SlideShare a Scribd company logo
PROXY SERVERS AND
APPLICATION LEVEL FIREWALLS
OVERVIEW OF PROXY SERVERS
 Proxy servers
 Also called proxy services, application-level gateways, or application proxies
 Specialized firewall software applications
 Evaluate the application-layer data buried in the data portion of an IP packet
 Most common to dedicate a device to a single application
 HTTP forWeb traffic, SMTP for e-mail, etc.
 Proxies can:
 Conceal the end users in a network
 Filter out undesirableWeb sites
 Block harmful content
HOW PROXY SERVERSWORK
 Function as a software go-between
 Screen all traffic into and out of the relevant ports
 Decide whether to block or allow traffic based on rules set up by the proxy server
administrator
 Question: What is a concern with proxy servers?
HOW PROXY SERVERS DIFFER FROM
PACKET FILTERS
 Create much more detailed log file listings than packet filters
 Rebuild the packet with new source IP information
 Shields internal users from those on the outside
 Attacks that can start with mangled packet data never reach the internal host
 Far more critical to network communications than packet filters
SAMPLE PROXY SERVER CONFIGURATIONS
Computer that has two separate network
interfaces, one to the external Internet and
one to the internal LAN
Packet filter has an interface on the Internet
Configured so that external traffic is allowed to pass only if it is destined for
a service provided on the proxy server
Sits on the protected side of the perimeter
BENEFITS OF PROXY SERVERS
 Conceal internal clients from external clients
 External clients see a single machine
 Commonly used to share Internet connections
 Block URL’s
 Block users from accessing certain URLs
 Configure either IP addresses or DNS names
 Security policy
 More effective method of preventing employees from visiting certain Web sites
 URLs can easily be changed
 Block and Filter Content
 Configure to scan packets for questionable content
 Java applets or ActiveX controls
 Executable files attached to e-mail messages
 Parameters: time, IP address, and port number
 All proxy server products scan the payload of a packet
 Provide some sort of content-filtering system
 Proxy servers provide very complete log files
 Most proxy server products can prompt users who connect to the server for a username and password
CONFIGURING PROXY SERVERS
 Make sure proxy server has enough capacity
 If it gets overloaded, client performance will suffer
 Must configure the environment properly
 Configuration of the proxy server itself
 May need to configure each piece of client software that uses the proxy server
 Potential security vulnerabilities
 Present a single point of failure for the network
 Susceptible to various forms of attack
CONFIGURING CLIENTS
 Configure each client program to work with the proxy server
 Specify for FTP and Gopher connections
 Browser can use the SOCKS standard
 Configuration file
 Browsers on your network can automatically
retrieve the proxy settings
TYPES OF PROXIES
Transparent Proxy
 Totally invisible to end users
 Sits between two networks like a
router
 Firewall intercepts outgoing
traffic
 Directs it to a specific computer,
such as a proxy server
Nontransparent Proxy
 Also called explicit proxies
 Require that the client software
be configured
 All target traffic is forwarded to
the proxy at a single target port
 Typically by means of the SOCKS
protocol
 Require more labor to configure
than transparent proxies
 Each client program must be set
up to route all requests to a single
port
 Provide greater security than
transparent proxies
SOCKS Proxy
 Totally invisible to end users
 Sits between two networks like a
router
 Firewall intercepts outgoing
traffic
 Directs it to a specific computer,
such as a proxy server
REVERSE PROXIES
 Acts as a proxy for inbound connections
 Used outside the firewall as a secure content server to outside clients
 Prevent direct, unmonitored access to your server’s data from outside your company
 Benefits
 Performance
 Cut down on unnecessary requests
 Reduces the load on the company’sWeb server
 Privacy
 Stand-in for aWeb server can protect sensitive information
stored on that Web server that must remain secure
WHEN A PROXY SERVER ISN’TTHE
CORRECT CHOICE
 Some organizations find that a proxy server slows down traffic excessively
 Might use ISP proxy server
 But better off installing and configuring own proxy server even for small home or
business network

More Related Content

What's hot

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Firewalls
FirewallsFirewalls
Firewall
FirewallFirewall
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Firewall
FirewallFirewall
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 

What's hot (20)

IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Dmz
Dmz Dmz
Dmz
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Network Security
Network Security Network Security
Network Security
 
Firewall
FirewallFirewall
Firewall
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network security
Network securityNetwork security
Network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Proxy Presentation

Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
Ayan974999
 
SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway
Planet Technologies
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
Netwax Lab
 
Squid server
Squid serverSquid server
Squid server
Rohit Phulsunge
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
Razorpoint Security
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
nullowaspmumbai
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
stableproxies
 
IT Server infra
IT Server  infraIT Server  infra
IT Server infra
SafexIndia
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABBenith T
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
Palani Kumar
 
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
Ali Asgar Patanwala
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
Cloudflare
 
Network security
Network securityNetwork security
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
Meera Hapaliya
 
Stable proxies it's type and advantages
Stable proxies it's type and advantagesStable proxies it's type and advantages
Stable proxies it's type and advantages
stableproxies
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
Amazon Web Services
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 

Similar to Proxy Presentation (20)

Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 
SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Squid server
Squid serverSquid server
Squid server
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
IT Server infra
IT Server  infraIT Server  infra
IT Server infra
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
Network security
Network securityNetwork security
Network security
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
Stable proxies it's type and advantages
Stable proxies it's type and advantagesStable proxies it's type and advantages
Stable proxies it's type and advantages
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Firewalls
FirewallsFirewalls
Firewalls
 

More from primeteacher32

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
primeteacher32
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
primeteacher32
 
Returning Data
Returning DataReturning Data
Returning Data
primeteacher32
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
primeteacher32
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
primeteacher32
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
primeteacher32
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
primeteacher32
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
primeteacher32
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
primeteacher32
 
Input Validation
Input ValidationInput Validation
Input Validation
primeteacher32
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
primeteacher32
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
primeteacher32
 
Conditionals
ConditionalsConditionals
Conditionals
primeteacher32
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
primeteacher32
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
primeteacher32
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
primeteacher32
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
primeteacher32
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
primeteacher32
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
primeteacher32
 
Block chain security
Block chain securityBlock chain security
Block chain security
primeteacher32
 

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
Manu Mitra
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
foismail170
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
AlinaseFaith
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
ideatoipo
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
ssuser3e63fc
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
Manu Mitra
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
HeidiLivengood
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
gobogo3542
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
Manu Mitra
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 

Recently uploaded (20)

Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 

Proxy Presentation

  • 2. OVERVIEW OF PROXY SERVERS  Proxy servers  Also called proxy services, application-level gateways, or application proxies  Specialized firewall software applications  Evaluate the application-layer data buried in the data portion of an IP packet  Most common to dedicate a device to a single application  HTTP forWeb traffic, SMTP for e-mail, etc.  Proxies can:  Conceal the end users in a network  Filter out undesirableWeb sites  Block harmful content
  • 3. HOW PROXY SERVERSWORK  Function as a software go-between  Screen all traffic into and out of the relevant ports  Decide whether to block or allow traffic based on rules set up by the proxy server administrator  Question: What is a concern with proxy servers?
  • 4. HOW PROXY SERVERS DIFFER FROM PACKET FILTERS  Create much more detailed log file listings than packet filters  Rebuild the packet with new source IP information  Shields internal users from those on the outside  Attacks that can start with mangled packet data never reach the internal host  Far more critical to network communications than packet filters
  • 5. SAMPLE PROXY SERVER CONFIGURATIONS Computer that has two separate network interfaces, one to the external Internet and one to the internal LAN Packet filter has an interface on the Internet Configured so that external traffic is allowed to pass only if it is destined for a service provided on the proxy server Sits on the protected side of the perimeter
  • 6. BENEFITS OF PROXY SERVERS  Conceal internal clients from external clients  External clients see a single machine  Commonly used to share Internet connections  Block URL’s  Block users from accessing certain URLs  Configure either IP addresses or DNS names  Security policy  More effective method of preventing employees from visiting certain Web sites  URLs can easily be changed  Block and Filter Content  Configure to scan packets for questionable content  Java applets or ActiveX controls  Executable files attached to e-mail messages  Parameters: time, IP address, and port number  All proxy server products scan the payload of a packet  Provide some sort of content-filtering system  Proxy servers provide very complete log files  Most proxy server products can prompt users who connect to the server for a username and password
  • 7. CONFIGURING PROXY SERVERS  Make sure proxy server has enough capacity  If it gets overloaded, client performance will suffer  Must configure the environment properly  Configuration of the proxy server itself  May need to configure each piece of client software that uses the proxy server  Potential security vulnerabilities  Present a single point of failure for the network  Susceptible to various forms of attack
  • 8. CONFIGURING CLIENTS  Configure each client program to work with the proxy server  Specify for FTP and Gopher connections  Browser can use the SOCKS standard  Configuration file  Browsers on your network can automatically retrieve the proxy settings
  • 9. TYPES OF PROXIES Transparent Proxy  Totally invisible to end users  Sits between two networks like a router  Firewall intercepts outgoing traffic  Directs it to a specific computer, such as a proxy server Nontransparent Proxy  Also called explicit proxies  Require that the client software be configured  All target traffic is forwarded to the proxy at a single target port  Typically by means of the SOCKS protocol  Require more labor to configure than transparent proxies  Each client program must be set up to route all requests to a single port  Provide greater security than transparent proxies SOCKS Proxy  Totally invisible to end users  Sits between two networks like a router  Firewall intercepts outgoing traffic  Directs it to a specific computer, such as a proxy server
  • 10. REVERSE PROXIES  Acts as a proxy for inbound connections  Used outside the firewall as a secure content server to outside clients  Prevent direct, unmonitored access to your server’s data from outside your company  Benefits  Performance  Cut down on unnecessary requests  Reduces the load on the company’sWeb server  Privacy  Stand-in for aWeb server can protect sensitive information stored on that Web server that must remain secure
  • 11. WHEN A PROXY SERVER ISN’TTHE CORRECT CHOICE  Some organizations find that a proxy server slows down traffic excessively  Might use ISP proxy server  But better off installing and configuring own proxy server even for small home or business network