Proxy Server
It’s
a server that acts as a bridge for requests from the clients seeking resources
from other servers. A client connects to
the proxy server, requesting some services, such as a file, connection, webpage
or other resources available from the different server.
Advantages
of Proxy Server
- Provides anonymity on the Internet, since there is no direct link between you and the server.
- It can be used to block undesired sites.
- Can be used to log the Internet usage of the users in a specified network.
- Can also provide some features which are generally found in Firewalls & Intrusion Prevention Systems such as scanning the transmitted content for Malwares before delivery.
- They are also used to scan outgoing traffic to prevent data leakage.
Note: Proxy Server that does not change any
request (Incoming/Outgoing) is usually considered as a Gateway.
Types
of Proxy
- Caching Proxy Server
- Web Proxy Server
- Content Filtering Server
- Anonymizing Proxy Server
- Hostile Proxy
- Transparent Proxy Server
- Reverse Proxy
Caching
Proxy Server
Web
Proxy Server
It’s a
server which only serves the HTTP Traffic. It can be used to block URLs that
contains blacklisted words or websites. Mostly found in Corporate Networks.
Content
Filtering Servers
It provides more control over the Internet that
is passing through the Proxy Server. It’s usually used in combination with web
proxy servers.
It also supports user authentication to control internet access and it also
helps in monitoring the type of traffic generated by individual users which may
be employees of a company or students in a university.
Anonymous
Proxy Server
It’s used to hide the user’s identity while
using the Internet. They are deployed as open proxy and are difficult to track.
Mainly used by hackers.
Hostile
Proxy:
Transparent
Proxy Server
Intercepting
Proxy Server
Also known as “Hidden Proxy” . It associates
itself with the Network’s Gateway or Router. All the Traffic originating in the
network has to pass through the Proxy Server, even if the user has no specific
configuration for using the proxy. The user won’t even be aware that the Proxy Server exists on the Gateway of the
Network.
Reverse
Proxy Server
Types
of Web Proxy Servers
Transparent
Proxy
It’s a proxy which reveals the IP address of the
Proxy being used as well as the IP address of the client who is suing the Proxy
Server.
Anonymous
Proxy
Elite
Proxy
It’s a proxy which hide the user in such a way
that it makes it very difficult for a Server to trace back whether the request
is coming from the proxy server or if it’s coming through the original user.
Elite proxy servers are usually paid and available by paying money.
Socket
Chain Proxy
Is a program that allows working with any
Internet Service through a chain of SOCKs or HTTP proxies to hide the IP
address.
Tor Proxy
(The Onion Routing Project)
It is a
system intended to enable online anonymity, composed of client software and a
network of servers which can mask information about user’s location and other
factors which might identify them.
Squid
Proxy Server
- It’s a proxy server which was created in Linux based systems. Now works with Windows too.
- It is used as a proxy server for monitoring outgoing traffic and to enforce an organization’s rules & policies.
- It is used to prevent data leakage. Its other uses are to speed up the surfing experience of the users by caching the web, DNS and other computer lookups.
Bypass
Proxy Server & Firewall
Http Tunneling is a process by which we can
bypass the application based firewalls and proxy servers.
What is
Packet Filtering?
Packet Filtering is a process of passing data
packets through the network interface based on source & destination
addresses, ports, protocols, keywords or URLs. It is normally used in combination with the Firewall. Today latest firewalls are being made with the capability of packet filtering
pre-installed.
Difference
–Proxy Server & Firewalls
0 Comments
I'd love to hear your thoughts!