OF
CSE404
TOPIC-INSTALLATION OF PROXY
SERVER
• INTRODUCTION
• WINPROXY
• TROUBLESHOOTING
• REFERENCES
INTODUCTION
A proxy server that passes requests and replies unmodified is usually called a gateway or
sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user
and the destination servers on the Internet.
A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect
access to a server on a private network, commonly also performing tasks such as load-
balancing, authentication, decryption or caching.
A proxy server is one that receives requests intended for another server and that acts on the
behalf of the client (as the client proxy) to obtain the requested service. A proxy server is often
used when the client and the server are incompatible for direct connection. For example, the
client may be unable to meet the security authentication requirements of the server but may be
required to access some services. It may also be used for screening purposes to enable the
administrator to control access to undesirable sites. The proxy server may also be used for
caching purposes which enables faster access to frequently used websites. All the computers
connected to the LAN access the Internet through a single IP address which results in
improved security simply because the number of ports exposed is reduced.
Proxy servers work on the seventh layer (theApplication Layer) of the OSI model thus tending to
be application dependent unlike firewalls that work at lower layers. They are also more difficult
to install and maintain than firewalls, as proxy functionality for each application protocol like
HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy
server improves network security and performance. Since proxy servers function at the OSI
Application layer, their filtering capabilities are relatively intelligent. For example, proxy web
servers can check the URL (Uniform Resource Locator) of outgoing requests for Web pages by
inspecting HTTP GET and POST messages. Using this feature, network administrators can bar
access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot
see Web domain names inside those messages. Likewise for incoming data traffic, ordinary
routers can filter by port number or network address, but proxy servers can also filter based on
application content inside the messages.
WINPROXY
One of the most popular proxy servers available for Windows based systems is WinProxy. One
of the reasons for its popularity is that no software has to be installed on the client systems. This
is possible since WinProxy is a transparent proxy server meaning that it also provides NAT
(Network Address Translation). Due to this the client system is virtually unaware of the
existence of the proxy server. Apart from the usual caching and security features it also
supports important protocols like HTTP, Real Audio/Video, Mail, FTP, NNTP News, Telnet,
Socks, Secure Sockets, DNS, IMAP 4, etc.
The following screen shots demonstrate access to the Network menu where the network
address of the server is set. The 1 Show menu choice displays the current settings.
The remaining Network Menu choices set the server Name, Address, Netmask, Broadcast,
and Gateway addresses respectively, as required for the local network.
Setting Up Proxies
The server supports up to eight proxies, numbered 1 to 8. By default, Proxy 1 is set to listen on
the standard telnet port 23. Proxies 2 and 3 are set to the standard Internet browser port 80
(Proxy 2 handles the TCP port and Proxy 3 handles the UDP file-transfer port. By default, the
hosts for these proxies are the telnet server (port 1923) and http server (port 1980) on the Proxy
Server.
The 1 Show menu choice displays the current settings of the selected proxy. The 2 Enabled
menu choice toggles the proxy; that is, selecting the 2 Enabled choice disables the selected
proxy
The first three menu choices (AutoTN, Proto, and Host) are toggles. The last two menu
choices (Kalive and Timeout) prompt for numeric values. The following screen shots
demonstrate setting the Timeout option.
Setting the Proxy Wakeup Option
The server can automatically send a keystroke and/or series of characters to the host after an
interrupted session is re-established. If the proxy is supporting a VT, 5250, or 3270 telnet
emulation, the keystroke for the respective protocol may be selected by menu. Entering a ?
displays the available keys. For example, the following screenshots demonstrate the selection
of the function key pf12 in the VT protocol
Note that the hexadecimal representation of the protocol sequence is displayed in a
colondelimited
format. The 5 Custom menu choice permits direct input of any desired sequence in
this same format.
Command Option
This option provides for the execution of a local process to establish a proxy session. For
example, a Secure Shell proxy for an SSH host is created by selecting the Command option
and
making an entry as follows:
/usr/bin/ssh address
where address is the IP address of the SSH host
Security
The crf administration and tec passwords are changed from the Main Menu choice, 4 Security.
The user will be prompted to enter the passwords twice. Warning: The unit must be shipped
back to the factory for a re-load if the passwords are forgotten.
Troubleshooting
• http://en.wikipedia.org/wiki/Proxy_server
• http://www.tech-faq.com/how-to-setup-a-proxy-server.html
• http://www.connectrf.com/Documents/manproxy.pdf