SlideShare a Scribd company logo
FFiirreewwaallll wwiitthh PPrrooxxyy sseerrvveerr
What actually is Proxy server?
Indirect text to other network. 
Proxy is 
hardware/software
Individuals, universities, companies use 
proxy 
Proxy acts as a gateway, catch 
server/firewall
Proxy share connection with others
Purpose of using proxies:- 
 It improves performance:- 
(a) It act as a cache server 
(b) It controls bandwidth 
 It helps in surfing anonymously:- 
(a) It helps in browsing WWW without 
any identification 
 It helps in filtering request:- 
(a) It prevent access to some sites and 
protocol. 
(b) It helps in time division.
Improve performance:- 
 Caching:- 
(a) It reduce latency. 
(b) It reduce network traffic. 
 Bandwidth control:- 
(a) It is policy based bandwidth 
limit. 
(b) It deny by network type.
Caching helps in speeding up internet access.
Caches diminish the need for network 
bandwidth, typically by 35% or more, by 
reducing the traffic from browsers to 
content servers.
Working of proxy
Working of proxy
Caching Proxy 
A caching proxy server 
accelerates service 
requests by retrieving 
content saved from a 
previous request made by 
the same client or even 
other clients
Web proxy 
A proxy that focuses on 
World Wide Web traffic is 
called a "web proxy". The 
most common use of a 
web proxy is to serve as 
a web cache.
Content-filtering web proxy 
A content-filtering web proxy 
server provides administrative 
control over the content that 
may be relayed through the 
proxy. It is commonly used in 
both commercial and non-commercial 
organizations 
(especially schools) to ensure 
that Internet usage conforms 
to acceptable use policy
Anonymizing proxy 
An anonymous proxy server 
(sometimes called a web 
proxy) generally attempts to 
anonymize web surfing.
Intercepting proxy 
An intercepting proxy 
combines a proxy server 
with a gateway or router. 
Connections made by client 
browsers through the 
gateway are diverted to the 
proxy without client-side 
configuration.
Performance Aspect
Caching 
 By keeping local copies of 
frequently accessed file the 
proxy can serve those files 
back to a requesting browser 
without going to the external 
site each time, this 
dramatically improves the 
performance seen by the end 
user
 Only makes sense to 
implement this at the ISP 
rather than the small 
business level because of 
the number of pages 
available 
 Because of dynamic 
content many pages are 
invalidated in the cache right 
away
Load balancing (Reverse Proxy) 
 A proxy can be used in a 
reverse direction to balance 
the load amongst a set of 
identical servers (servers 
inside the firewall and users 
outside) 
 Used especially with web 
dynamic content (.asp, 
.php,.cfm,.jsp)
Security benefits 
 Hide internal clients from external network 
 Blocking of dangerous URLs 
 Filter dangerous content 
 Eliminate need for transport layer routing between networks 
 Single point of access, control and logging
Thanking you!!! 
For more info log on 
too.. 
Stableproxies

More Related Content

What's hot

Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
primeteacher32
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
greatbury
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserverNiraj Barnwal
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
Proxies Rent
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows
codeandyou forums
 
Proxy server
Proxy serverProxy server
Proxy server
Dlovan Salih
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
Jainul Musani
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
primeteacher32
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELFShehab Imam
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
stableproxies
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
Syaiful Ahdan
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
Vikas Merugu
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
Meera Hapaliya
 

What's hot (20)

Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Proxy
ProxyProxy
Proxy
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserver
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows
 
Proxy server
Proxy serverProxy server
Proxy server
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
 
Cc proxy
Cc proxyCc proxy
Cc proxy
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELF
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 

Viewers also liked

memcached proxy server development and operation
memcached proxy server development and operationmemcached proxy server development and operation
memcached proxy server development and operation
Tatsuhiko Kubo
 
Implementing transparent proxy server with acl
Implementing transparent proxy server with aclImplementing transparent proxy server with acl
Implementing transparent proxy server with acl
Takahiro Arai
 
Concept & generation of computers
Concept & generation of computersConcept & generation of computers
Concept & generation of computers
Hardik Patel
 
Five generations of computer
Five generations of computerFive generations of computer
Five generations of computer
Indrabhaskar Mishra
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
Vi Tính Hoàng Nam
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
SuYash Ratner
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014bryan_call
 
Generations of Computer
Generations of ComputerGenerations of Computer
Generations of Computer
Yugansh Holani
 
Classification and generations of computers
Classification and generations of computersClassification and generations of computers
Classification and generations of computersKhushbu Sonegara
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Sahira Khan
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
Sopon Tumchota
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation PresentationJayesh Modi
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
Rajat More
 
Computer generation
Computer generationComputer generation
Computer generation
Duy Hieu
 

Viewers also liked (16)

memcached proxy server development and operation
memcached proxy server development and operationmemcached proxy server development and operation
memcached proxy server development and operation
 
Implementing transparent proxy server with acl
Implementing transparent proxy server with aclImplementing transparent proxy server with acl
Implementing transparent proxy server with acl
 
Concept & generation of computers
Concept & generation of computersConcept & generation of computers
Concept & generation of computers
 
Five generations of computer
Five generations of computerFive generations of computer
Five generations of computer
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Generations of Computer
Generations of ComputerGenerations of Computer
Generations of Computer
 
Classification and generations of computers
Classification and generations of computersClassification and generations of computers
Classification and generations of computers
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation Presentation
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Computer generation
Computer generationComputer generation
Computer generation
 
GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.GENERATION OF COMPUTERS.
GENERATION OF COMPUTERS.
 

Similar to Firewall with proxy server.

Proxy Server
Proxy ServerProxy Server
Proxy Server
Netwax Lab
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
Proxies Rent
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
Hossam Al-Ansary
 
Squid
SquidSquid
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
Proxies Rent
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
Heera K S
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
Ayan974999
 
Web hosting presentations by hostindia.net
Web hosting presentations by hostindia.netWeb hosting presentations by hostindia.net
Web hosting presentations by hostindia.net
Hostin Services Pvt Ltd
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
tim4911
 
Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...webhostingguy
 
Squid server
Squid serverSquid server
Squid server
Rohit Phulsunge
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...
IJMER
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABBenith T
 
SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway
Planet Technologies
 

Similar to Firewall with proxy server. (20)

Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
web server
web serverweb server
web server
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
 
Squid
SquidSquid
Squid
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 
week14
week14week14
week14
 
Web hosting presentations by hostindia.net
Web hosting presentations by hostindia.netWeb hosting presentations by hostindia.net
Web hosting presentations by hostindia.net
 
zigbee
zigbeezigbee
zigbee
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Swapnil_Chaudhari_paper
Swapnil_Chaudhari_paperSwapnil_Chaudhari_paper
Swapnil_Chaudhari_paper
 
Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...
 
Squid server
Squid serverSquid server
Squid server
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
 
webhost
webhostwebhost
webhost
 
SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway
 

Recently uploaded

The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 

Recently uploaded (20)

The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 

Firewall with proxy server.

  • 2. What actually is Proxy server?
  • 3. Indirect text to other network. Proxy is hardware/software
  • 4. Individuals, universities, companies use proxy Proxy acts as a gateway, catch server/firewall
  • 6. Purpose of using proxies:-  It improves performance:- (a) It act as a cache server (b) It controls bandwidth  It helps in surfing anonymously:- (a) It helps in browsing WWW without any identification  It helps in filtering request:- (a) It prevent access to some sites and protocol. (b) It helps in time division.
  • 7. Improve performance:-  Caching:- (a) It reduce latency. (b) It reduce network traffic.  Bandwidth control:- (a) It is policy based bandwidth limit. (b) It deny by network type.
  • 8. Caching helps in speeding up internet access.
  • 9. Caches diminish the need for network bandwidth, typically by 35% or more, by reducing the traffic from browsers to content servers.
  • 12. Caching Proxy A caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients
  • 13. Web proxy A proxy that focuses on World Wide Web traffic is called a "web proxy". The most common use of a web proxy is to serve as a web cache.
  • 14. Content-filtering web proxy A content-filtering web proxy server provides administrative control over the content that may be relayed through the proxy. It is commonly used in both commercial and non-commercial organizations (especially schools) to ensure that Internet usage conforms to acceptable use policy
  • 15. Anonymizing proxy An anonymous proxy server (sometimes called a web proxy) generally attempts to anonymize web surfing.
  • 16. Intercepting proxy An intercepting proxy combines a proxy server with a gateway or router. Connections made by client browsers through the gateway are diverted to the proxy without client-side configuration.
  • 18. Caching  By keeping local copies of frequently accessed file the proxy can serve those files back to a requesting browser without going to the external site each time, this dramatically improves the performance seen by the end user
  • 19.  Only makes sense to implement this at the ISP rather than the small business level because of the number of pages available  Because of dynamic content many pages are invalidated in the cache right away
  • 20. Load balancing (Reverse Proxy)  A proxy can be used in a reverse direction to balance the load amongst a set of identical servers (servers inside the firewall and users outside)  Used especially with web dynamic content (.asp, .php,.cfm,.jsp)
  • 21. Security benefits  Hide internal clients from external network  Blocking of dangerous URLs  Filter dangerous content  Eliminate need for transport layer routing between networks  Single point of access, control and logging
  • 22. Thanking you!!! For more info log on too.. Stableproxies