Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Vikas Debnath KV IT-Solutions Pvt. Ltd.

Similar presentations


Presentation on theme: "By Vikas Debnath KV IT-Solutions Pvt. Ltd."— Presentation transcript:

1

2 http://www.linuxsolutions.org.in By Vikas Debnath KV IT-Solutions Pvt. Ltd.

3

4  Part of an overall Firewall strategy  Sits between the local network and the external network ◦ Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance ◦ Primary mission is now to insure anonymity of internal users  Still used for caching of frequently requested files  Also used for content filtering  Acts as a go-between, submitting your requests to the external network ◦ Requests are translated from your IP address to the Proxy’s IP address ◦ E-mail addresses of internal users are removed from request headers ◦ Cause an actual break in the flow of communications KV IT-Solutions Pvt. Ltd.

5  Terminates the TCP connection before relaying to target host (in and out)  Hide internal clients from external network  Blocking of dangerous URLs  Filter dangerous content  Check consistency of retrieved content  Eliminate need for transport layer routing between networks  Single point of access, control and logging KV IT-Solutions Pvt. Ltd.

6  Both the outgoing and incoming TCP connections are terminated  prevents a hacker from hijacking a stale connection on a service that is being proxied  ex. HTTP page request User ProxyServer request packet request packet’ response packet’ response packet Connection left open until the proxy closes it after receiving response packet and sending it back to user Connection only left open until server closes the connection after sending the response packet KV IT-Solutions Pvt. Ltd.

7  Transport layer packets don’t need to be routed because the entire request must be regenerated ◦ Prevents transport layer exploits  source routing  fragmentation  several DoS attacks  Since some protocols don’t have proxies available many admins will enable routing, this alleviates any benefit gained  Most good proxy servers will allow you to create generic proxies using SOCKS or the redir utility KV IT-Solutions Pvt. Ltd.

8 SQUID is the best proxy server in the world. Under GNU Public License KV IT-Solutions Pvt. Ltd.

9 >>> It’s Free “The simplest way to make a program free software is to put it in the public domain, uncopyrighted. This allows people to share the program and their improvements, if they are so minded. But it also allows uncooperative people to convert the program into proprietary software.’’ It’s Free Nothing to pay for SOFTWARE ….!! KV IT-Solutions Pvt. Ltd.

10  C aching ◦ By keeping local copies of frequently accessed file the proxy can serve those files back to a requesting browser without going to the external site each time, this dramatically improves the performance seen by the end user ◦ Only makes sense to implement this at the ISP rather than the small business level because of the number of pages available ◦ Because of dynamic content many pages are invalidated in the cache right away  Load balancing ◦ A proxy can be used in a reverse direction to balance the load amongst a set of identical servers (servers inside the firewall and users outside) ◦ Used especially with web dynamic content (.asp,.php,.cfm,.jsp) KV IT-Solutions Pvt. Ltd.

11  Block downloading of any file extensions  Restrictions on IP Address/MAC Address/User ID Password  Integration with Windows AD /MySql / Ldap Servers  Web Surfing can be monitored  Reduce infection of Virus/Worm/Spyware And a lot more …….. KV IT-Solutions Pvt. Ltd.

12 60% Working hours consumed by surfing Social Networking sites: Orkut.com/Facebook.com/Linkedin.com.. Chat Servers: Gmail chat/MSN/Yahoo messenger… Webmails: gmail.com/yahoo.com/rediffmail.com ( Personal Email Ids )… Job Sites: naukri.com/jobsahead.com/monster.com etc Internet acquired virus/trojan/spyware infections Pornographic Surfing / Free Software Downloading..may infect your NETWORK PROXY CAN CONTROL…….. KV IT-Solutions Pvt. Ltd.

13  Transparent – both parties (local/remote) are unaware that the connection is being proxied  Opaque – the local party must configure client software to use the proxy ◦ client software must be proxy-aware software ◦ Netscape proxy server is opaque  With all of the things modern firewalls can do in the area of redirection you could configure the firewall to redirect all http requests to a proxy ◦ no user configuration required (transparent) KV IT-Solutions Pvt. Ltd.

14  Use a Real Firewall  Disable Routing  Secure the Base Operating System ◦ harden the OS  Disable External Access  Disable un required Services KV IT-Solutions Pvt. Ltd.

15 CALL US @ 9810028374 9810179147 9818001497 kvit@kvitsolutions.com http://linuxsolutions.org.in http://kvitsolutions.com

16  Enterprise Mail Server  Linux Active Directory ( Domain Controller)  Based on samba / Ldap  Firewall/VPN/IDS  NAS ( Network Area Storage )  CRM  LAMP Projects ( Development on PHP / MySql)  File Server  FTP/VNC/LTSP………………..many more KV IT-Solutions Pvt. Ltd.

17 A tested, tried and trusted name Dedicated Team for Linux 24 *7 Support Long list of satisfied clientele KV IT-Solutions Pvt. Ltd. Your Partner for Information Technology


Download ppt "By Vikas Debnath KV IT-Solutions Pvt. Ltd."

Similar presentations


Ads by Google