Results 1 to 5 of 5

Thread: Different types of Proxy Servers

  1. #1
    Join Date
    Sep 2010

    Different types of Proxy Servers

    Dedicated Proxy

    A Dedicated Proxy is a efficacy that traffic among the requesting client and the target system provides the. It concentrates in the communications protocol that the service exercises, and can therefore scrutinize the communication and compromise needed their content. In addition, it is able to send its own requests to the communication partner and sometimes to act as temporary storage (ie on its own to respond to a request without having to request it again from the genuine target system). Sometimes it is locally installed on the source or target system, in order to implement the appropriate task on site. In contrast, it may be also an actively engaging communication module filters act in the proxy firewall is placed on a. Among other proxies are as dedicated (such as SMTP -) or virus scanner (such as FTP -) Connection and Command filters are applied.

    On a single device, multiple dedicated proxies in parallel, different protocols to be able to operate. Then it must look into the packets, performs a dedicated proxy its work on the OSI layer 7. Often Dedicated proxies for following protocols used:
    • HTTP / HTTPS
      • SSL termination - An HTTPS connection) may be terminated Web proxy broken (by means to verify its contents to pests as well. The additional encryption to the client (browser) is then provided with a certificate from the proxy. Problem is that the user of the browser no longer the original certificate of the Web server gets to see and the proxy server must trust that it has taken a validation of the web server certificate.
      • Cache - The proxy can store asked questions and their results. If the same question asked again, this may be the answer from memory without installing the Web server to ask. The proxy ensures that the information supplied by it are too old. A complete date is not guaranteed by the rule. By caching queries can be answered more quickly and there is also the network load reduces. For example, one company provides such a proxy all traffic to the computers of the employees with the Internet.
    • SMTP - Some firewalls provide an SMTP proxy that monitors the email traffic between the Internet and mail server and filters out certain dangerous or undesirable commands. The design of the SMTP Protocol, each SMTP server can also be used as an SMTP proxy.
    • IMAP Proxy - Holt, for example, automatically e-mails from the central IMAP server on a local machine from which the clients then pick up the e-mail.
    • IRC Proxy - Such proxy gives IRC connections and can maintain it, even if the client is disconnected.

  2. #2
    Join Date
    Sep 2010

    Re: Different types of Proxy Servers

    Circuit Level Proxy (generic proxy)

    As a circuit level proxy (also known as generic proxy) packet filter module is a means by which a firewall is any IP addresses and ports to lock or unlock, but without the ability to have in order to analyze the packet contents. Such a proxy that operates on the OSI layers 3 and 4 is sufficient, the packets sometimes simple, without terminating the connections themselves. The circuit level proxy implements the address translation then use NAT on the OSI layer 3 During the address filtering is also based on the third OSI layer, it also realized a port filtering on the fourth OSI layer.

    There are also proxy, thanks to a protocol in a position, a specific authentication at the OSI layer 5 to achieve Level Circuit. The client gets such a connection permit, for example, by entering an ID along with password. This special authentication protocol, the client must know, however, why such a QUALIFIED Circuit Level Proxy is less generic (it works with applications to the client together only have been enhanced accordingly). As an example of such an authentication protocol is SOCKS called. Such an extended circuit level proxy does not necessarily back to NAT. Some of them even make it dependent on the protocol. For example, the TCP connection is terminated, while a UDP connection is passed plain. A generic proxy can be utilized for a straightforward redirect. The simplest proxy is the Linux program Redir that listens on a port and a port and passes on the data to a dissimilar interface and port. This is with the iptables command under Linux possible and is utilized for example to the exit traffic of a TOR proxy server to run on several servers in order to defend the TOR.

  3. #3
    Join Date
    Sep 2010

    Re: Different types of Proxy Servers

    Proxy Firewall

    A proxy firewall is a firewall that dedicated proxies and circuit level proxy as filter modules relies on. These filter modules are implementing rules by deciding what data to the actual communication party are transferred, and what not. In this way it tries to proxy firewall's own network (segment) to protect against unauthorized access, but can also make a conversion of the data cache certain content, and exercise all other functions that are peculiar to a proxy.

    Dedicated proxy on a Stateful Inspection Firewall

    Some manufacturers offer for their Stateful Inspection Firewall (SIF) Dedicated to proxies, too. Definition of technical terms, the process is a bit problematic, since this firewall type to the original concept of Checkpoint only on a generic packet filtering is based upon, and only to packet filtering rules test as well, a SIF clear packet filtering firewall classified. However, there is a dedicated proxy is activated, the SIF is actually no packet filter firewall but then everything belongs to the category of proxy firewall, a stateful packet inspection carried out. This precise distinction in the professional world, however, rarely done, so a firewall is classified as a SIF in practice only part of the definition of a packet filter firewall requirements.

    Transparent Proxy

    A Transparent Proxy fundamentally consists of two components. First are the routers the ports you want the logs accumulated (for example, via iptables using a redirect) and then forwarded to a proxy. For users connecting during a transparent proxy in use is interchangeable from a direct connection through the router. The occurrence of a transparent proxies offer the benefits that a proxy configuration settings on each PC can be gone astray.

  4. #4
    Join Date
    Sep 2010

    Re: Different types of Proxy Servers

    Reverse Proxy

    A proxy shall in the case of the reverse proxy as a putative target system in appearance, with the address translation is then performed in the opposite direction and so the client is hidden the true address of the target system. While a typical proxy can be used for multiple clients to its internal (private - self-contained), to grant network access to an external network, a reverse proxy works the other way around.

    Reverse Proxy as a firewall, routing module

    The reverse proxy firewall primarily offer the same functionality as port forwarding, permitting an outwardly initiated connection to a forwarding server after the internal network. Dedicated to work as soon as they proxy, they can appreciate the network protocol and are then also able to network packets to scrutinize and manipulate data. So they can make, for example, a virus scan or rules implemented, referring to the packet contents.

    In contrast, there are also reverse proxies that are not part of the firewall software, and access still pursue the goal from the external network out on an internal computer to be able to without being able to manually configure the firewall accordingly need. For this, the internal computer first establishes a connection to a specific external computer, whereby the external computer through the firewall can communicate across the internal computer. Runs on the external computer, a reverse proxy, so now, any other computer from the external network to the internal computer behind the firewall access, by sending their requests to the reverse proxy of the external computer (the reverse proxy forwards the requests to the internal computer on).

  5. #5
    Join Date
    Sep 2010

    Re: Different types of Proxy Servers

    Reverse Proxy for Performance Optimization

    An entirely different task, a reverse proxy fulfill the requests for a service that takes the to the speed or to improve access to the service rate or extend functionality. It can be installed on the target system locally, or run on separate hardware, and works such as a HTTP accelerator, also called proxy surrogates. Connections from the Internet to a web server to be processed by the proxy, which answered the questions themselves, unless they own in the cache are available, or to the downstream service, or a remote server forwards otherwise.

Similar Threads

  1. How to trace proxy servers?
    By Mellen!camp in forum Networking & Security
    Replies: 1
    Last Post: 20-11-2011, 07:44 PM
  2. Replies: 5
    Last Post: 10-10-2011, 10:47 PM
  3. Reverse proxy issue with two web servers
    By Talish in forum Operating Systems
    Replies: 6
    Last Post: 27-01-2011, 06:46 PM
  4. How to use of reverse proxy technology to protect Web servers
    By Umberto-Micro in forum Technology & Internet
    Replies: 5
    Last Post: 14-02-2010, 04:53 AM
  5. Proxy connection: internal error during proxy evaluation
    By Pandya in forum Software Development
    Replies: 3
    Last Post: 19-08-2009, 02:25 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts