online costs. There is also an application level firewall to protect your network from
unwanted access logging to allow you to track internet usage, and password protected
access to various internet resources.

What a proxy server is:-


A proxy server acts in all the analogous ways that the word “proxy” implies it is a
combination of s/w and a server which acts as an intermediary or gateway between a set
of users and the internet.

FUNCTIONS:

1. Caching: Increase the performance of a network and the productivity of its users by
caching frequently requested pages at the server level for subsequent use.
2. Protection: As part of a firewall scheme to keep others, viruses or Undesired content
out of your browser or LAN.

3. Authorization:-

To let authorized users into a protected resource or service.

Advantages:-

1. Ip address aggregation and management


2. Caching for enhanced information.
3. Security and control of internet access.

A proxy server uses a single Ip address to connect to the internet and does not requires
that all computers on the corporate side of the proxy have publicly valid ip address. by
reduce the number of public Ip address you have to use. The internet you can
substantially for http pages.

Panive caching:-

This type of caching operates by saving requested web pages on the proxy
server pages are saved until an expiration time is reached at which point they are
described.

Active caching:-

It is a means by which the proxy server can refresh the contents of its cachy using
a.c,a proxy server will note the expiration time of its cached files and request a new copy
from the web server when the cached copy is about to expire.

Security:-

Proxy server provides a means of filtering internet access based on source and
content some proxy server implementations also provide firewall like functionality, such
as packet filtering and using the reserved network address space internately and placing a
proxy server between your corporate network and port blocking.

Proxy server backup and restore:-


You can save the proxy server configuration to a text file so that it can be restored
to the same or a different Microsoft proxy server by clicking on the corresponding option
on the service properly.

Two types of informations are saved when the server configuration is backup.
proxy server information and compute specific information

Security:-

Proxy server provides a means of filtering internet access based on source and
content some proxy server implementations also provide firewall like functionality, such
as packet filtering and port blocking.
Proxy server backup and restore:-

You can save the proxy server configuration to a text file so that it can be restored
to the same or a different Microsoft proxy server by clicking on the corresponding option
on the service properly.

Two types of informations are saved when the server configuration is backup.
Proxy server information and compute specific information

1. It is a means by which the proxy server can refresh the contents of its cauchy
using a.c, a proxy server will note the expiration time of its cached files and
request a new copy from the web server when the cached copy is about to expire

2. Increase network securities and user productivities by filtering content and


controlling both internal and external access to information.

3. Simplify enterprise management..

PROXY CHANGING:-

NAS PROXY1 PROXY2 HOME

SERVER

REPLY REPLY

NAS ( NETWORK ACCESS SERVER ):-

The NAS generates a request and sends it to proxy1, proxy1 forwards the request
to proxy2.proxy2 forwards the request to home server. The home server generates a
reply and sends it to proxy2. Proxy2 receives the reply matches it with the request it had
sent, and forwards a reply to proxy1. Proxy1 matches the reply with the reply with
the request it sent earlier and forwards a reply to NAS. A proxy may also decide to reject
a request that has been accepted by the home server. In this case the proxy should send
an access reject to NAS.
Limitations:-

Requires server configuration for each of the resources to which you wish to
offer access. Requires additional programming and co-ordination. In most cases the
authorization exchange is performed in plain text, which may face a security risk.

use of proxy may be impossible with certain isps and workplace computers
positioned behind corporate firewalls.

How it works:-

1. The proxy accepts a request from a web browser which has been configured to
submit its internet requests to the proxy.

2. The proxy checks to determine whether the request is coming from an appropriate
user by prompting for some combination
Validatio of id or password.
n file or
directory
3. The proxy attempts to match the user information provided against a directory or
file of authorized user IDS/passwords.

4. On the basis of this check the proxy either rejects the request or passes it on to the
desired destination, usually a protected web resource (here the p.s is acting like a
client by requiring the item a second time on behalf of the web browser).

5. The proxy accepts the reply of the protected resource and passes it back to the
browser.

6. If using automatic proxy configuration (APC) requests for un protected resources


by pass the proxy and go on normally.
Prox
Browser y
(using serve
APC) r

Protected
web
resource

Unprote
Connection to PROXY:-
cted
web
1. Open upresource
internet proxy.

2. Top bar, click on menu bar

3. scroll down to ‘internet options

4. Go to the connections tub after the box pops up.

Choose the connection that you want the proxies to set in. For cable, LAN or other
connections, click on ‘lab settings’ tab tick the ‘use a proxy server’.

Advantages:-

1. Faster web surfing with the catching technology.

2. Security-proxy can hide your identify on the net and block virus and any hacking
attacks.
Disadvantages:

• Can’t resume downward, resume feature is not to use it under proxy.

• Controlled speed- you can only get the cached page you want at a certain speed.
That means if your internet connection has faster speeds, proxy is not for you.

• No cookies- proxy serves does’t support cookies, so you will have to log in each
time to put on message boards

• May not access to E-Banking now a days, you don’t have to go to the bank to
save and manage your money, since a proxy hides your identity you can’t access
to some of the E-Banking services provided.

• May slows down web surfing speed- It happens when you visit a website that
doesn’t have many views, the p.s has to go through the database finds nothing and
then contacts the which may take a little while.

• Pages may not be the newest content since the web page is catched in an earlier
time, you may received a copy that is 3 hours or more old and during that time,
the page might be updated so you either have to press refresh or ctrl+F5 to get the
updated page

S-ar putea să vă placă și