SlideShare a Scribd company logo
1 of 37
Proxy Servers & Firewalls
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Objectives
What is proxy ? Proxy Proxy is hardware / software Indirect access to other networks e.g INTERNET. all computers on the local network have to go through it before accessing information on the Internet. Organization , universities , companies use proxy systems Proxy act as gateway Proxy act as Cache Server/Firewall Proxy share a connection to others LAN INTERNET
Main purpose of using proxies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improve Performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INTERNET 64 Kbps 128 Kbps 512 Kbps 1 Mbps
Filter Requests ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do you need for  proxy installation? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How a proxy works ? ,[object Object]
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 LAN INTERNET Proxy Server Source IP  172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Source IP Address LAN INTERNET Proxy Server Source IP  217.219.66.2 www.yahoo.com Dest IP 209.191.93.52 Source IP  172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Source IP Address  & Destination IP Address IP  : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP  209.191.93.52 Dest IP 217.219.66.2
IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Dest. IP Address IP  : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP  209.191.93.52 Dest IP 217.219.66.2 Source IP 209.191.93.52 Dest IP 172.16.0.2
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 172.16.0.2
Proxy types ,[object Object],[object Object],[object Object],[object Object],[object Object],Proxy setting in IE
Popular hardware & software proxies Software Proxy Hardware Proxy Ms. ISA Server Cisco PIX Squid Blue Coat Kerio WinRoute Cyberoam 1st Up Net Server Alacer CCProxy CProxy Windows ICS WinGate
What is firewall ? Firewall Firewall is hardware / software protects the resources of a private network from users from other networks Organization , universities , companies use firewall systems Firewall can act as gateway Firewall can act as proxy Firewall filter Incoming & Outgoing information LAN INTERNET
Main purpose of using firewalls ,[object Object],[object Object],[object Object],[object Object],  LAN INTERNET
How a firewall works ? ,[object Object],[object Object],[object Object],[object Object],[object Object],Sniffing Mode 1) An attacker tries to compromise a service on the protected  network. 2) The Firewall identifies the attempt . LOG Alert  Reset Harden
What firewall protects us from ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Popular hardware & software firewalls Software Firewall Hardware Firewall Ms. ISA Server Cisco PIX Norton Internet Security Blue Coat Mcafee Internet Security Cyberoam ZoneAlarm Check Point Kerio NetScreen BlackICE D-link SECURESPOT Outpost WatchGuard
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Thank You, ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contact me : Poustchi@yahoo.com http://poustchi.blogspot.com

More Related Content

What's hot

How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server WorksMer Joyce
 
Squid Proxy Server
Squid Proxy ServerSquid Proxy Server
Squid Proxy Server13bcs0012
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
LTM essentials
LTM essentialsLTM essentials
LTM essentialsbharadwajv
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)ISMT College
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 

What's hot (20)

How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
Squid Proxy Server
Squid Proxy ServerSquid Proxy Server
Squid Proxy Server
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
web server
web serverweb server
web server
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Mikrotik Tutorial
Mikrotik TutorialMikrotik Tutorial
Mikrotik Tutorial
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
LTM essentials
LTM essentialsLTM essentials
LTM essentials
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Proxy server
Proxy serverProxy server
Proxy server
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Web services SOAP
Web services SOAPWeb services SOAP
Web services SOAP
 

Similar to Proxy Servers & Firewalls

Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devicesphanleson
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 

Similar to Proxy Servers & Firewalls (20)

Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
 
Isa
IsaIsa
Isa
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Squid server
Squid serverSquid server
Squid server
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Day4
Day4Day4
Day4
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Squid
SquidSquid
Squid
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Network security
Network securityNetwork security
Network security
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 

More from Mehdi Poustchi Amin

Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepMehdi Poustchi Amin
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepMehdi Poustchi Amin
 
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installationInstall Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installationMehdi Poustchi Amin
 
How to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & SigningHow to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & SigningMehdi Poustchi Amin
 
How to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSLHow to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSLMehdi Poustchi Amin
 
Installing Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-StepInstalling Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-StepMehdi Poustchi Amin
 

More from Mehdi Poustchi Amin (20)

Install Linux CentOS 7.0
Install Linux CentOS 7.0Install Linux CentOS 7.0
Install Linux CentOS 7.0
 
Install windows 8.1 Pro
Install windows 8.1 ProInstall windows 8.1 Pro
Install windows 8.1 Pro
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
 
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installationInstall Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
How to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & SigningHow to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & Signing
 
How to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSLHow to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSL
 
VMware Server 2
VMware Server 2VMware Server 2
VMware Server 2
 
VMware ESX 3.5
VMware ESX 3.5VMware ESX 3.5
VMware ESX 3.5
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMware Workstation 7
VMware Workstation 7VMware Workstation 7
VMware Workstation 7
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Configuring RAID 1 on CentOs
Configuring RAID 1 on CentOsConfiguring RAID 1 on CentOs
Configuring RAID 1 on CentOs
 
Installing Parsix 1
Installing Parsix 1Installing Parsix 1
Installing Parsix 1
 
Installing Debian 4
Installing Debian 4Installing Debian 4
Installing Debian 4
 
Installing Mandriva 2008
Installing Mandriva 2008Installing Mandriva 2008
Installing Mandriva 2008
 
Installing Fedora 8
Installing Fedora 8Installing Fedora 8
Installing Fedora 8
 
Installing Windows2008 Server
Installing Windows2008 ServerInstalling Windows2008 Server
Installing Windows2008 Server
 
Installing Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-StepInstalling Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-Step
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Proxy Servers & Firewalls

  • 1. Proxy Servers & Firewalls
  • 2.
  • 3. What is proxy ? Proxy Proxy is hardware / software Indirect access to other networks e.g INTERNET. all computers on the local network have to go through it before accessing information on the Internet. Organization , universities , companies use proxy systems Proxy act as gateway Proxy act as Cache Server/Firewall Proxy share a connection to others LAN INTERNET
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 LAN INTERNET Proxy Server Source IP 172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
  • 10. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Source IP Address LAN INTERNET Proxy Server Source IP 217.219.66.2 www.yahoo.com Dest IP 209.191.93.52 Source IP 172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
  • 11. IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Source IP Address & Destination IP Address IP : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 217.219.66.2
  • 12. IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Dest. IP Address IP : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 217.219.66.2 Source IP 209.191.93.52 Dest IP 172.16.0.2
  • 13. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 172.16.0.2
  • 14.
  • 15. Popular hardware & software proxies Software Proxy Hardware Proxy Ms. ISA Server Cisco PIX Squid Blue Coat Kerio WinRoute Cyberoam 1st Up Net Server Alacer CCProxy CProxy Windows ICS WinGate
  • 16. What is firewall ? Firewall Firewall is hardware / software protects the resources of a private network from users from other networks Organization , universities , companies use firewall systems Firewall can act as gateway Firewall can act as proxy Firewall filter Incoming & Outgoing information LAN INTERNET
  • 17.
  • 18.
  • 19.
  • 20. Popular hardware & software firewalls Software Firewall Hardware Firewall Ms. ISA Server Cisco PIX Norton Internet Security Blue Coat Mcafee Internet Security Cyberoam ZoneAlarm Check Point Kerio NetScreen BlackICE D-link SECURESPOT Outpost WatchGuard
  • 21.  
  • 22.  
  • 23.  
  • 24.  
  • 25.  
  • 26.  
  • 27.  
  • 28.  
  • 29.  
  • 30.  
  • 31.  
  • 32.  
  • 33.  
  • 34.  
  • 35.  
  • 36.
  • 37. Contact me : Poustchi@yahoo.com http://poustchi.blogspot.com