SlideShare une entreprise Scribd logo
1  sur  11
PROXY SERVERS AND
APPLICATION LEVEL FIREWALLS
OVERVIEW OF PROXY SERVERS
 Proxy servers
 Also called proxy services, application-level gateways, or application proxies
 Specialized firewall software applications
 Evaluate the application-layer data buried in the data portion of an IP packet
 Most common to dedicate a device to a single application
 HTTP forWeb traffic, SMTP for e-mail, etc.
 Proxies can:
 Conceal the end users in a network
 Filter out undesirableWeb sites
 Block harmful content
HOW PROXY SERVERSWORK
 Function as a software go-between
 Screen all traffic into and out of the relevant ports
 Decide whether to block or allow traffic based on rules set up by the proxy server
administrator
 Question: What is a concern with proxy servers?
HOW PROXY SERVERS DIFFER FROM
PACKET FILTERS
 Create much more detailed log file listings than packet filters
 Rebuild the packet with new source IP information
 Shields internal users from those on the outside
 Attacks that can start with mangled packet data never reach the internal host
 Far more critical to network communications than packet filters
SAMPLE PROXY SERVER CONFIGURATIONS
Computer that has two separate network
interfaces, one to the external Internet and
one to the internal LAN
Packet filter has an interface on the Internet
Configured so that external traffic is allowed to pass only if it is destined for
a service provided on the proxy server
Sits on the protected side of the perimeter
BENEFITS OF PROXY SERVERS
 Conceal internal clients from external clients
 External clients see a single machine
 Commonly used to share Internet connections
 Block URL’s
 Block users from accessing certain URLs
 Configure either IP addresses or DNS names
 Security policy
 More effective method of preventing employees from visiting certain Web sites
 URLs can easily be changed
 Block and Filter Content
 Configure to scan packets for questionable content
 Java applets or ActiveX controls
 Executable files attached to e-mail messages
 Parameters: time, IP address, and port number
 All proxy server products scan the payload of a packet
 Provide some sort of content-filtering system
 Proxy servers provide very complete log files
 Most proxy server products can prompt users who connect to the server for a username and password
CONFIGURING PROXY SERVERS
 Make sure proxy server has enough capacity
 If it gets overloaded, client performance will suffer
 Must configure the environment properly
 Configuration of the proxy server itself
 May need to configure each piece of client software that uses the proxy server
 Potential security vulnerabilities
 Present a single point of failure for the network
 Susceptible to various forms of attack
CONFIGURING CLIENTS
 Configure each client program to work with the proxy server
 Specify for FTP and Gopher connections
 Browser can use the SOCKS standard
 Configuration file
 Browsers on your network can automatically
retrieve the proxy settings
TYPES OF PROXIES
Transparent Proxy
 Totally invisible to end users
 Sits between two networks like a
router
 Firewall intercepts outgoing
traffic
 Directs it to a specific computer,
such as a proxy server
Nontransparent Proxy
 Also called explicit proxies
 Require that the client software
be configured
 All target traffic is forwarded to
the proxy at a single target port
 Typically by means of the SOCKS
protocol
 Require more labor to configure
than transparent proxies
 Each client program must be set
up to route all requests to a single
port
 Provide greater security than
transparent proxies
SOCKS Proxy
 Totally invisible to end users
 Sits between two networks like a
router
 Firewall intercepts outgoing
traffic
 Directs it to a specific computer,
such as a proxy server
REVERSE PROXIES
 Acts as a proxy for inbound connections
 Used outside the firewall as a secure content server to outside clients
 Prevent direct, unmonitored access to your server’s data from outside your company
 Benefits
 Performance
 Cut down on unnecessary requests
 Reduces the load on the company’sWeb server
 Privacy
 Stand-in for aWeb server can protect sensitive information
stored on that Web server that must remain secure
WHEN A PROXY SERVER ISN’TTHE
CORRECT CHOICE
 Some organizations find that a proxy server slows down traffic excessively
 Might use ISP proxy server
 But better off installing and configuring own proxy server even for small home or
business network

Contenu connexe

Tendances

FireWall
FireWallFireWall
FireWall
rubal_9
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 

Tendances (20)

Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Proxy server
Proxy serverProxy server
Proxy server
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Proxy
ProxyProxy
Proxy
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing software
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Cloud security
Cloud securityCloud security
Cloud security
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Network security
Network security Network security
Network security
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Email security
Email securityEmail security
Email security
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
FireWall
FireWallFireWall
FireWall
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Spoofing
SpoofingSpoofing
Spoofing
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 

Similaire à Proxy Presentation

Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
Benith T
 

Similaire à Proxy Presentation (20)

Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 
SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Squid server
Squid serverSquid server
Squid server
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
IT Server infra
IT Server  infraIT Server  infra
IT Server infra
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
Stable proxies it's type and advantages
Stable proxies it's type and advantagesStable proxies it's type and advantages
Stable proxies it's type and advantages
 

Plus de primeteacher32

Plus de primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Dernier

Call Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night StandCall Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
amitlee9823
 
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
ZurliaSoop
 
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
amitlee9823
 
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
amitlee9823
 
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
amitlee9823
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Menggugurkan Kandungan 087776558899
 
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
amitlee9823
 
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
amitlee9823
 
➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men 🔝Secunderabad🔝...
➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men  🔝Secunderabad🔝...➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men  🔝Secunderabad🔝...
➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men 🔝Secunderabad🔝...
amitlee9823
 
Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...
Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...
Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...
gajnagarg
 
➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men 🔝bharuch🔝 Escorts...
➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men  🔝bharuch🔝   Escorts...➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men  🔝bharuch🔝   Escorts...
➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men 🔝bharuch🔝 Escorts...
amitlee9823
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
deejay178
 

Dernier (20)

Call Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night StandCall Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Mahadevapura ☎ 7737669865 🥵 Book Your One night Stand
 
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfDMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
 
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men  🔝Pallavaram🔝   E...
➥🔝 7737669865 🔝▻ Pallavaram Call-girls in Women Seeking Men 🔝Pallavaram🔝 E...
 
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
 
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men  🔝Nandyal🔝   Escorts...
➥🔝 7737669865 🔝▻ Nandyal Call-girls in Women Seeking Men 🔝Nandyal🔝 Escorts...
 
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
 
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
 
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
 
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai KokoDubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
WhatsApp 📞 8448380779 ✅Call Girls In Salarpur Sector 81 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Salarpur Sector 81 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Salarpur Sector 81 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Salarpur Sector 81 ( Noida)
 
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
 
➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men 🔝Secunderabad🔝...
➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men  🔝Secunderabad🔝...➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men  🔝Secunderabad🔝...
➥🔝 7737669865 🔝▻ Secunderabad Call-girls in Women Seeking Men 🔝Secunderabad🔝...
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWN
 
Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...
Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...
Just Call Vip call girls Jammu Escorts ☎️9352988975 Two shot with one girl (J...
 
➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men 🔝bharuch🔝 Escorts...
➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men  🔝bharuch🔝   Escorts...➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men  🔝bharuch🔝   Escorts...
➥🔝 7737669865 🔝▻ bharuch Call-girls in Women Seeking Men 🔝bharuch🔝 Escorts...
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
 

Proxy Presentation

  • 2. OVERVIEW OF PROXY SERVERS  Proxy servers  Also called proxy services, application-level gateways, or application proxies  Specialized firewall software applications  Evaluate the application-layer data buried in the data portion of an IP packet  Most common to dedicate a device to a single application  HTTP forWeb traffic, SMTP for e-mail, etc.  Proxies can:  Conceal the end users in a network  Filter out undesirableWeb sites  Block harmful content
  • 3. HOW PROXY SERVERSWORK  Function as a software go-between  Screen all traffic into and out of the relevant ports  Decide whether to block or allow traffic based on rules set up by the proxy server administrator  Question: What is a concern with proxy servers?
  • 4. HOW PROXY SERVERS DIFFER FROM PACKET FILTERS  Create much more detailed log file listings than packet filters  Rebuild the packet with new source IP information  Shields internal users from those on the outside  Attacks that can start with mangled packet data never reach the internal host  Far more critical to network communications than packet filters
  • 5. SAMPLE PROXY SERVER CONFIGURATIONS Computer that has two separate network interfaces, one to the external Internet and one to the internal LAN Packet filter has an interface on the Internet Configured so that external traffic is allowed to pass only if it is destined for a service provided on the proxy server Sits on the protected side of the perimeter
  • 6. BENEFITS OF PROXY SERVERS  Conceal internal clients from external clients  External clients see a single machine  Commonly used to share Internet connections  Block URL’s  Block users from accessing certain URLs  Configure either IP addresses or DNS names  Security policy  More effective method of preventing employees from visiting certain Web sites  URLs can easily be changed  Block and Filter Content  Configure to scan packets for questionable content  Java applets or ActiveX controls  Executable files attached to e-mail messages  Parameters: time, IP address, and port number  All proxy server products scan the payload of a packet  Provide some sort of content-filtering system  Proxy servers provide very complete log files  Most proxy server products can prompt users who connect to the server for a username and password
  • 7. CONFIGURING PROXY SERVERS  Make sure proxy server has enough capacity  If it gets overloaded, client performance will suffer  Must configure the environment properly  Configuration of the proxy server itself  May need to configure each piece of client software that uses the proxy server  Potential security vulnerabilities  Present a single point of failure for the network  Susceptible to various forms of attack
  • 8. CONFIGURING CLIENTS  Configure each client program to work with the proxy server  Specify for FTP and Gopher connections  Browser can use the SOCKS standard  Configuration file  Browsers on your network can automatically retrieve the proxy settings
  • 9. TYPES OF PROXIES Transparent Proxy  Totally invisible to end users  Sits between two networks like a router  Firewall intercepts outgoing traffic  Directs it to a specific computer, such as a proxy server Nontransparent Proxy  Also called explicit proxies  Require that the client software be configured  All target traffic is forwarded to the proxy at a single target port  Typically by means of the SOCKS protocol  Require more labor to configure than transparent proxies  Each client program must be set up to route all requests to a single port  Provide greater security than transparent proxies SOCKS Proxy  Totally invisible to end users  Sits between two networks like a router  Firewall intercepts outgoing traffic  Directs it to a specific computer, such as a proxy server
  • 10. REVERSE PROXIES  Acts as a proxy for inbound connections  Used outside the firewall as a secure content server to outside clients  Prevent direct, unmonitored access to your server’s data from outside your company  Benefits  Performance  Cut down on unnecessary requests  Reduces the load on the company’sWeb server  Privacy  Stand-in for aWeb server can protect sensitive information stored on that Web server that must remain secure
  • 11. WHEN A PROXY SERVER ISN’TTHE CORRECT CHOICE  Some organizations find that a proxy server slows down traffic excessively  Might use ISP proxy server  But better off installing and configuring own proxy server even for small home or business network