Anda di halaman 1dari 16

TERM PAPER

OF
CSE404
TOPIC-INSTALLATION OF PROXY
SERVER

SUBMITTED TO:- SUBMITTED BY:-


MISS JASNEET KAUR SHAHWAZ AHMAD
ROLL NO:-F27E1B25
REG NO:-1070070146
SECTION:-F27E1
CONTENTS

• INTRODUCTION

• WHAT IS PROXY SEVER

• WINPROXY

• INSTALLATION OF PROXY SERVER


 telnet login
 setting up network adresss
 setting up proxies
 setting proxy options
 Setting the Proxy Wakeup Optio
 command optio
 security
 Saving Changes and Rebooting

• TROUBLESHOOTING

 FORGOT THE SERVER IP ADDRESS?

 USING A DIALOG SCRIPT ON THE TERMINAL?

• REFERENCES
INTODUCTION

In computer networks, a proxy server is a server (a computer system or an application program)


that acts as an intermediary for requests from clients seeking resources from other servers. A
client connects to the proxy server, requesting some service, such as a file, connection, web
page, or other resource, available from a different server. The proxy server evaluates the
request according to its filtering rules. For example, it may filter traffic by IP address orprotocol.
If the request is validated by the filter, the proxy provides the resource by connecting to the
relevant server and requesting the service on behalf of the client. A proxy server may optionally
alter the client's request or the server's response, and sometimes it may serve the request
without contacting the specified server. In this case, it 'caches' responses from the remote
server, and returns subsequent requests for the same content directly.

A proxy server has a large variety of potential purposes, including:

 To keep machines behind it anonymous (mainly for security).[1]


 To speed up access to resources (using caching). Web proxies are commonly used
to cache web pages from a web server.[2]
 To apply access policy to network services or content, e.g. to block undesired sites.
 To log / audit usage, i.e. to provide company employee Internet usage reporting.
 To bypass security/ parental controls.
 To scan transmitted content for malware before delivery.
 To scan outbound content, e.g., for data leak protection.
 To circumvent regional restrictions.

A proxy server that passes requests and replies unmodified is usually called a gateway or
sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user
and the destination servers on the Internet.

A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect
access to a server on a private network, commonly also performing tasks such as load-
balancing, authentication, decryption or caching.

WHAT IS PROXY SERVER

A proxy server is one that receives requests intended for another server and that acts on the
behalf of the client (as the client proxy) to obtain the requested service. A proxy server is often
used when the client and the server are incompatible for direct connection. For example, the
client may be unable to meet the security authentication requirements of the server but may be
required to access some services. It may also be used for screening purposes to enable the
administrator to control access to undesirable sites. The proxy server may also be used for
caching purposes which enables faster access to frequently used websites. All the computers
connected to the LAN access the Internet through a single IP address which results in
improved security simply because the number of ports exposed is reduced.
Proxy servers work on the seventh layer (theApplication Layer) of the OSI model thus tending to
be application dependent unlike firewalls that work at lower layers. They are also more difficult
to install and maintain than firewalls, as proxy functionality for each application protocol like
HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy
server improves network security and performance. Since proxy servers function at the OSI
Application layer, their filtering capabilities are relatively intelligent. For example, proxy web
servers can check the URL (Uniform Resource Locator) of outgoing requests for Web pages by
inspecting HTTP GET and POST messages. Using this feature, network administrators can bar
access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot
see Web domain names inside those messages. Likewise for incoming data traffic, ordinary
routers can filter by port number or network address, but proxy servers can also filter based on
application content inside the messages.

WINPROXY
One of the most popular proxy servers available for Windows based systems is WinProxy. One
of the reasons for its popularity is that no software has to be installed on the client systems. This
is possible since WinProxy is a transparent proxy server meaning that it also provides NAT
(Network Address Translation). Due to this the client system is virtually unaware of the
existence of the proxy server. Apart from the usual caching and security features it also
supports important protocols like HTTP, Real Audio/Video, Mail, FTP, NNTP News, Telnet,
Socks, Secure Sockets, DNS, IMAP 4, etc.

The WinProxy Server may be installed and configured as follows as follows:

1. Install the TCP/ IP protocol on all systems connected to the network.


2. Run the Install Wizard. The first screen is the product registration screen which require
you to enter the product key.
3. The next two screens require information about your Internet connection. Select the type
of connection and the name of your connection.
4. Enter the username and password of the Internet connection to be used.
5. WinProxy then configures the internal and external IP addresses. It automatically
assigns a unique address to each device on the LAN as internal addresses. The IP
address assigned to the modem/ router by your ISP is taken as the external address.
6. WinProxy then prompts you to disconnect from the Internet if you are already connected.
7. In the final step WinProxy works through all the steps and verifies that all operations
have been performed properly.

INSTALLATION OF PROXY SERVER


Installation of the Secure Proxy Server entails the following steps:
• Apply power to the server.
• Establish a telnet connection to the server and login.
• Assign the appropriate local network address to the server.
• Setup at least one proxy.
• Reboot the server and connect it to the local network.
Telnet Login
The default network address of the server is 192.168.0.100. The initial telnet session, at port
1923, used to configure the server for the local network can be established by one of the
following methods:
• Connect a wireless access point (AP) directly to the ethernet port on the server.
• Connect the server to a hub and connect a PC to the same hub. Configure the PC as
follows:
• IP Address: 192.168.0.100
• Netmask: 255.255.255.0
• Gateway: None
The following screen shots demonstrate a telnet login using a wireless terminal running the
PowerNet Twin Client:
Log in as tec with the default password of tec123. The administrative setup menu system is
accessed by typing the command su – crf (note that there are spaces on both sides of the
dash) , using the default password of crf123. The setup menu system is very simple: Menu
selections are made by pressing the menu number key followed by the Enter key. Returning to
a previous menu is accomplished by pressing the Enter key alone.
Setting the Network Address

The following screen shots demonstrate access to the Network menu where the network
address of the server is set. The 1 Show menu choice displays the current settings.

The remaining Network Menu choices set the server Name, Address, Netmask, Broadcast,
and Gateway addresses respectively, as required for the local network.
Setting Up Proxies
The server supports up to eight proxies, numbered 1 to 8. By default, Proxy 1 is set to listen on
the standard telnet port 23. Proxies 2 and 3 are set to the standard Internet browser port 80
(Proxy 2 handles the TCP port and Proxy 3 handles the UDP file-transfer port. By default, the
hosts for these proxies are the telnet server (port 1923) and http server (port 1980) on the Proxy
Server.
The 1 Show menu choice displays the current settings of the selected proxy. The 2 Enabled
menu choice toggles the proxy; that is, selecting the 2 Enabled choice disables the selected
proxy

Setting Proxy Options


The following options may be configured for each proxy:

Option Description Values

AutoTN Automatic telnet session parameter re-negotiation -On, -Off


after an interrupted session is re-established
Proto NETWORK PROTOCOL TCP, UDP
HOST Type of host Telnet,Web

Wakeup Keystrokes sent to the host automatically after an


interrupted session is re-established

Kalive Socket level keep alive 0=off, 1=on

Timeout Inactivity timer, in minutes 0=off, 1-9999 minutes

COMMAND Run a local process See Command Option

The first three menu choices (AutoTN, Proto, and Host) are toggles. The last two menu
choices (Kalive and Timeout) prompt for numeric values. The following screen shots
demonstrate setting the Timeout option.
Setting the Proxy Wakeup Option
The server can automatically send a keystroke and/or series of characters to the host after an
interrupted session is re-established. If the proxy is supporting a VT, 5250, or 3270 telnet
emulation, the keystroke for the respective protocol may be selected by menu. Entering a ?
displays the available keys. For example, the following screenshots demonstrate the selection
of the function key pf12 in the VT protocol
Note that the hexadecimal representation of the protocol sequence is displayed in a
colondelimited
format. The 5 Custom menu choice permits direct input of any desired sequence in
this same format.

Command Option
This option provides for the execution of a local process to establish a proxy session. For
example, a Secure Shell proxy for an SSH host is created by selecting the Command option
and
making an entry as follows:
/usr/bin/ssh address
where address is the IP address of the SSH host

Security
The crf administration and tec passwords are changed from the Main Menu choice, 4 Security.
The user will be prompted to enter the passwords twice. Warning: The unit must be shipped
back to the factory for a re-load if the passwords are forgotten.

Saving Changes and Rebooting


After the Network, Proxy, and Security have been configured for the local network, select the 5
Save choice from the Main Menu
After responding with y to the Reboot (y/n)? prompt, the unit will reboot automatically with the
new network settings and with the enabled proxies running. Subsequent telnet access to the
unit is then made at its new address on the local network.

Troubleshooting

Forgot the Server IP Address?


Connect the supplied USB-to-serial cable to the server. Then obtain a null-modem cable and
make the connection to a serial port on a PC. Run telnet on the PC to login and access the
menu system. The server’s serial port is set to 9600 baud, 8 data bits, no parity, 1 stop bit.

Using a Dialog Script on the Terminal?


The script will need to be modified to handle an automatically re-established session. The ideal
method for handling this will depend on the script itself. In the simplest case, the user can be
prompted with an option to bypass the script and go directly into session. Alternately, the script
can be changed to recognize the application screen and bypass the rest of the script
automatically.
REFERENCES

• http://en.wikipedia.org/wiki/Proxy_server
• http://www.tech-faq.com/how-to-setup-a-proxy-server.html
• http://www.connectrf.com/Documents/manproxy.pdf

Anda mungkin juga menyukai