SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Proxy Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contents: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is proxy ? Proxy Proxy is hardware / software Indirect access to other networks e.g INTERNET. all computers on the local network have to go through it before accessing information on the Internet. Organization , universities , companies use proxy systems Proxy act as gateway Proxy act as Cache Server Proxy share a connection to others LAN INTERNET
Main purpose of using proxies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advantages: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disadvantages: ,[object Object],[object Object],[object Object]
Improve Performance ,[object Object],[object Object],[object Object],[object Object],[object Object],INTERNET 64 Kbps 128 Kbps 512 Kbps 1 Mbps
Proxy types ,[object Object],[object Object],[object Object],[object Object],Proxy setting in IE
How does a proxy server work?  ,[object Object],[object Object],[object Object],[object Object]
What do you need for  proxy installation? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 LAN INTERNET Proxy Server Source IP  172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Source IP Address LAN INTERNET Proxy Server Source IP  217.219.66.2 www.yahoo.com Dest IP 209.191.93.52 Source IP  172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Dest. IP Address IP  : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP  209.191.93.52 Dest IP 217.219.66.2 Source IP 209.191.93.52 Dest IP 172.16.0.2
IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Source IP Address  & Destination IP Address IP  : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP  209.191.93.52 Dest IP 217.219.66.2
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 172.16.0.2
Popular hardware & software proxies Software Proxy Hardware Proxy Ms. ISA Server Cisco PIX Squid Blue Coat Kerio WinRoute Cyberoam 1st Up Net Server Alacer CCProxy CProxy Windows ICS WinGate
Thank You, ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Acknowledgements

Weitere ähnliche Inhalte

Was ist angesagt?

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy ServerJainul Musani
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentationprimeteacher32
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https . simplyharshad
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanismJivan Nepali
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server WorksMer Joyce
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Jubayer Al Mahmud
 
Web Application Penetration Testing - 101
Web Application Penetration Testing - 101Web Application Penetration Testing - 101
Web Application Penetration Testing - 101Andrea Hauser
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy servergreatbury
 

Was ist angesagt? (20)

Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Dmz
Dmz Dmz
Dmz
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanism
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking)
 
Web Application Penetration Testing - 101
Web Application Penetration Testing - 101Web Application Penetration Testing - 101
Web Application Penetration Testing - 101
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 

Andere mochten auch

Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptAnitha Selvan
 
Optimizing Proxy Server Performance
Optimizing Proxy Server PerformanceOptimizing Proxy Server Performance
Optimizing Proxy Server PerformanceGeorge Coutsoumbidis
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsDr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsRosanne Hawarden
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxyProxies Rent
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALRuss Dietz
 
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINALRuss Dietz
 
Using email mutiah[23 10-2013]
Using email mutiah[23 10-2013]Using email mutiah[23 10-2013]
Using email mutiah[23 10-2013]Miyu Hoshizora
 
Neogeography
NeogeographyNeogeography
Neogeographyrahul8590
 
Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlationrahul8590
 
Seguridad en IPv6
Seguridad en IPv6Seguridad en IPv6
Seguridad en IPv6Gabriel Marcos
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Managementelliando dias
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Investigacion y practica servidor proxy
Investigacion y practica servidor proxyInvestigacion y practica servidor proxy
Investigacion y practica servidor proxykarla1108
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewallsphanleson
 

Andere mochten auch (19)

Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Optimizing Proxy Server Performance
Optimizing Proxy Server PerformanceOptimizing Proxy Server Performance
Optimizing Proxy Server Performance
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
H0314450
H0314450H0314450
H0314450
 
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsDr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
 
Proxy
ProxyProxy
Proxy
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINAL
 
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
 
Proxy
ProxyProxy
Proxy
 
Using email mutiah[23 10-2013]
Using email mutiah[23 10-2013]Using email mutiah[23 10-2013]
Using email mutiah[23 10-2013]
 
Neogeography
NeogeographyNeogeography
Neogeography
 
Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlation
 
Seguridad en IPv6
Seguridad en IPv6Seguridad en IPv6
Seguridad en IPv6
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Investigacion y practica servidor proxy
Investigacion y practica servidor proxyInvestigacion y practica servidor proxy
Investigacion y practica servidor proxy
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 

Ă„hnlich wie Proxy Servers

Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns emailHeera K S
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideHTS Hosting
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy ServerSourav Roy
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.stableproxies
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurityJayaMishra170943
 
Konsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webKonsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webAhmad Faizar
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy serverProxies Rent
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by stepDewa Ketut Setiawan
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Sahira Khan
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.stableproxies
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu Alessandro De Suoodh
 
Content Delivery Network
Content Delivery NetworkContent Delivery Network
Content Delivery NetworkFaisal Akbar
 
Introduction to Small Business Server 2003 Part 2
Introduction to Small Business Server 2003 Part 2Introduction to Small Business Server 2003 Part 2
Introduction to Small Business Server 2003 Part 2Robert Crane
 
Delivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINXDelivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINXNGINX, Inc.
 
Content Navigation
Content NavigationContent Navigation
Content Navigationsanjoysanyal
 

Ă„hnlich wie Proxy Servers (20)

Squid
SquidSquid
Squid
 
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Konsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webKonsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman web
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy server
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 
Content Delivery Network
Content Delivery NetworkContent Delivery Network
Content Delivery Network
 
Introduction to Small Business Server 2003 Part 2
Introduction to Small Business Server 2003 Part 2Introduction to Small Business Server 2003 Part 2
Introduction to Small Business Server 2003 Part 2
 
Delivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINXDelivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINX
 
Content Navigation
Content NavigationContent Navigation
Content Navigation
 

Mehr von Sourav Roy

Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & groupSourav Roy
 
Remote Login- Noesis
Remote Login- NoesisRemote Login- Noesis
Remote Login- NoesisSourav Roy
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And RloginSourav Roy
 
Project Sparsh
Project SparshProject Sparsh
Project SparshSourav Roy
 
Remote Login
Remote LoginRemote Login
Remote LoginSourav Roy
 
Introduction To H1N1
Introduction To H1N1Introduction To H1N1
Introduction To H1N1Sourav Roy
 
Anabhra Ratri Ki Anupama
Anabhra Ratri Ki AnupamaAnabhra Ratri Ki Anupama
Anabhra Ratri Ki AnupamaSourav Roy
 
Wireshark
WiresharkWireshark
WiresharkSourav Roy
 
Transmission Media
Transmission MediaTransmission Media
Transmission MediaSourav Roy
 

Mehr von Sourav Roy (13)

Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Tcpdump
TcpdumpTcpdump
Tcpdump
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
Remote Login- Noesis
Remote Login- NoesisRemote Login- Noesis
Remote Login- Noesis
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
Project Sparsh
Project SparshProject Sparsh
Project Sparsh
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Introduction To H1N1
Introduction To H1N1Introduction To H1N1
Introduction To H1N1
 
Anabhra Ratri Ki Anupama
Anabhra Ratri Ki AnupamaAnabhra Ratri Ki Anupama
Anabhra Ratri Ki Anupama
 
Wireshark
WiresharkWireshark
Wireshark
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 

KĂĽrzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

KĂĽrzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Proxy Servers

  • 1.
  • 2.
  • 3. What is proxy ? Proxy Proxy is hardware / software Indirect access to other networks e.g INTERNET. all computers on the local network have to go through it before accessing information on the Internet. Organization , universities , companies use proxy systems Proxy act as gateway Proxy act as Cache Server Proxy share a connection to others LAN INTERNET
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 LAN INTERNET Proxy Server Source IP 172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
  • 12. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Source IP Address LAN INTERNET Proxy Server Source IP 217.219.66.2 www.yahoo.com Dest IP 209.191.93.52 Source IP 172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
  • 13. IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Dest. IP Address IP : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 217.219.66.2 Source IP 209.191.93.52 Dest IP 172.16.0.2
  • 14. IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Source IP Address & Destination IP Address IP : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 217.219.66.2
  • 15. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 172.16.0.2
  • 16. Popular hardware & software proxies Software Proxy Hardware Proxy Ms. ISA Server Cisco PIX Squid Blue Coat Kerio WinRoute Cyberoam 1st Up Net Server Alacer CCProxy CProxy Windows ICS WinGate
  • 17.
  • 18.