“A server that sits between a client application, such as a web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, the proxy server forwards the request to a real server.
2. Proxy Server
“A server that sits between a client
application, such as a web browser, and a
real server. It intercepts all requests to the
real server to see if it can fulfill the requests
itself. If not, the proxy server forwards the
request to a real server.
3. Proxy servers have two main
purposes:
improved performance: Proxy servers can dramatically
improve performance for groups of users. This is because
it saves the results of all requests for a certain amount of
time.
filter requests: Proxy servers can also be used to filter
requests
4. Managed Timed Proxy Server
any proxy server, with timing capabilities, that requires some
human interaction. The human administering an individual’s
proxy request may interact with the proxy server through
several methods:
! Remote console (may require NOC access)
! Electronic mail (requires authentication via web)
! Administrator interface (secured web interface)
! SSH or S/TELNET interface
5. Any one of these methods will work in effectively
administering the managed timed proxy
server. The recommended method of administering
this type of proxy server is through the
combined utilization of both email and webified
interfaces. All of these methods should be securely
connected utilizing 128-bit SSL
encryption. They can also integrate with any existing
mechanism of delivery.
6. This makes the integration process with the proxy
server much easier, thus
enabling it to be a self-contained process that is
inline with the proxies request; and the
managed timed proxy server is defined in lieu of the
firewall or default gateway for any given
network that requires a proxies connection outward.
Conversely, the firewall would connect
only with the managed timed proxy server for all
outward network requests, granting access
via the proxy server, and denying any other requests
that are not within its trusted exception
list.
7. The need to manage a timed proxy request
for any given user may stem from the fact that
more and more companies have publicly
stated that they are loosing productivity to
their
employees browsing web sites that are not
company related, or that information found is
not
utilized for any given project, network, system
or application that may require attention.
8. On the external side, the internal NIC of the firewall is
connected to the external NIC of the
MTPS, either directly or connected to the switch on the
internal or trusted portion of the
network. The external NIC of the firewall is connected
either to the router, or another
switch on the exposed or untrusted portion of the
network. This configuration is almost
representative of an inline-DMZ configuration but really
isn’t as the MTPS offers little
protection against inward attacks. Thus, the internal
networks behind the MTPS are
prevented from any outward traffic, and the firewall only
permits traffic from either the
MTPS and/or specified servers located within the DMZ.
9. The MTPS server can interface with an SQL
database or independently of any database
through a set of indexed files. Indexed files
would be based upon a root of the entire tree,
which is at its root and is the subnet for the
network being serviced. If more than one
subnet is being serviced, then the root will
consist of several branches that will contain
each
subnet.