2. OVERVIEW OF PROXY SERVERS
ï Proxy servers
ï Also called proxy services, application-level gateways, or application proxies
ï Specialized firewall software applications
ï Evaluate the application-layer data buried in the data portion of an IP packet
ï Most common to dedicate a device to a single application
ï HTTP forWeb traffic, SMTP for e-mail, etc.
ï Proxies can:
ï Conceal the end users in a network
ï Filter out undesirableWeb sites
ï Block harmful content
3. HOW PROXY SERVERSWORK
ï Function as a software go-between
ï Screen all traffic into and out of the relevant ports
ï Decide whether to block or allow traffic based on rules set up by the proxy server
administrator
ï Question: What is a concern with proxy servers?
4. HOW PROXY SERVERS DIFFER FROM
PACKET FILTERS
ï Create much more detailed log file listings than packet filters
ï Rebuild the packet with new source IP information
ï Shields internal users from those on the outside
ï Attacks that can start with mangled packet data never reach the internal host
ï Far more critical to network communications than packet filters
5. SAMPLE PROXY SERVER CONFIGURATIONS
Computer that has two separate network
interfaces, one to the external Internet and
one to the internal LAN
Packet filter has an interface on the Internet
Configured so that external traffic is allowed to pass only if it is destined for
a service provided on the proxy server
Sits on the protected side of the perimeter
6. BENEFITS OF PROXY SERVERS
ï Conceal internal clients from external clients
ï External clients see a single machine
ï Commonly used to share Internet connections
ï Block URLâs
ï Block users from accessing certain URLs
ï Configure either IP addresses or DNS names
ï Security policy
ï More effective method of preventing employees from visiting certain Web sites
ï URLs can easily be changed
ï Block and Filter Content
ï Configure to scan packets for questionable content
ï Java applets or ActiveX controls
ï Executable files attached to e-mail messages
ï Parameters: time, IP address, and port number
ï All proxy server products scan the payload of a packet
ï Provide some sort of content-filtering system
ï Proxy servers provide very complete log files
ï Most proxy server products can prompt users who connect to the server for a username and password
7. CONFIGURING PROXY SERVERS
ï Make sure proxy server has enough capacity
ï If it gets overloaded, client performance will suffer
ï Must configure the environment properly
ï Configuration of the proxy server itself
ï May need to configure each piece of client software that uses the proxy server
ï Potential security vulnerabilities
ï Present a single point of failure for the network
ï Susceptible to various forms of attack
8. CONFIGURING CLIENTS
ï Configure each client program to work with the proxy server
ï Specify for FTP and Gopher connections
ï Browser can use the SOCKS standard
ï Configuration file
ï Browsers on your network can automatically
retrieve the proxy settings
9. TYPES OF PROXIES
Transparent Proxy
ï Totally invisible to end users
ï Sits between two networks like a
router
ï Firewall intercepts outgoing
traffic
ï Directs it to a specific computer,
such as a proxy server
Nontransparent Proxy
ï Also called explicit proxies
ï Require that the client software
be configured
ï All target traffic is forwarded to
the proxy at a single target port
ï Typically by means of the SOCKS
protocol
ï Require more labor to configure
than transparent proxies
ï Each client program must be set
up to route all requests to a single
port
ï Provide greater security than
transparent proxies
SOCKS Proxy
ï Totally invisible to end users
ï Sits between two networks like a
router
ï Firewall intercepts outgoing
traffic
ï Directs it to a specific computer,
such as a proxy server
10. REVERSE PROXIES
ï Acts as a proxy for inbound connections
ï Used outside the firewall as a secure content server to outside clients
ï Prevent direct, unmonitored access to your serverâs data from outside your company
ï Benefits
ï Performance
ï Cut down on unnecessary requests
ï Reduces the load on the companyâsWeb server
ï Privacy
ï Stand-in for aWeb server can protect sensitive information
stored on that Web server that must remain secure
11. WHEN A PROXY SERVER ISNâTTHE
CORRECT CHOICE
ï Some organizations find that a proxy server slows down traffic excessively
ï Might use ISP proxy server
ï But better off installing and configuring own proxy server even for small home or
business network