Securely Managed and
Timed Proxy Server
Proxy Server

“A server that sits between a client
application, such as a web browser, and a
real server. It intercepts a...
Proxy servers have two main
purposes:

improved performance: Proxy servers can dramatically
improve performance for group...
Managed Timed Proxy Server

any proxy server, with timing capabilities, that requires some
human interaction. The human a...
Any one of these methods will work in effectively
administering the managed timed proxy
server. The recommended method of ...
This makes the integration process with the proxy
server much easier, thus
enabling it to be a self-contained process that...
The need to manage a timed proxy request
for any given user may stem from the fact that
more and more companies have publi...
On the external side, the internal NIC of the firewall is
connected to the external NIC of the
MTPS, either directly or co...
The MTPS server can interface with an SQL
database or independently of any database
through a set of indexed files. Indexe...
Thanking you...
For more info log on too..
http://proxiesforrent.com
Upcoming SlideShare
Loading in …5
×

Securely managed and timed proxy server

330 views

Published on

“A server that sits between a client application, such as a web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, the proxy server forwards the request to a real server.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
330
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Securely managed and timed proxy server

  1. 1. Securely Managed and Timed Proxy Server
  2. 2. Proxy Server  “A server that sits between a client application, such as a web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, the proxy server forwards the request to a real server.
  3. 3. Proxy servers have two main purposes:  improved performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time.  filter requests: Proxy servers can also be used to filter requests
  4. 4. Managed Timed Proxy Server  any proxy server, with timing capabilities, that requires some human interaction. The human administering an individual’s proxy request may interact with the proxy server through several methods:  ! Remote console (may require NOC access)  ! Electronic mail (requires authentication via web)  ! Administrator interface (secured web interface)  ! SSH or S/TELNET interface
  5. 5. Any one of these methods will work in effectively administering the managed timed proxy server. The recommended method of administering this type of proxy server is through the combined utilization of both email and webified interfaces. All of these methods should be securely connected utilizing 128-bit SSL encryption. They can also integrate with any existing mechanism of delivery.
  6. 6. This makes the integration process with the proxy server much easier, thus enabling it to be a self-contained process that is inline with the proxies request; and the managed timed proxy server is defined in lieu of the firewall or default gateway for any given network that requires a proxies connection outward. Conversely, the firewall would connect only with the managed timed proxy server for all outward network requests, granting access via the proxy server, and denying any other requests that are not within its trusted exception list.
  7. 7. The need to manage a timed proxy request for any given user may stem from the fact that more and more companies have publicly stated that they are loosing productivity to their employees browsing web sites that are not company related, or that information found is not utilized for any given project, network, system or application that may require attention.
  8. 8. On the external side, the internal NIC of the firewall is connected to the external NIC of the MTPS, either directly or connected to the switch on the internal or trusted portion of the network. The external NIC of the firewall is connected either to the router, or another switch on the exposed or untrusted portion of the network. This configuration is almost representative of an inline-DMZ configuration but really isn’t as the MTPS offers little protection against inward attacks. Thus, the internal networks behind the MTPS are prevented from any outward traffic, and the firewall only permits traffic from either the MTPS and/or specified servers located within the DMZ.
  9. 9. The MTPS server can interface with an SQL database or independently of any database through a set of indexed files. Indexed files would be based upon a root of the entire tree, which is at its root and is the subnet for the network being serviced. If more than one subnet is being serviced, then the root will consist of several branches that will contain each subnet.
  10. 10. Thanking you... For more info log on too.. http://proxiesforrent.com

×