Upload
shahwaz-ahmad
View
220
Download
0
Embed Size (px)
Citation preview
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
1/16
TERM PAPEROF
CSE404 TOPIC-INSTALLATION OF PROXY
SERVER
SUBMITTED TO:- SUBMITTED BY:-
MISS JASNEET KAUR SHAHWAZ AHMAD
ROLL NO:-F27E1B25
REG NO:-1070070146
SECTION:-F27E1
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
2/16
CONTENTS
INTRODUCTION
WHAT IS PROXY SEVER
WINPROXY
INSTALLATION OF PROXY SERVER
telnet login
setting up network adresss
setting up proxies
setting proxy options
Setting the Proxy Wakeup Optio command optio
security
Saving Changes and Rebooting
TROUBLESHOOTING
FORGOT THE SERVER IP ADDRESS?
USING A DIALOG SCRIPT ON THE TERMINAL?
REFERENCES
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
3/16
INTODUCTION
In computer networks, a proxy server is a server(a computer system or an application program)
that acts as an intermediary for requests fromclients seeking resources from other servers. A
client connects to the proxy server, requesting some service, such as a file, connection, web
page, or other resource, available from a different server. The proxy server evaluates the
request according to its filtering rules. For example, it may filter traffic byIP address orprotocol.
If the request is validated by the filter, the proxy provides the resource by connecting to the
relevant server and requesting the service on behalf of the client. A proxy server may optionally
alter the client's request or the server's response, and sometimes it may serve the request
without contacting the specified server. In this case, it 'caches' responses from the remote
server, and returns subsequent requests for the same content directly.
A proxy server has a large variety of potential purposes, including:
To keep machines behind it anonymous (mainly forsecurity).[1]
To speed up access to resources (using caching). Web proxies are commonly used
to cache web pages from a web server.[2]
To apply access policy to network services or content, e.g. to block undesired sites.
To log / audit usage, i.e. to provide company employee Internet usage reporting.
To bypass security/ parental controls.
To scan transmitted content for malware before delivery.
To scan outbound content, e.g., for data leak protection.
To circumvent regional restrictions.
A proxy server that passes requests and replies unmodified is usually called agateway or
sometimes tunneling proxy.
http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Proxy_server#cite_note-0http://en.wikipedia.org/wiki/Proxy_server#cite_note-0http://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Proxy_server#cite_note-1http://en.wikipedia.org/wiki/Gateway_(computer_networking)http://en.wikipedia.org/wiki/Gateway_(computer_networking)http://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Proxy_server#cite_note-0http://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Proxy_server#cite_note-1http://en.wikipedia.org/wiki/Gateway_(computer_networking)http://en.wikipedia.org/wiki/Computer_network8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
4/16
A proxy server can be placed in the user's local computer or at various points between the user
and the destination servers on the Internet.
Areverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect
access to a server on a private network, commonly also performing tasks such as load-
balancing, authentication, decryption or caching.
WHAT IS PROXY SERVER
A proxy server is one that receives requests intended for another server and that acts on the
behalf of the client (as the client proxy) to obtain the requested service. A proxy server is often
used when the client and the server are incompatible for direct connection. For example, the
client may be unable to meet the security authentication requirements of the server but may be
required to access some services. It may also be used for screening purposes to enable the
administrator to control access to undesirable sites. The proxy server may also be used for
caching purposes which enables faster access to frequently used websites. All the computers
connected to the LAN access the Internet through a single IP address which results in
improved security simply because the number of ports exposed is reduced.
http://en.wikipedia.org/wiki/Reverse_proxyhttp://en.wikipedia.org/wiki/Reverse_proxyhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=247&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=497&letter=L&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=68&letter=I&lang=enhttp://en.wikipedia.org/wiki/Reverse_proxyhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=247&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=497&letter=L&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=68&letter=I&lang=en8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
5/16
Proxy servers work on the seventh layer (theApplication Layer) of the OSI model thus tending to
be application dependent unlike firewalls that work at lower layers. They are also more difficult
to install and maintain than firewalls, as proxy functionality for each application protocol likeHTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy
server improves network security and performance. Since proxy servers function at the OSI
Application layer, their filtering capabilities are relatively intelligent. For example, proxy web
servers can check the URL (Uniform Resource Locator) of outgoing requests for Web pages by
inspecting HTTP GET and POST messages. Using this feature, network administrators can bar
access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot
see Web domain names inside those messages. Likewise for incoming data traffic, ordinary
routers can filter by port numberor network address, but proxy servers can also filter based onapplication content inside the messages.
WINPROXY
One of the most popular proxy servers available for Windows based systems isWinProxy. One
of the reasons for its popularity is that no software has to be installed on the client systems. This
is possible since WinProxy is a transparent proxy server meaning that it also provides NAT
(Network Address Translation). Due to this the client system is virtually unaware of the
existence of the proxy server. Apart from the usual caching and security features it also
supports important protocols like HTTP, Real Audio/Video, Mail,FTP,NNTPNews, Telnet,
Socks, Secure Sockets, DNS, IMAP 4, etc.
The WinProxy Server may be installed and configured as follows as follows:
1. Install the TCP/ IP protocol on all systems connected to the network.
2. Run the Install Wizard. The first screen is the product registration screen which require
you to enter the product key.3. The next two screens require information about your Internet connection. Select the type
of connection and the name of your connection.
4. Enter the username and password of the Internet connection to be used.
http://www.topbits.com/application-layer.htmlhttp://www.topbits.com/osi-model.htmlhttp://www.topbits.com/firewall.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=248&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=552&letter=N&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=208&letter=U&lang=enhttp://www.topbits.com/what-port-number-is-xxx-on.htmlhttp://www.winproxy.com/http://www.winproxy.com/http://www.topbits.com/nat-network-address-translation.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/nntp.htmlhttp://www.topbits.com/nntp.htmlhttp://www.topbits.com/what-is-dns.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=464&letter=I&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=469&letter=I&lang=enhttp://www.topbits.com/application-layer.htmlhttp://www.topbits.com/osi-model.htmlhttp://www.topbits.com/firewall.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=248&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=552&letter=N&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=208&letter=U&lang=enhttp://www.topbits.com/what-port-number-is-xxx-on.htmlhttp://www.winproxy.com/http://www.topbits.com/nat-network-address-translation.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/nntp.htmlhttp://www.topbits.com/what-is-dns.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=464&letter=I&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=469&letter=I&lang=en8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
6/16
5. WinProxy then configures the internal and external IP addresses. It automatically
assigns a unique address to each device on the LAN as internal addresses. The IP
address assigned to the modem/ routerby your ISP is taken as the external address.
6. WinProxy then prompts you to disconnect from the Internet if you are already connected.
7. In the final step WinProxy works through all the steps and verifies that all operations
have been performed properly.
INSTALLATION OF PROXY SERVER
Installation of the Secure Proxy Server entails the following steps:
Apply power to the server.
Establish a telnet connection to the server and login.
Assign the appropriate local network address to the server.
Setup at least one proxy.
Reboot the server and connect it to the local network.
Telnet Login
The default network address of the server is 192.168.0.100. The initial telnet session, at port
1923, used to configure the server for the local network can be established by one of the
following methods:
Connect a wireless access point (AP) directly to the ethernet port on the server.
Connect the server to a hub and connect a PC to the same hub. Configure the PC as
follows:
IP Address: 192.168.0.100
Netmask: 255.255.255.0
Gateway: None
The following screen shots demonstrate a telnet login using a wireless terminal running the
PowerNet Twin Client:
http://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=532&letter=M&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=109&letter=R&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=477&letter=I&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=532&letter=M&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=109&letter=R&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=477&letter=I&lang=en8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
7/16
Log in as tec with the default password of tec123. The administrative setup menu system is
accessed by typing the command su crf (note that there are spaces on both sides of thedash) , using the default password of crf123. The setup menu system is very simple: Menu
selections are made by pressing the menu number key followed by the Enter key. Returning to
a previous menu is accomplished by pressing the Enter key alone.
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
8/16
Setting the Network Address
The following screen shots demonstrate access to the Network menu where the network
address of the server is set. The 1 Show menu choice displays the current settings.
The remaining Network Menu choices set the serverName, Address, Netmask, Broadcast,
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
9/16
and Gateway addresses respectively, as required for the local network.
Setting Up Proxies
The server supports up to eight proxies, numbered 1 to 8. By default, Proxy 1 is set to listen on
the standard telnet port 23. Proxies 2 and 3 are set to the standard Internet browser port 80
(Proxy 2 handles the TCP port and Proxy 3 handles the UDP file-transfer port. By default, the
hosts for these proxies are the telnet server (port 1923) and http server (port 1980) on the Proxy
Server.
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
10/16
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
11/16
menu choice toggles the proxy; that is, selecting the 2 Enabled choice disables the selected
proxy
Setting Proxy Options
The following options may be configured for each proxy:
Option Description Values
AutoTN Automatic telnet session parameter re-negotiation
after an interrupted session is re-established
-On, -Off
Proto NETWORK PROTOCOL TCP, UDP
HOST Type of host Telnet,Web
Wakeup Keystrokes sent to the host automatically after an
interrupted session is re-established
Kalive Socket level keep alive 0=off, 1=on
Timeout Inactivity timer, in minutes 0=off, 1-9999 minutes
COMMAND Run a local process See Command Option
The first three menu choices (AutoTN, Proto, and Host) are toggles. The last two menu
choices (Kalive and Timeout) prompt for numeric values. The following screen shots
demonstrate setting the Timeout option.
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
12/16
Setting the Proxy Wakeup Option
The server can automatically send a keystroke and/or series of characters to the host after an
interrupted session is re-established. If the proxy is supporting a VT, 5250, or 3270 telnet
emulation, the keystroke for the respective protocol may be selected by menu. Entering a ?
displays the available keys. For example, the following screenshots demonstrate the selection
of the function key pf12 in the VT protocol
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
13/16
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
14/16
Note that the hexadecimal representation of the protocol sequence is displayed in a
colondelimited
format. The 5 Custom menu choice permits direct input of any desired sequence in
this same format.
Command Option
This option provides for the execution of a local process to establish a proxy session. For
example, a Secure Shell proxy for an SSH host is created by selecting the Command option
and
making an entry as follows:
/usr/bin/ssh address
where address is the IP address of the SSH host
Security
The crf administration and tec passwords are changed from the Main Menu choice, 4 Security.
The user will be prompted to enter the passwords twice. Warning: The unit must be shipped
back to the factory for a re-load if the passwords are forgotten.
Saving Changes and RebootingAfter the Network, Proxy, and Security have been configured for the local network, select the 5
Save choice from the Main Menu
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
15/16
After responding with y to the Reboot (y/n)? prompt, the unit will reboot automatically with the
new network settings and with the enabled proxies running. Subsequent telnet access to the
unit is then made at its new address on the local network.
Troubleshooting
Forgot the Server IP Address?
Connect the supplied USB-to-serial cable to the server. Then obtain a null-modem cable and
make the connection to a serial port on a PC. Run telnet on the PC to login and access the
menu system. The servers serial port is set to 9600 baud, 8 data bits, no parity, 1 stop bit.
Using a Dialog Script on the Terminal?
The script will need to be modified to handle an automatically re-established session. The ideal
method for handling this will depend on the script itself. In the simplest case, the user can beprompted with an option to bypass the script and go directly into session. Alternately, the script
can be changed to recognize the application screen and bypass the rest of the script
automatically.
8/8/2019 INSTALLATION OF PROXY SERVER Term Paper
16/16
REFERENCES
http://en.wikipedia.org/wiki/Proxy_server
http://www.tech-faq.com/how-to-setup-a-proxy-server.html
http://www.connectrf.com/Documents/manproxy.pdf
http://en.wikipedia.org/wiki/Proxy_serverhttp://www.tech-faq.com/how-to-setup-a-proxy-server.htmlhttp://www.connectrf.com/Documents/manproxy.pdfhttp://en.wikipedia.org/wiki/Proxy_serverhttp://www.tech-faq.com/how-to-setup-a-proxy-server.htmlhttp://www.connectrf.com/Documents/manproxy.pdf