際際滷

際際滷Share a Scribd company logo
WEB PROXY
SERVER
        A Presentation on Proxy Server




Vikas Reddy Merugu
WEB PROXY SERVER

 It is a specialized HTTP Server.

 Functions as a firewall.

   Protects client computers from Hackers by
    limiting outside access to clients.

 Allows all clients connected to Web Proxy
  Server to access Internet from behind
  firewall.

 Client computer(s) are allowed access
  past firewall with minimum effort and
  without compromising security.
HOW DOES IT WORKS ?

 Web Proxy Server listens for any request from
  clients.

 All requests are forwarded to remote internet
  servers outside firewall.

 Also listens for responses or request from
  outside the firewall (external servers) and
  sends to them to internal client computers.

 Usually, all clients with a subnet use the same
  proxy server.

 This makes it possible for the proxy server to
  cache documents that are requested by one
  or more clients (repeatedly).
CONTINUE


 For clients using a web proxy server, it is as if
  they are getting responses directly from a
  remote server.

 Clients without a Domain Name Service can
  still access the Web

 All that is needed is the proxy servers IP
  address.

 Most Web Proxy Servers are implemented on
  a per-access method
  basis.

   It can allow or deny internet requests
    according to the protocol
     used.

   For Example: A proxy server can allow
    calls to FTP while but deny
    calls to HTTP servers.
HOW DO BROWSERS ACCESS
INTERNET ?

 In some cases, certain browsers cannot
  access the Web because they are behind
  a firewall.
 In these cases, the web proxy server can
  retrieve any desired files for them.
CONTROLLING ACCESS TO
INTERNET
 Web proxy server makes it possible to filter
  client transactions at the protocol level.

 Controls access to services for individual
  methods, hosts, as well
  as domains.
 For Example, web proxy servers allows
  administrators to:

   Decide which requests to grant permission
    to and which ones to turn down.

   Specify the URL(s) masks of locations that
    you dont want the proxy server to serve.

   Specify which protocols clients can use the
    services based on their IP address.
COMMUNICATING THROUGH
PROXY SERVER

 The Proxy server acts as both a server system and
  a client system.

 The proxy server uses the header fields passed to
  it by the browser without modification when it
  connects to the remote server.

 A complete proxy server should be able to
  communicate all the Web protocols, the most
  important ones being HTTP, FTP, Gopher, and
  WAIS.

 When a browser sends a request through a proxy
  server, the browser always uses HTTP for the
  transactions with the proxy server.
HOW PROXY ACCESS CONTROL
WORKS ?

   Scenario: an off-site (or off-campus) user connects to the
    Internet via an ISP and wants to connect to an IP-
    restricted resource:
-   user Y from outside internal network requests access to
    internal resource- proxy server prompts user Y for
    validation.
-   user Y is validated (proxy server masks user Y's IP-
    address)
-   resource.com assumes user Y is an institutional
    computer
Thank you for your kind
       attention
Ad

Recommended

Web Proxy Server
Web Proxy Server
Mohit Dhankher
Firewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
Proxy server
Proxy server
Proxies Rent
Http Proxy Server
Http Proxy Server
Sourav Roy
Firewall with proxy server.
Firewall with proxy server.
stableproxies
Proxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
seminar on proxyserver
seminar on proxyserver
Niraj Barnwal
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
Anitha Selvan
Proxy
Proxy
Triad Square InfoSec
Proxy Servers
Proxy Servers
Sourav Roy
Proxy Servers
Proxy Servers
Sourav Roy
How a Proxy Server Works
How a Proxy Server Works
Mer Joyce
WT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
Advantages of proxy server
Advantages of proxy server
greatbury
Proxy servers
Proxy servers
Kumar
Proxy Server
Proxy Server
guest095022
KILLME NOWITSELF
KILLME NOWITSELF
Shehab Imam
Proxy Presentation
Proxy Presentation
primeteacher32
Proxy server
Proxy server
Dlovan Salih
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
Linux11 Proxy Server
Linux11 Proxy Server
Jainul Musani
How to set up a proxy server on windows
How to set up a proxy server on windows
codeandyou forums
Reverse proxy
Reverse proxy
Proxies Rent
Cc proxy
Cc proxy
Tr動畛ng Ti畛n
Introduction to stable proxies.
Introduction to stable proxies.
stableproxies
Proxy Server
Proxy Server
Netwax Lab
Meeting 4 : proxy
Meeting 4 : proxy
Syaiful Ahdan
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
zigbee
zigbee
mahamad juber
Proxy http ftp dns email
Proxy http ftp dns email
Heera K S

More Related Content

What's hot (20)

Proxy
Proxy
Triad Square InfoSec
Proxy Servers
Proxy Servers
Sourav Roy
Proxy Servers
Proxy Servers
Sourav Roy
How a Proxy Server Works
How a Proxy Server Works
Mer Joyce
WT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
Advantages of proxy server
Advantages of proxy server
greatbury
Proxy servers
Proxy servers
Kumar
Proxy Server
Proxy Server
guest095022
KILLME NOWITSELF
KILLME NOWITSELF
Shehab Imam
Proxy Presentation
Proxy Presentation
primeteacher32
Proxy server
Proxy server
Dlovan Salih
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
Linux11 Proxy Server
Linux11 Proxy Server
Jainul Musani
How to set up a proxy server on windows
How to set up a proxy server on windows
codeandyou forums
Reverse proxy
Reverse proxy
Proxies Rent
Cc proxy
Cc proxy
Tr動畛ng Ti畛n
Introduction to stable proxies.
Introduction to stable proxies.
stableproxies
Proxy Server
Proxy Server
Netwax Lab
Meeting 4 : proxy
Meeting 4 : proxy
Syaiful Ahdan
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
Proxy Servers
Proxy Servers
Sourav Roy
Proxy Servers
Proxy Servers
Sourav Roy
How a Proxy Server Works
How a Proxy Server Works
Mer Joyce
WT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
Advantages of proxy server
Advantages of proxy server
greatbury
Proxy servers
Proxy servers
Kumar
KILLME NOWITSELF
KILLME NOWITSELF
Shehab Imam
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
Linux11 Proxy Server
Linux11 Proxy Server
Jainul Musani
How to set up a proxy server on windows
How to set up a proxy server on windows
codeandyou forums
Introduction to stable proxies.
Introduction to stable proxies.
stableproxies
Proxy Server
Proxy Server
Netwax Lab
Meeting 4 : proxy
Meeting 4 : proxy
Syaiful Ahdan
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies

Similar to Web proxy server (20)

zigbee
zigbee
mahamad juber
Proxy http ftp dns email
Proxy http ftp dns email
Heera K S
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
JayaMishra170943
Information System Security
Information System Security
Elijah Konzo
Firewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
Group20 Dynamic Networks
Group20 Dynamic Networks
hariprasadnr
May proxy be_with_you
May proxy be_with_you
Himani Singh
thesis
thesis
Venkata Jaswanth U
Pre Week13
Pre Week13
Ryosuke
Pre Week14
Pre Week14
Ryosuke
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
Vi T鱈nh Hong Nam
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
Deepraj Bhujel
Apache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse Proxy
Jim Jagielski
Web technology
Web technology
Selvin Josy Bai Somu
WebTechnology Powerpointpresentation.pdf
WebTechnology Powerpointpresentation.pdf
krishkiran2408
Using aphace-as-proxy-server
Using aphace-as-proxy-server
HARRY CHAN PUTRA
Uses of proxies
Uses of proxies
Proxies Rent
Unit v
Unit v
APARNA P
Smuggling TCP traffic through HTTP
Smuggling TCP traffic through HTTP
D叩vid Hal叩sz
Web application development ( basics )
Web application development ( basics )
Chirag Nag
Proxy http ftp dns email
Proxy http ftp dns email
Heera K S
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
JayaMishra170943
Information System Security
Information System Security
Elijah Konzo
Group20 Dynamic Networks
Group20 Dynamic Networks
hariprasadnr
May proxy be_with_you
May proxy be_with_you
Himani Singh
Pre Week13
Pre Week13
Ryosuke
Pre Week14
Pre Week14
Ryosuke
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
Vi T鱈nh Hong Nam
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
Deepraj Bhujel
Apache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse Proxy
Jim Jagielski
WebTechnology Powerpointpresentation.pdf
WebTechnology Powerpointpresentation.pdf
krishkiran2408
Using aphace-as-proxy-server
Using aphace-as-proxy-server
HARRY CHAN PUTRA
Uses of proxies
Uses of proxies
Proxies Rent
Unit v
Unit v
APARNA P
Smuggling TCP traffic through HTTP
Smuggling TCP traffic through HTTP
D叩vid Hal叩sz
Web application development ( basics )
Web application development ( basics )
Chirag Nag
Ad

Web proxy server

  • 1. WEB PROXY SERVER A Presentation on Proxy Server Vikas Reddy Merugu
  • 2. WEB PROXY SERVER It is a specialized HTTP Server. Functions as a firewall. Protects client computers from Hackers by limiting outside access to clients. Allows all clients connected to Web Proxy Server to access Internet from behind firewall. Client computer(s) are allowed access past firewall with minimum effort and without compromising security.
  • 3. HOW DOES IT WORKS ? Web Proxy Server listens for any request from clients. All requests are forwarded to remote internet servers outside firewall. Also listens for responses or request from outside the firewall (external servers) and sends to them to internal client computers. Usually, all clients with a subnet use the same proxy server. This makes it possible for the proxy server to cache documents that are requested by one or more clients (repeatedly).
  • 4. CONTINUE For clients using a web proxy server, it is as if they are getting responses directly from a remote server. Clients without a Domain Name Service can still access the Web All that is needed is the proxy servers IP address. Most Web Proxy Servers are implemented on a per-access method basis. It can allow or deny internet requests according to the protocol used. For Example: A proxy server can allow calls to FTP while but deny calls to HTTP servers.
  • 5. HOW DO BROWSERS ACCESS INTERNET ? In some cases, certain browsers cannot access the Web because they are behind a firewall. In these cases, the web proxy server can retrieve any desired files for them.
  • 6. CONTROLLING ACCESS TO INTERNET Web proxy server makes it possible to filter client transactions at the protocol level. Controls access to services for individual methods, hosts, as well as domains. For Example, web proxy servers allows administrators to: Decide which requests to grant permission to and which ones to turn down. Specify the URL(s) masks of locations that you dont want the proxy server to serve. Specify which protocols clients can use the services based on their IP address.
  • 7. COMMUNICATING THROUGH PROXY SERVER The Proxy server acts as both a server system and a client system. The proxy server uses the header fields passed to it by the browser without modification when it connects to the remote server. A complete proxy server should be able to communicate all the Web protocols, the most important ones being HTTP, FTP, Gopher, and WAIS. When a browser sends a request through a proxy server, the browser always uses HTTP for the transactions with the proxy server.
  • 8. HOW PROXY ACCESS CONTROL WORKS ? Scenario: an off-site (or off-campus) user connects to the Internet via an ISP and wants to connect to an IP- restricted resource: - user Y from outside internal network requests access to internal resource- proxy server prompts user Y for validation. - user Y is validated (proxy server masks user Y's IP- address) - resource.com assumes user Y is an institutional computer
  • 9. Thank you for your kind attention