SlideShare a Scribd company logo
Unrestricted InternetUnrestricted Internet
Access Using a ProxyAccess Using a Proxy
ServerServer
What is a Proxy Server /
VPN?
A virtual private network is defined as: a computer
network that is implemented in an additional software
layer on top of an existing larger network for the
purpose of creating a private scope of computer
communications
What does that mean in layman’s
terms?

When you type Facebook.com into your browser the
Great Firewall blocks access because that site is on
a list. Anything on the list cannot be accessed directly
from within the ‘Firewall because it controls incoming
and outgoing connections. A proxy is an intermediary
server which is not on the list and it, in turn, connects
to any site you want since its access is unrestricted.
Once software is installed and activated the process
is seamless and you won’t notice which sites are
blocked and which aren’t. Browse your friends
Facebook photos to your hearts content and tweet
about them if you like.
Is this free?

Of the services available several are free and
monetized by advertising and others are ad-
free but require a monthly fee. The most well
known among free options was Hotspot
Shield, although it bombarded users with
advertisements and didn’t always work – that
was before it was blocked outright.
Unfortunately free proxies seem to get nailed
pretty quickly so if you want a reliable solution
you’ll be paying for the privilege of unrestricted
internet access.
A web proxy server is a program that makes
requests for web pages on behalf of all the
other machines on your intranet. The proxy
server will cache the pages it retrieves from
the web so that if 3 machines request the
same page only one transfer from the Internet
is required. If your organization has a number
of commonly used web sites this can save on
Internet accesses.
How fast is it? Are there any
downsides?

Since average internet speeds in China are
sub-par even for developing countries,
Freedur can easily max out my residential
2mb China Telecom internet connection which
at its fastest, is downloading at 200kb/s. The
Freedur application is small and works
flawlessly – once the accompanying Firefox
plugin is installed the giant On button works
like you’d expect.
Allowed subnets

In here, at least the subnets of the active
zones (no DMZ ) should be findable. The entry
of a subnetwork under this option allows
general access to the Web-proxy. If for
example, remote/local VPN networks or locally
connected networks that are neither in green
nor defined in blue should be connected to the
proxy, you just can enter the subnet with the
subnet mask in here.
The Network based access
control

Builds the main component of the "Access
control lists", and includes a few others, not
listed in the IPFire webinterface options. In
here the traffic control from Squid happens,
where the access to Squid and further from
Squid away can be managed.
Unrestricted Internet Access Using a Proxy Server
Disable internal proxy access to
Green from other subnets

If the proxy is activated and used for both
zones (blue and green), there is the possibility
to reach the green zone from the blue zone
via http or https over the proxy. At this moment
the zone separation produced by IPTables is
bypassed. If this should be prevented, a hook
needs to be set.
Disable internal proxy access to
Blue from other subnets

If the proxy is activated and used for both
zones (blue and green), there is the possibility
to reach the blue zone from the green zone
via http or https over the proxy. At this moment
the zone separation produced by IPTables is
bypassed. If this should be prevented, a hook
needs to be set. However, a direct access
from green to blue is already possible
Unrestricted Internet Access Using a Proxy Server
Unrestricted IP addresses

All IP addresses which are listed in here have
no restrictions by the following regulation
areas of ”Time ristrictions”, ”Transfer limits” or
the ”MIME-type filter”.
Unrestricted MAC addresses

All MAC addresses which are listed in here
have no restrictions by the following regulation
areas of ”Time restrictions”, ”Transfer limits” or
the ”MIME-type filter”.

Banned IP addresses:- All IP addresses that
are entered here will be completely blocked by
the proxy.

Banned MAC addresses:-All MAC addresses
that are entered here will be completely
blocked by the proxy.

Unregistered IP's or MAC addresses:-IP or
MAC addresses which are neither entered in
the unrestricted section nor in the banned one,
are restricted by the ”Time restrictions”,
”Transfer limits” or/and the ”MIME-type filter”.
Thanking you....
For more info log on to..
http://proxiesforrent.com

More Related Content

PPT
Unristricted proxy
PPT
Proxy server
PDF
WT - Firewall & Proxy Server
PPT
Web Proxy Server
PPT
Proxy Servers & Firewalls
PPT
Proxy servers
PPT
Proxy Servers
PPTX
Http Proxy Server
Unristricted proxy
Proxy server
WT - Firewall & Proxy Server
Web Proxy Server
Proxy Servers & Firewalls
Proxy servers
Proxy Servers
Http Proxy Server

What's hot (20)

PPTX
Proxy Presentation
PPT
Firewall with proxy server.
PPTX
Firewall & Proxy Server
PPT
Proxy Server
DOC
seminar on proxyserver
PPTX
SharePoint and Forefront United Access Gateway
PPTX
Web proxy server
PPTX
web communication protocols in IoT
PPT
Proxy Servers
PPTX
Virtual private network, vpn presentation
PPTX
Proxy Server: A Comprehensive Guide
PDF
Lec 7(HTTP Protocol)
PPTX
Virtual Private Networks
PPTX
Advantages of proxy server
PDF
How High-speed Dial-up Work
DOC
Firewall
PPTX
Hypertext transfer protocol (http)
PPTX
Http basics by-joshi_29_4_15-ppt
PPTX
HTTP Request Header and HTTP Status Code
Proxy Presentation
Firewall with proxy server.
Firewall & Proxy Server
Proxy Server
seminar on proxyserver
SharePoint and Forefront United Access Gateway
Web proxy server
web communication protocols in IoT
Proxy Servers
Virtual private network, vpn presentation
Proxy Server: A Comprehensive Guide
Lec 7(HTTP Protocol)
Virtual Private Networks
Advantages of proxy server
How High-speed Dial-up Work
Firewall
Hypertext transfer protocol (http)
Http basics by-joshi_29_4_15-ppt
HTTP Request Header and HTTP Status Code
Ad

Similar to Unrestricted Internet Access Using a Proxy Server (20)

PPTX
Firewall vpn proxy
PPT
Uses of proxies
PPTX
Transparent proxy - SIP - 2014 - NCC LAB
PDF
Proxy Server
PPTX
Web proxy server
PPTX
Group18_Awesome4some:Proxy server.ppt
PDF
Ce hv6 module 54 proxy server technologies
PPS
PPT
Squid server
PPT
Proxies
PDF
Web+proxy Posts - Page 1
DOCX
May proxy be_with_you
PDF
Information System Security
PPTX
Implementing transparent proxy server with acl
PPTX
Proxy http ftp dns email
PDF
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
PPTX
cybersecurity unit 5 basics of cybersecurity
PPT
Proxy servers-firewalls
PPT
Proxies
Firewall vpn proxy
Uses of proxies
Transparent proxy - SIP - 2014 - NCC LAB
Proxy Server
Web proxy server
Group18_Awesome4some:Proxy server.ppt
Ce hv6 module 54 proxy server technologies
Squid server
Proxies
Web+proxy Posts - Page 1
May proxy be_with_you
Information System Security
Implementing transparent proxy server with acl
Proxy http ftp dns email
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
cybersecurity unit 5 basics of cybersecurity
Proxy servers-firewalls
Proxies
Ad

More from Proxies Rent (20)

PPT
Torrent
PPT
Features supported by squid proxy server
PPT
Reverse proxy
PPT
Optimiszing proxy
PPT
PPT
How to bypass web restrictions
PPT
Hidden ip does not allow hackers to identify your location
PPT
Securely managed and timed proxy server
PPT
Proxies
PPT
Reverse proxy
PPT
How to access torrent
PPT
Bandwidth proxyserver
PPT
Optimiszing proxy
PPT
Torrent
PPT
PPT
Optimizing proxy
PPT
How to access torrent?
PPT
Proxy : effective logs for tracking down usage trends
PPT
Proxy For employee monitoring
PPT
L ive streaming
Torrent
Features supported by squid proxy server
Reverse proxy
Optimiszing proxy
How to bypass web restrictions
Hidden ip does not allow hackers to identify your location
Securely managed and timed proxy server
Proxies
Reverse proxy
How to access torrent
Bandwidth proxyserver
Optimiszing proxy
Torrent
Optimizing proxy
How to access torrent?
Proxy : effective logs for tracking down usage trends
Proxy For employee monitoring
L ive streaming

Recently uploaded (20)

PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
IFRS Notes in your pocket for study all the time
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
Lecture (1)-Introduction.pptx business communication
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
340036916-American-Literature-Literary-Period-Overview.ppt
Daniels 2024 Inclusive, Sustainable Development
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Ôn tập tiếng anh trong kinh doanh nâng cao
IFRS Notes in your pocket for study all the time
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Belch_12e_PPT_Ch18_Accessible_university.pptx
Nidhal Samdaie CV - International Business Consultant
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
HR Introduction Slide (1).pptx on hr intro
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
New Microsoft PowerPoint Presentation - Copy.pptx
Principles of Marketing, Industrial, Consumers,
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Deliverable file - Regulatory guideline analysis.pdf
Lecture (1)-Introduction.pptx business communication

Unrestricted Internet Access Using a Proxy Server

  • 1. Unrestricted InternetUnrestricted Internet Access Using a ProxyAccess Using a Proxy ServerServer
  • 2. What is a Proxy Server / VPN? A virtual private network is defined as: a computer network that is implemented in an additional software layer on top of an existing larger network for the purpose of creating a private scope of computer communications
  • 3. What does that mean in layman’s terms?  When you type Facebook.com into your browser the Great Firewall blocks access because that site is on a list. Anything on the list cannot be accessed directly from within the ‘Firewall because it controls incoming and outgoing connections. A proxy is an intermediary server which is not on the list and it, in turn, connects to any site you want since its access is unrestricted. Once software is installed and activated the process is seamless and you won’t notice which sites are blocked and which aren’t. Browse your friends Facebook photos to your hearts content and tweet about them if you like.
  • 4. Is this free?  Of the services available several are free and monetized by advertising and others are ad- free but require a monthly fee. The most well known among free options was Hotspot Shield, although it bombarded users with advertisements and didn’t always work – that was before it was blocked outright. Unfortunately free proxies seem to get nailed pretty quickly so if you want a reliable solution you’ll be paying for the privilege of unrestricted internet access.
  • 5. A web proxy server is a program that makes requests for web pages on behalf of all the other machines on your intranet. The proxy server will cache the pages it retrieves from the web so that if 3 machines request the same page only one transfer from the Internet is required. If your organization has a number of commonly used web sites this can save on Internet accesses.
  • 6. How fast is it? Are there any downsides?  Since average internet speeds in China are sub-par even for developing countries, Freedur can easily max out my residential 2mb China Telecom internet connection which at its fastest, is downloading at 200kb/s. The Freedur application is small and works flawlessly – once the accompanying Firefox plugin is installed the giant On button works like you’d expect.
  • 7. Allowed subnets  In here, at least the subnets of the active zones (no DMZ ) should be findable. The entry of a subnetwork under this option allows general access to the Web-proxy. If for example, remote/local VPN networks or locally connected networks that are neither in green nor defined in blue should be connected to the proxy, you just can enter the subnet with the subnet mask in here.
  • 8. The Network based access control  Builds the main component of the "Access control lists", and includes a few others, not listed in the IPFire webinterface options. In here the traffic control from Squid happens, where the access to Squid and further from Squid away can be managed.
  • 10. Disable internal proxy access to Green from other subnets  If the proxy is activated and used for both zones (blue and green), there is the possibility to reach the green zone from the blue zone via http or https over the proxy. At this moment the zone separation produced by IPTables is bypassed. If this should be prevented, a hook needs to be set.
  • 11. Disable internal proxy access to Blue from other subnets  If the proxy is activated and used for both zones (blue and green), there is the possibility to reach the blue zone from the green zone via http or https over the proxy. At this moment the zone separation produced by IPTables is bypassed. If this should be prevented, a hook needs to be set. However, a direct access from green to blue is already possible
  • 13. Unrestricted IP addresses  All IP addresses which are listed in here have no restrictions by the following regulation areas of ”Time ristrictions”, ”Transfer limits” or the ”MIME-type filter”.
  • 14. Unrestricted MAC addresses  All MAC addresses which are listed in here have no restrictions by the following regulation areas of ”Time restrictions”, ”Transfer limits” or the ”MIME-type filter”.
  • 15.  Banned IP addresses:- All IP addresses that are entered here will be completely blocked by the proxy.  Banned MAC addresses:-All MAC addresses that are entered here will be completely blocked by the proxy.
  • 16.  Unregistered IP's or MAC addresses:-IP or MAC addresses which are neither entered in the unrestricted section nor in the banned one, are restricted by the ”Time restrictions”, ”Transfer limits” or/and the ”MIME-type filter”.
  • 17. Thanking you.... For more info log on to.. http://proxiesforrent.com