SlideShare a Scribd company logo
WEB PROXY
SERVER
        A Presentation on Proxy Server




Vikas Reddy Merugu
WEB PROXY SERVER

• It is a specialized HTTP Server.

• Functions as a firewall.

  • Protects client computers from Hackers by
    limiting outside access to clients.

• Allows all clients connected to Web Proxy
  Server to access Internet from behind
  “firewall.”

• Client computer(s) are allowed access
  past firewall with minimum effort and
  without compromising security.
HOW DOES IT WORKS ?

• Web Proxy Server listens for any request from
  clients.

• All requests are forwarded to remote internet
  servers outside firewall.

• Also listens for responses or request from
  outside the firewall (external servers) and
  sends to them to internal client computers.

• Usually, all clients with a subnet use the same
  proxy server.

• This makes it possible for the proxy server to
  cache documents that are requested by one
  or more clients (repeatedly).
CONTINUE…


• For clients using a web proxy server, it is as if
  they are getting responses directly from a
  remote server.

• Clients without a Domain Name Service can
  still access the Web

• All that is needed is the proxy server’s IP
  address.

• Most Web Proxy Servers are implemented on
  a per-access method
  basis.

  • It can allow or deny internet requests
    according to the protocol
     used.

  • For Example: A proxy server can allow
    calls to FTP while but deny
    calls to HTTP servers.
HOW DO BROWSERS ACCESS
INTERNET ?

• In some cases, certain browsers cannot
  access the Web because they are behind
  a firewall.
• In these cases, the web proxy server can
  retrieve any desired files for them.
CONTROLLING ACCESS TO
INTERNET
• Web proxy server makes it possible to filter
  client “transactions” at the protocol level.

• Controls access to services for individual
  methods, hosts, as well
  as domains.
• For Example, web proxy servers allows
  administrators to:

  • Decide which requests to grant permission
    to and which ones to turn down.

  • Specify the URL(s) masks of locations that
    you don’t want the proxy server to serve.

  • Specify which protocols clients can use the
    services based on their IP address.
COMMUNICATING THROUGH
PROXY SERVER

• The Proxy server acts as both a server system and
  a client system.

• The proxy server uses the header fields passed to
  it by the browser without modification when it
  connects to the remote server.

• A complete proxy server should be able to
  communicate all the Web protocols, the most
  important ones being HTTP, FTP, Gopher, and
  WAIS.

• When a browser sends a request through a proxy
  server, the browser always uses HTTP for the
  transactions with the proxy server.
HOW PROXY ACCESS CONTROL
WORKS ?

•   Scenario: an off-site (or off-campus) user connects to the
    Internet via an ISP and wants to connect to an IP-
    restricted resource:
-   user Y from outside internal network requests access to
    internal resource- proxy server prompts user Y for
    validation.
-   user Y is validated (proxy server masks user Y's IP-
    address)
-   resource.com assumes user Y is an institutional
    computer
Thank you for your kind
       attention

More Related Content

PPT
Web Proxy Server
PPTX
Firewall & Proxy Server
PPT
Proxy server
PPTX
Http Proxy Server
PPT
Firewall with proxy server.
PPT
Proxy Servers & Firewalls
DOC
seminar on proxyserver
PPTX
Group18_Awesome4some:Proxy server.ppt
Web Proxy Server
Firewall & Proxy Server
Proxy server
Http Proxy Server
Firewall with proxy server.
Proxy Servers & Firewalls
seminar on proxyserver
Group18_Awesome4some:Proxy server.ppt

What's hot (20)

PPT
Proxy Servers
PPT
Proxy Servers
PPTX
How a Proxy Server Works
PDF
WT - Firewall & Proxy Server
PPTX
Advantages of proxy server
PPT
Proxy servers
PPT
Proxy Server
PPTX
KILLME NOWITSELF
PPTX
Proxy Presentation
PPT
Proxy server
PPTX
Proxy Server: A Comprehensive Guide
PPS
Linux11 Proxy Server
DOCX
How to set up a proxy server on windows
PPT
Reverse proxy
PDF
PPT
Introduction to stable proxies.
PDF
Proxy Server
PDF
Meeting 4 : proxy
PDF
Kerio Connect 7 Features and Benefits
Proxy Servers
Proxy Servers
How a Proxy Server Works
WT - Firewall & Proxy Server
Advantages of proxy server
Proxy servers
Proxy Server
KILLME NOWITSELF
Proxy Presentation
Proxy server
Proxy Server: A Comprehensive Guide
Linux11 Proxy Server
How to set up a proxy server on windows
Reverse proxy
Introduction to stable proxies.
Proxy Server
Meeting 4 : proxy
Kerio Connect 7 Features and Benefits
Ad

Similar to Web proxy server (20)

PPT
PPTX
Proxy http ftp dns email
PPTX
cybersecurity unit 5 basics of cybersecurity
PDF
Information System Security
PPTX
Firewall vpn proxy
PPT
Group20 Dynamic Networks
DOCX
May proxy be_with_you
PDF
Pre Week13
PDF
Pre Week14
PDF
Ce hv6 module 54 proxy server technologies
PDF
Unit 5 - Designing Internet Systems and Servers - IT
KEY
Apache httpd 2.4 Reverse Proxy
PDF
Web technology
PDF
WebTechnology Powerpointpresentation.pdf
PDF
Using aphace-as-proxy-server
PPT
Uses of proxies
PDF
Unit v
PPTX
Smuggling TCP traffic through HTTP
PPTX
Web application development ( basics )
Proxy http ftp dns email
cybersecurity unit 5 basics of cybersecurity
Information System Security
Firewall vpn proxy
Group20 Dynamic Networks
May proxy be_with_you
Pre Week13
Pre Week14
Ce hv6 module 54 proxy server technologies
Unit 5 - Designing Internet Systems and Servers - IT
Apache httpd 2.4 Reverse Proxy
Web technology
WebTechnology Powerpointpresentation.pdf
Using aphace-as-proxy-server
Uses of proxies
Unit v
Smuggling TCP traffic through HTTP
Web application development ( basics )
Ad

Web proxy server

  • 1. WEB PROXY SERVER A Presentation on Proxy Server Vikas Reddy Merugu
  • 2. WEB PROXY SERVER • It is a specialized HTTP Server. • Functions as a firewall. • Protects client computers from Hackers by limiting outside access to clients. • Allows all clients connected to Web Proxy Server to access Internet from behind “firewall.” • Client computer(s) are allowed access past firewall with minimum effort and without compromising security.
  • 3. HOW DOES IT WORKS ? • Web Proxy Server listens for any request from clients. • All requests are forwarded to remote internet servers outside firewall. • Also listens for responses or request from outside the firewall (external servers) and sends to them to internal client computers. • Usually, all clients with a subnet use the same proxy server. • This makes it possible for the proxy server to cache documents that are requested by one or more clients (repeatedly).
  • 4. CONTINUE… • For clients using a web proxy server, it is as if they are getting responses directly from a remote server. • Clients without a Domain Name Service can still access the Web • All that is needed is the proxy server’s IP address. • Most Web Proxy Servers are implemented on a per-access method basis. • It can allow or deny internet requests according to the protocol used. • For Example: A proxy server can allow calls to FTP while but deny calls to HTTP servers.
  • 5. HOW DO BROWSERS ACCESS INTERNET ? • In some cases, certain browsers cannot access the Web because they are behind a firewall. • In these cases, the web proxy server can retrieve any desired files for them.
  • 6. CONTROLLING ACCESS TO INTERNET • Web proxy server makes it possible to filter client “transactions” at the protocol level. • Controls access to services for individual methods, hosts, as well as domains. • For Example, web proxy servers allows administrators to: • Decide which requests to grant permission to and which ones to turn down. • Specify the URL(s) masks of locations that you don’t want the proxy server to serve. • Specify which protocols clients can use the services based on their IP address.
  • 7. COMMUNICATING THROUGH PROXY SERVER • The Proxy server acts as both a server system and a client system. • The proxy server uses the header fields passed to it by the browser without modification when it connects to the remote server. • A complete proxy server should be able to communicate all the Web protocols, the most important ones being HTTP, FTP, Gopher, and WAIS. • When a browser sends a request through a proxy server, the browser always uses HTTP for the transactions with the proxy server.
  • 8. HOW PROXY ACCESS CONTROL WORKS ? • Scenario: an off-site (or off-campus) user connects to the Internet via an ISP and wants to connect to an IP- restricted resource: - user Y from outside internal network requests access to internal resource- proxy server prompts user Y for validation. - user Y is validated (proxy server masks user Y's IP- address) - resource.com assumes user Y is an institutional computer
  • 9. Thank you for your kind attention