Date post: | 05-Apr-2018 |
Category: |
Documents |
Upload: | eshwarraj0 |
View: | 216 times |
Download: | 0 times |
of 13
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
1/13
A proxy server shares one internet connection with ALL the computers on your local network or it is a computer that
offers a computer network service to allow clients to make indirect network connections to other network services. So
basically a proxy (proxy server) is a server that acts as mediator between the client (the computer of a user) and
server (the computer on the other ends of network connection on which the information requested by the user
appears for example web server site.) When clients request data from an Internet resource,traffic goes from your web
browser/application first through the proxy before it reaches the requested sources and back through the proxy then
the proxy will transmit the data to you.
A proxy server sits between a client application, such as a Web browser, and a real server. It intercepts all requests
to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
Do not confuse a proxy server with a NAT (Network Address Translation). Although they appear to be very similar, a
proxy server actually does the work of connecting to, responding to, and receiving traffic from the Internet. In other
words, it acts on behalf of the client computer. A NAT, on the other hand, merely changes the origination address of
traffic coming through it and passes it to the Internet. The computer behind the NAT,not the NAT itself, does the work.
The NAT is intended to be transparent to the whole process.
For those who understand the OSI (Open System Interconnection) model of networking,the technical difference
between a proxy and a NAT is that the proxy server works on the transport layer (layer 4), or higher of the OSI model,
whereas a NAT works on the network layer (layer 3).
How Proxy Servers Work :
1. When a computer on the intranet makes a request out to the Internet-such as to retrieve a Web page from a Web
server-the internal computer actually contacts the proxy server, which in turn contacts the Internet server. The
Internet server sends the Web page to the proxy server, which then forwards the page to the computer on the
intranet.
2. Proxy servers log all traffic between the Internet and the intranet. For example, a Telnet proxy server could track
every single keystroke hit in every Telnet session on the intranet-and could also track how the external server on the
Internet reacts to those keystrokes. Proxy servers can log every IP address, date and time of access, URL, number of
bytes downloaded, and so on. This information can be used to analyze any attacks launched against the network. It
can also help intranet administrators build better access and services for employees.
3. Some proxy servers must work with special proxy clients. A more popular approach is to use off-the-shelf clients
such as Netscape with proxy servers. When such an off-the-shelf package is used, it must be specially configured to
work with proxy servers from a configuration menu. Then the intranet employee uses the client software as usual.
The client software knows to go out to a proxy server to get the data, instead of to the Internet.
4. Proxy servers can do more than relay requests back and forth between an intranet and the Internet. They can also
implement security schemes. For example, an FTP proxy server could be set up to allow files to be sent from the
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
2/13
Internet to a computer on the intranet,but to block files from being sent from the corporate network out to the Internet-
or vice versa. In this way, intranet administrators can block anyone outside the corporation from downloading vital
corporate data. Or they can stop intranet users from downloading files which may contain viruses.
5. Proxy servers can also be used to speed up the performance of some Internet services by caching data-keeping
copies of the requested data. For example, a Web proxy server could cache many Web pages, so that whenever
someone from the intranet wanted to get one of those Web pages, they could get it directly from the proxy server
across high-speed intranet lines,instead of having to go out across the Internet and get the page at a lower speed
from Internet lines.
The different types of Proxy Servers :
There are many different types of Proxy Servers out there. Depending on the purpose you can get Proxy Servers to
route any of these common protocols, and many more ;
1)FTP Proxy Server:
Relays and caches FTP Traffic.
2)HTTP Proxy Server:
http://www.eukhost.com/reseller-hosting.php8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
3/13
A one way request to retrieve Web Pages.
3)Socks Proxy Server:
A newer protocol to allow relaying of far more different types of data, whether TCP or UDP.
4)NAT Proxy Server:
This one works a little different, it allows the redirection of all packets without a Program having to support a Proxy
Server.
5)SSL Proxy Server:
An extension was created to the HTTP Proxy Server which allows relaying of TCP data similar to a Socks Proxy
Server. This one done mainly to allow encryption of Web Page
requests.
Furthermore, a Proxy Server can be split into another two Categories:
1)Anonymous:
An Anonymous Proxy Server blocks the remote Computer from knowing the identity of the
Computer using the Proxy Server to make requests.
2)Transparent:
A Transparent Proxy Server tells the remote Computer the IP Address of your Computer.
This provides no privacy.
Anonymous Proxy Servers can further be broken down into two more categories, Elite and Disguised. An Elite Proxy
Server is not identifiable to the remote computer as a Proxy in any way. A Disguised Proxy Server gives the remote
computer enough information to let it know that it is a Proxy, however it still does not give away the IP of the
Computer it is relaying information for.
2;
How the proxy server works
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
4/13
Once you have configured your web browser as described, your browser will load a CGI script each time it isrestarted. This script redefines the function that determines how to fetch the URL that is being requested. If the URLmatches a pattern or a site that requires a proxy, it will connect to the proxy server rather than going directly to thesite.
(USR = User on IBM.Net or another ISP; PXY = BOL web proxy server; SRV = web server restricted to UCLA)
Step 1: User starts browser, connects to proxy server to get the Proxy
Automatic Configuration (PAC) file.
fetch request: proxy.ucla.edu/cgi/proxy
+-----+ +-----+
| U | | P |
| S | ==================>| X |
| R | | Y |
+-----+ +-----+
Step 2: Proxy server returns "proxy", which configuresbrowser to do proxying.
+-----+ +-----+
| U | "proxy" loaded | P |
| S || X | | R |
| R | | Y | | V |
+-----+ +-----+ +-----+
Step 4b2: Proxy contacts server and requests page.
+-----+ +-----+ +-----+
| U | | P | request URL | S |
| S | | X | ==================>| R |
| R | | Y | | V |
+-----+ +-----+ +-----+
Step 4b3: Server sees request from ucla.edu domain (proxy address)
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
5/13
and returns URL to proxy.
+-----+ +-----+ +-----+
| U | | P | return URL | S |
| S | | X |
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
6/13
Analogy: Just imagine the postman is the proxy server. You can either choose to deliver the mail to your friend via the
postman or drive your own self to your friend house. Ironically, the postman might save you from any accident, and
perhaps your friend wont know who the sender is. Most importantly, police would not stop the postman.
Picture tells thousand words
Connection with proxy server:
Normal connection without proxy server:
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
7/13
5 reasons why you should use proxy server?
Bypassing
We all believe internet is a continent of freedom, and it should be freed from the pollution of government policy, and
the most retarded company filtering. With proxy server, you can unblock the web filter and access to your favorite site
without any restriction.
Anonymity
Every time you connect to internet, your computer will generate a unique IP number which will reveal your private
information to others. This information could be your location, internet service provider and your browsing habits.
Using a proxy server allows you to surf the Internet or use Internet-based software totally anonymous to keep off
them effectively.
Speed Booster
A proxy server would store a cached copy of a particular website you visit for the first time. Hence, the second time
you revisit to the same website, the proxy server can call up its cached copy instead of having to send another
request to the main server. This speeds up data transmission and also reduces server load.
Lesser Bandwidth
As described above, the proxy server will deliver a cached copy of the website to you instead of using bandwidth to
retrieve the website from the hosted server. This is especially useful for the users who have the limited amount of
bandwidth provided by the ISP.
Security
Proxy Server acts as a security guard to protect you from the unexpectedly malware and virus attack. In other words,
proxy servers can filter out malicious content in websites easily to prevent browse-by malware infections.
In addition, most of the good proxy server will enhance your security by providing you the Secure Sockets Layer
(SSL). SSL or sometimes called HTTPs proxy is the extra layer of security that encrypts all the coming in and going
out information to prevent unauthorized access. This makes the connection between the user and the remote server
more secure.
How does Proxy Server works
Introduction
A Proxy Server is a computer that offers network and internet access services to the clientcomputers in a network. A proxy is a stand-in for you - someone who does something on
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
8/13
your behalf. A proxy server is a kind of stand in for your computer. In an enterprise that
uses the Internet, a proxy server is a server that acts as an intermediary between a
workstation user and the Internet so that the enterprise can ensure security, administrativecontrol, and caching service.
By using the proxy server you can hide, conceal and make your network id anonymous by
hiding your IP address. A proxy server is associated with or part of a gateway server that
separates the enterprise network from the outside network and a firewall server thatprotects the enterprise network from outside intrusion. In short, a Proxy Server can bedescribed as 'A server that sits between a client application, such as a Web
browser, and a real server.' To get the anonymous status on the network or Internet,strong intermediate methods are employed like cryptography etc.
How does Proxy Server works?
A proxy server receives a request for an Internet service (such as a Web page request) from
a user. If it passes filtering requirements, the proxy server, assuming it is also a cacheserver , looks in its local cache of previously downloaded Web pages. If it finds the page, it
returns it to the user without needing to forward the request to the Internet. If the page isnot in the cache, the proxy server, acting as a client on behalf of the user, uses one of itsown IP addresses to request the page from the server out on the Internet. When the page isreturned, the proxy server relates it to the original request and forwards it on to the user. A
good example, and the one you probably see the most, is a web proxy. When configured touse a proxy, your web browser contacts the proxy server for each web access instead ofgoing directly to the target server on the internet. The proxy server then turns around and
makes the "real" request of the web server. The proxy server gets the response, and then
passes it back to you.
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
9/13
There is a large number of the software available that allows you to hide your IP address
with the help of the proxy servers. The well known software for this purpose is Hide IP,Stealth surf, Netconceal, Anonymous surfing, Proxify and Ghost surf. To the user, the proxy
server is invisible; all Internet requests and returned responses appear to be directly withthe addressed Internet server. (The proxy is not quite invisible; its IP address has to be
specified as a configuration option to the browser or other protocol program.)__________________
Types of Proxy Servers
Many different types of Proxy Servers are available. Some common types are-1. FTP
2. HTTP3. Gopher4. IRC
5. MSN6. AIM7. ICQ
8. VOIP
9. SSL
Depending on the purpose you can get Proxy Servers to route any of these commonprotocols, and many more. So out of the common types of Proxy Servers, you end up withthe following:
FTP Proxy Server:
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
10/13
Relays and caches FTP Traffic.
HTTP Proxy Server:
A one way request to retrieve Web Pages.
Socks Proxy Server:
A newer protocol to allow relaying of far more different types of data, whether TCP or
UDP.
NAT Proxy Server:
This one works a little different, it allows the redirection of all packets without a
Program having to support a Proxy Server.
SSL Proxy Server:
An extension was created to the HTTP Proxy Server which allows relaying of TCP
data similar to a Socks Proxy Server. This one done mainly to allow encryption ofWeb Page requests.
Furthermore, a Proxy Server can be split into another two Categories:
Anonymous
An Anonymous Proxy Server blocks the remote Computer from knowing the identity
of the Computer using the Proxy Server to make requests.
Transparent
A Transparent Proxy Server tells the remote Computer the IP Address of yourComputer. This provides no privacy.
Anonymous Proxy Servers can further be broken down into two more categories, Elite and
Disguised. An Elite Proxy Server is not identifiable to the remote computer as a Proxy in any
way. A Disguised Proxy Server gives the remote computer enough information to let it knowthat it is a Proxy, however it still does not give away the IP of the Computer it is relaying
information for.
How to Setup a Proxy Server
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
11/13
A proxy server is one that receives requests intended for another server and that acts on the behalf of
the client (as the client proxy) to obtain the requested service. It is often used when the client and the
server are incompatible for direct connection. For example, the client may be unable to meet the
security authentication requirements of the server but may be required to access some services. It
may also be used for screening purposes to enable the administrator to control access to undesirable
sites. The proxy server may also be used for caching purposes, which enables faster access to
frequently used websites. All the computers connected to the LAN access the Internet through a singleIP address, resulting in improved security simply because the number of ports exposed is reduced.
Proxy servers work on the seventh layer (theApplication Layer) of theOSI model, thus tending to be
application dependent unlikefirewallsthat work at lower layers. They are also more difficult to install
and maintain than firewalls, as proxy functions for each application protocol like HTTP, SMTP, or
SOCKS must be configured individually. However, a properly configured proxy server improves
network security and performance. Since proxy servers function at the OSI Application layer, their
filtering capabilities are relatively intelligent. For example, proxy web servers can check the URL
(Uniform Resource Locator) of outgoing requests for Web pages by inspecting HTTP, GET and POSTmessages. Using this feature, network administrators can bar access to illegal domains but allow
access to other sites. Ordinary firewalls, in contrast, cannot see Web domain names inside those
messages. Likewise, ordinary routers can filter incoming data traffic byport numberor network
address, but proxy servers can also filter based on application content inside the messages.
WinProxy
One of the most popular proxy servers available for Windows based systems isWinProxy. One of the
reasons for its popularity is that no software has to be installed on the client systems. This is possible
since WinProxy is a transparent proxy server, meaning that it also provides NAT (Network Address
Translation). Due to this, the client system is virtually unaware of the proxy servers existence. Apart
from the usual caching and security features, it also supports important protocols like HTTP, Real
Audio/Video, Mail,FTP,NNTPNews, Telnet, Socks, Secure Sockets,DNS, IMAP 4, etc.
The WinProxy Server may be installed and configured as follows:
1. Install the TCP/IP protocol on all systems connected to the network.
2. Run the Install Wizard. The first screen is the product registration screen, which requires the
user to enter the product key.
http://www.tech-faq.com/application-layer.htmlhttp://www.tech-faq.com/application-layer.htmlhttp://www.tech-faq.com/application-layer.htmlhttp://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/firewall.htmlhttp://www.tech-faq.com/firewall.htmlhttp://www.tech-faq.com/firewall.htmlhttp://www.tech-faq.com/what-port-number-is-xxx-on.htmlhttp://www.tech-faq.com/what-port-number-is-xxx-on.htmlhttp://www.tech-faq.com/what-port-number-is-xxx-on.htmlhttp://www.winproxy.cz/http://www.winproxy.cz/http://www.winproxy.cz/http://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/nntp.htmlhttp://www.tech-faq.com/nntp.htmlhttp://www.tech-faq.com/nntp.htmlhttp://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/nntp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.winproxy.cz/http://www.tech-faq.com/what-port-number-is-xxx-on.htmlhttp://www.tech-faq.com/firewall.htmlhttp://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/application-layer.html8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
12/13
3. The next two screens require information about the Internet connection. Select the
connections type and name.
4. Enter the username and password of the Internet connection to be used.
5. WinProxy then configures the internal and external IP addresses. It automatically assigns a
unique address to each device on the LAN as internal addresses. The IP address that the ISP
assigns to the modem/router is taken as the external address.6. WinProxy then prompts the user to disconnect from the Internet if he/she is already
connected.
7. In the final step, WinProxy works through all the steps and verifies that all operations have
been performed properly.
What is a proxy server?
A proxy server, also known as a "proxy" or "application level gateway", is a computerthat acts as a gateway between a local network (e.g., all the computers at one companyor in one building) and a larger-scale network such as the Internet. Proxy serversprovide increased performance and security. In some cases, they monitor employees'use of outside resources.
A proxy server works by intercepting connections between sender and receiver. Allincoming data enters through one port and is forwarded to the rest of the network viaanother port. By blocking direct access between two networks, proxy servers make itmuch more difficult for hackers to get internal addresses and details of a privatenetwork.
Some proxy servers are a group of applications or servers that block common Internetservices. For example, an HTTP proxy intercepts web access, and an SMTP proxyintercepts email. A proxy server uses a network addressing scheme to present oneorganization-wide IP address to the Internet. The server funnels all user requests to theInternet and returns responses to the appropriate users. In addition to restricting accessfrom outside, this mechanism can prevent inside users from reaching specific Internetresources (e.g., certain web sites). A proxy server can also be one of the components ofa firewall.
Proxies may also cache web pages. Each time an internal user requests a URL from
outside, a temporary copy is stored locally. The next time an internal user requests thesame URL, the proxy can serve the local copy instead of retrieving the original acrossthe network, improving performance.
Note: Do not confuse a proxy server with a NAT (Network Address Translation) device.A proxy server connects to, responds to, and receives traffic from the Internet, acting onbehalf of the client computer, while a NAT device transparently changes the originationaddress of traffic coming through it before passing it to the Internet.
8/2/2019 A Proxy Server Shares One Internet Connection With ALL the Computers on Your Local Network or It is a Computer
13/13
For those who understand the OSI (Open System Interconnection) model of networking,the technical difference between a proxy and a NAT is that the proxy server works onthe transport layer (layer 4) or higher of the OSI model, whereas a NAT works on thenetwork layer (layer 3).