SlideShare uma empresa Scribd logo
1 de 9
WEB PROXY
SERVER
        A Presentation on Proxy Server




Vikas Reddy Merugu
WEB PROXY SERVER

• It is a specialized HTTP Server.

• Functions as a firewall.

  • Protects client computers from Hackers by
    limiting outside access to clients.

• Allows all clients connected to Web Proxy
  Server to access Internet from behind
  “firewall.”

• Client computer(s) are allowed access
  past firewall with minimum effort and
  without compromising security.
HOW DOES IT WORKS ?

• Web Proxy Server listens for any request from
  clients.

• All requests are forwarded to remote internet
  servers outside firewall.

• Also listens for responses or request from
  outside the firewall (external servers) and
  sends to them to internal client computers.

• Usually, all clients with a subnet use the same
  proxy server.

• This makes it possible for the proxy server to
  cache documents that are requested by one
  or more clients (repeatedly).
CONTINUE…


• For clients using a web proxy server, it is as if
  they are getting responses directly from a
  remote server.

• Clients without a Domain Name Service can
  still access the Web

• All that is needed is the proxy server’s IP
  address.

• Most Web Proxy Servers are implemented on
  a per-access method
  basis.

  • It can allow or deny internet requests
    according to the protocol
     used.

  • For Example: A proxy server can allow
    calls to FTP while but deny
    calls to HTTP servers.
HOW DO BROWSERS ACCESS
INTERNET ?

• In some cases, certain browsers cannot
  access the Web because they are behind
  a firewall.
• In these cases, the web proxy server can
  retrieve any desired files for them.
CONTROLLING ACCESS TO
INTERNET
• Web proxy server makes it possible to filter
  client “transactions” at the protocol level.

• Controls access to services for individual
  methods, hosts, as well
  as domains.
• For Example, web proxy servers allows
  administrators to:

  • Decide which requests to grant permission
    to and which ones to turn down.

  • Specify the URL(s) masks of locations that
    you don’t want the proxy server to serve.

  • Specify which protocols clients can use the
    services based on their IP address.
COMMUNICATING THROUGH
PROXY SERVER

• The Proxy server acts as both a server system and
  a client system.

• The proxy server uses the header fields passed to
  it by the browser without modification when it
  connects to the remote server.

• A complete proxy server should be able to
  communicate all the Web protocols, the most
  important ones being HTTP, FTP, Gopher, and
  WAIS.

• When a browser sends a request through a proxy
  server, the browser always uses HTTP for the
  transactions with the proxy server.
HOW PROXY ACCESS CONTROL
WORKS ?

•   Scenario: an off-site (or off-campus) user connects to the
    Internet via an ISP and wants to connect to an IP-
    restricted resource:
-   user Y from outside internal network requests access to
    internal resource- proxy server prompts user Y for
    validation.
-   user Y is validated (proxy server masks user Y's IP-
    address)
-   resource.com assumes user Y is an institutional
    computer
Thank you for your kind
       attention

Mais conteúdo relacionado

Mais procurados

How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server WorksMer Joyce
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy servergreatbury
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELFShehab Imam
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideHTS Hosting
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy ServerJainul Musani
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows codeandyou forums
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.stableproxies
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Technologies
 

Mais procurados (20)

Proxy
ProxyProxy
Proxy
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELF
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Proxy server
Proxy serverProxy server
Proxy server
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Cc proxy
Cc proxyCc proxy
Cc proxy
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
 

Semelhante a Web proxy server

Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesVi Tính Hoàng Nam
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns emailHeera K S
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurityJayaMishra170943
 
CNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application TechnologiesCNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application TechnologiesSam Bowne
 
CNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesSam Bowne
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.pptMohammed Ilyas
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITDeepraj Bhujel
 
HTTP - The Other Face Of Domino
HTTP - The Other Face Of DominoHTTP - The Other Face Of Domino
HTTP - The Other Face Of DominoGabriella Davis
 
Ch 3: Web Application Technologies
Ch 3: Web Application TechnologiesCh 3: Web Application Technologies
Ch 3: Web Application TechnologiesSam Bowne
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smugglingApijay Kumar
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smugglingApijay Kumar
 

Semelhante a Web proxy server (20)

Unit v
Unit v Unit v
Unit v
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Forefront UAG
Forefront UAGForefront UAG
Forefront UAG
 
CNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application TechnologiesCNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application Technologies
 
CNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application Technologies
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Browser
BrowserBrowser
Browser
 
1-1.pdf
1-1.pdf1-1.pdf
1-1.pdf
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
HTTP - The Other Face Of Domino
HTTP - The Other Face Of DominoHTTP - The Other Face Of Domino
HTTP - The Other Face Of Domino
 
Ch 3: Web Application Technologies
Ch 3: Web Application TechnologiesCh 3: Web Application Technologies
Ch 3: Web Application Technologies
 
WAF deployment
WAF deploymentWAF deployment
WAF deployment
 
Web Fendamentals
Web FendamentalsWeb Fendamentals
Web Fendamentals
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 

Web proxy server

  • 1. WEB PROXY SERVER A Presentation on Proxy Server Vikas Reddy Merugu
  • 2. WEB PROXY SERVER • It is a specialized HTTP Server. • Functions as a firewall. • Protects client computers from Hackers by limiting outside access to clients. • Allows all clients connected to Web Proxy Server to access Internet from behind “firewall.” • Client computer(s) are allowed access past firewall with minimum effort and without compromising security.
  • 3. HOW DOES IT WORKS ? • Web Proxy Server listens for any request from clients. • All requests are forwarded to remote internet servers outside firewall. • Also listens for responses or request from outside the firewall (external servers) and sends to them to internal client computers. • Usually, all clients with a subnet use the same proxy server. • This makes it possible for the proxy server to cache documents that are requested by one or more clients (repeatedly).
  • 4. CONTINUE… • For clients using a web proxy server, it is as if they are getting responses directly from a remote server. • Clients without a Domain Name Service can still access the Web • All that is needed is the proxy server’s IP address. • Most Web Proxy Servers are implemented on a per-access method basis. • It can allow or deny internet requests according to the protocol used. • For Example: A proxy server can allow calls to FTP while but deny calls to HTTP servers.
  • 5. HOW DO BROWSERS ACCESS INTERNET ? • In some cases, certain browsers cannot access the Web because they are behind a firewall. • In these cases, the web proxy server can retrieve any desired files for them.
  • 6. CONTROLLING ACCESS TO INTERNET • Web proxy server makes it possible to filter client “transactions” at the protocol level. • Controls access to services for individual methods, hosts, as well as domains. • For Example, web proxy servers allows administrators to: • Decide which requests to grant permission to and which ones to turn down. • Specify the URL(s) masks of locations that you don’t want the proxy server to serve. • Specify which protocols clients can use the services based on their IP address.
  • 7. COMMUNICATING THROUGH PROXY SERVER • The Proxy server acts as both a server system and a client system. • The proxy server uses the header fields passed to it by the browser without modification when it connects to the remote server. • A complete proxy server should be able to communicate all the Web protocols, the most important ones being HTTP, FTP, Gopher, and WAIS. • When a browser sends a request through a proxy server, the browser always uses HTTP for the transactions with the proxy server.
  • 8. HOW PROXY ACCESS CONTROL WORKS ? • Scenario: an off-site (or off-campus) user connects to the Internet via an ISP and wants to connect to an IP- restricted resource: - user Y from outside internal network requests access to internal resource- proxy server prompts user Y for validation. - user Y is validated (proxy server masks user Y's IP- address) - resource.com assumes user Y is an institutional computer
  • 9. Thank you for your kind attention