INSTALLATION OF PROXY SERVER Term Paper

Embed Size (px)

Citation preview

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    1/16

    TERM PAPEROF

    CSE404 TOPIC-INSTALLATION OF PROXY

    SERVER

    SUBMITTED TO:- SUBMITTED BY:-

    MISS JASNEET KAUR SHAHWAZ AHMAD

    ROLL NO:-F27E1B25

    REG NO:-1070070146

    SECTION:-F27E1

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    2/16

    CONTENTS

    INTRODUCTION

    WHAT IS PROXY SEVER

    WINPROXY

    INSTALLATION OF PROXY SERVER

    telnet login

    setting up network adresss

    setting up proxies

    setting proxy options

    Setting the Proxy Wakeup Optio command optio

    security

    Saving Changes and Rebooting

    TROUBLESHOOTING

    FORGOT THE SERVER IP ADDRESS?

    USING A DIALOG SCRIPT ON THE TERMINAL?

    REFERENCES

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    3/16

    INTODUCTION

    In computer networks, a proxy server is a server(a computer system or an application program)

    that acts as an intermediary for requests fromclients seeking resources from other servers. A

    client connects to the proxy server, requesting some service, such as a file, connection, web

    page, or other resource, available from a different server. The proxy server evaluates the

    request according to its filtering rules. For example, it may filter traffic byIP address orprotocol.

    If the request is validated by the filter, the proxy provides the resource by connecting to the

    relevant server and requesting the service on behalf of the client. A proxy server may optionally

    alter the client's request or the server's response, and sometimes it may serve the request

    without contacting the specified server. In this case, it 'caches' responses from the remote

    server, and returns subsequent requests for the same content directly.

    A proxy server has a large variety of potential purposes, including:

    To keep machines behind it anonymous (mainly forsecurity).[1]

    To speed up access to resources (using caching). Web proxies are commonly used

    to cache web pages from a web server.[2]

    To apply access policy to network services or content, e.g. to block undesired sites.

    To log / audit usage, i.e. to provide company employee Internet usage reporting.

    To bypass security/ parental controls.

    To scan transmitted content for malware before delivery.

    To scan outbound content, e.g., for data leak protection.

    To circumvent regional restrictions.

    A proxy server that passes requests and replies unmodified is usually called agateway or

    sometimes tunneling proxy.

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Proxy_server#cite_note-0http://en.wikipedia.org/wiki/Proxy_server#cite_note-0http://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Proxy_server#cite_note-1http://en.wikipedia.org/wiki/Gateway_(computer_networking)http://en.wikipedia.org/wiki/Gateway_(computer_networking)http://en.wikipedia.org/wiki/Server_(computing)http://en.wikipedia.org/wiki/Client_(computing)http://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Proxy_server#cite_note-0http://en.wikipedia.org/wiki/Cachehttp://en.wikipedia.org/wiki/Proxy_server#cite_note-1http://en.wikipedia.org/wiki/Gateway_(computer_networking)http://en.wikipedia.org/wiki/Computer_network
  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    4/16

    A proxy server can be placed in the user's local computer or at various points between the user

    and the destination servers on the Internet.

    Areverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect

    access to a server on a private network, commonly also performing tasks such as load-

    balancing, authentication, decryption or caching.

    WHAT IS PROXY SERVER

    A proxy server is one that receives requests intended for another server and that acts on the

    behalf of the client (as the client proxy) to obtain the requested service. A proxy server is often

    used when the client and the server are incompatible for direct connection. For example, the

    client may be unable to meet the security authentication requirements of the server but may be

    required to access some services. It may also be used for screening purposes to enable the

    administrator to control access to undesirable sites. The proxy server may also be used for

    caching purposes which enables faster access to frequently used websites. All the computers

    connected to the LAN access the Internet through a single IP address which results in

    improved security simply because the number of ports exposed is reduced.

    http://en.wikipedia.org/wiki/Reverse_proxyhttp://en.wikipedia.org/wiki/Reverse_proxyhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=247&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=497&letter=L&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=68&letter=I&lang=enhttp://en.wikipedia.org/wiki/Reverse_proxyhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=247&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=497&letter=L&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=68&letter=I&lang=en
  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    5/16

    Proxy servers work on the seventh layer (theApplication Layer) of the OSI model thus tending to

    be application dependent unlike firewalls that work at lower layers. They are also more difficult

    to install and maintain than firewalls, as proxy functionality for each application protocol likeHTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy

    server improves network security and performance. Since proxy servers function at the OSI

    Application layer, their filtering capabilities are relatively intelligent. For example, proxy web

    servers can check the URL (Uniform Resource Locator) of outgoing requests for Web pages by

    inspecting HTTP GET and POST messages. Using this feature, network administrators can bar

    access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot

    see Web domain names inside those messages. Likewise for incoming data traffic, ordinary

    routers can filter by port numberor network address, but proxy servers can also filter based onapplication content inside the messages.

    WINPROXY

    One of the most popular proxy servers available for Windows based systems isWinProxy. One

    of the reasons for its popularity is that no software has to be installed on the client systems. This

    is possible since WinProxy is a transparent proxy server meaning that it also provides NAT

    (Network Address Translation). Due to this the client system is virtually unaware of the

    existence of the proxy server. Apart from the usual caching and security features it also

    supports important protocols like HTTP, Real Audio/Video, Mail,FTP,NNTPNews, Telnet,

    Socks, Secure Sockets, DNS, IMAP 4, etc.

    The WinProxy Server may be installed and configured as follows as follows:

    1. Install the TCP/ IP protocol on all systems connected to the network.

    2. Run the Install Wizard. The first screen is the product registration screen which require

    you to enter the product key.3. The next two screens require information about your Internet connection. Select the type

    of connection and the name of your connection.

    4. Enter the username and password of the Internet connection to be used.

    http://www.topbits.com/application-layer.htmlhttp://www.topbits.com/osi-model.htmlhttp://www.topbits.com/firewall.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=248&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=552&letter=N&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=208&letter=U&lang=enhttp://www.topbits.com/what-port-number-is-xxx-on.htmlhttp://www.winproxy.com/http://www.winproxy.com/http://www.topbits.com/nat-network-address-translation.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/nntp.htmlhttp://www.topbits.com/nntp.htmlhttp://www.topbits.com/what-is-dns.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=464&letter=I&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=469&letter=I&lang=enhttp://www.topbits.com/application-layer.htmlhttp://www.topbits.com/osi-model.htmlhttp://www.topbits.com/firewall.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=248&letter=P&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=552&letter=N&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=208&letter=U&lang=enhttp://www.topbits.com/what-port-number-is-xxx-on.htmlhttp://www.winproxy.com/http://www.topbits.com/nat-network-address-translation.htmlhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/nntp.htmlhttp://www.topbits.com/what-is-dns.htmlhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=464&letter=I&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=469&letter=I&lang=en
  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    6/16

    5. WinProxy then configures the internal and external IP addresses. It automatically

    assigns a unique address to each device on the LAN as internal addresses. The IP

    address assigned to the modem/ routerby your ISP is taken as the external address.

    6. WinProxy then prompts you to disconnect from the Internet if you are already connected.

    7. In the final step WinProxy works through all the steps and verifies that all operations

    have been performed properly.

    INSTALLATION OF PROXY SERVER

    Installation of the Secure Proxy Server entails the following steps:

    Apply power to the server.

    Establish a telnet connection to the server and login.

    Assign the appropriate local network address to the server.

    Setup at least one proxy.

    Reboot the server and connect it to the local network.

    Telnet Login

    The default network address of the server is 192.168.0.100. The initial telnet session, at port

    1923, used to configure the server for the local network can be established by one of the

    following methods:

    Connect a wireless access point (AP) directly to the ethernet port on the server.

    Connect the server to a hub and connect a PC to the same hub. Configure the PC as

    follows:

    IP Address: 192.168.0.100

    Netmask: 255.255.255.0

    Gateway: None

    The following screen shots demonstrate a telnet login using a wireless terminal running the

    PowerNet Twin Client:

    http://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=532&letter=M&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=109&letter=R&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=477&letter=I&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=532&letter=M&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=109&letter=R&lang=enhttp://www.tech-faq.com/index.php?option=com_glossary&Itemid=208&id=477&letter=I&lang=en
  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    7/16

    Log in as tec with the default password of tec123. The administrative setup menu system is

    accessed by typing the command su crf (note that there are spaces on both sides of thedash) , using the default password of crf123. The setup menu system is very simple: Menu

    selections are made by pressing the menu number key followed by the Enter key. Returning to

    a previous menu is accomplished by pressing the Enter key alone.

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    8/16

    Setting the Network Address

    The following screen shots demonstrate access to the Network menu where the network

    address of the server is set. The 1 Show menu choice displays the current settings.

    The remaining Network Menu choices set the serverName, Address, Netmask, Broadcast,

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    9/16

    and Gateway addresses respectively, as required for the local network.

    Setting Up Proxies

    The server supports up to eight proxies, numbered 1 to 8. By default, Proxy 1 is set to listen on

    the standard telnet port 23. Proxies 2 and 3 are set to the standard Internet browser port 80

    (Proxy 2 handles the TCP port and Proxy 3 handles the UDP file-transfer port. By default, the

    hosts for these proxies are the telnet server (port 1923) and http server (port 1980) on the Proxy

    Server.

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    10/16

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    11/16

    menu choice toggles the proxy; that is, selecting the 2 Enabled choice disables the selected

    proxy

    Setting Proxy Options

    The following options may be configured for each proxy:

    Option Description Values

    AutoTN Automatic telnet session parameter re-negotiation

    after an interrupted session is re-established

    -On, -Off

    Proto NETWORK PROTOCOL TCP, UDP

    HOST Type of host Telnet,Web

    Wakeup Keystrokes sent to the host automatically after an

    interrupted session is re-established

    Kalive Socket level keep alive 0=off, 1=on

    Timeout Inactivity timer, in minutes 0=off, 1-9999 minutes

    COMMAND Run a local process See Command Option

    The first three menu choices (AutoTN, Proto, and Host) are toggles. The last two menu

    choices (Kalive and Timeout) prompt for numeric values. The following screen shots

    demonstrate setting the Timeout option.

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    12/16

    Setting the Proxy Wakeup Option

    The server can automatically send a keystroke and/or series of characters to the host after an

    interrupted session is re-established. If the proxy is supporting a VT, 5250, or 3270 telnet

    emulation, the keystroke for the respective protocol may be selected by menu. Entering a ?

    displays the available keys. For example, the following screenshots demonstrate the selection

    of the function key pf12 in the VT protocol

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    13/16

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    14/16

    Note that the hexadecimal representation of the protocol sequence is displayed in a

    colondelimited

    format. The 5 Custom menu choice permits direct input of any desired sequence in

    this same format.

    Command Option

    This option provides for the execution of a local process to establish a proxy session. For

    example, a Secure Shell proxy for an SSH host is created by selecting the Command option

    and

    making an entry as follows:

    /usr/bin/ssh address

    where address is the IP address of the SSH host

    Security

    The crf administration and tec passwords are changed from the Main Menu choice, 4 Security.

    The user will be prompted to enter the passwords twice. Warning: The unit must be shipped

    back to the factory for a re-load if the passwords are forgotten.

    Saving Changes and RebootingAfter the Network, Proxy, and Security have been configured for the local network, select the 5

    Save choice from the Main Menu

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    15/16

    After responding with y to the Reboot (y/n)? prompt, the unit will reboot automatically with the

    new network settings and with the enabled proxies running. Subsequent telnet access to the

    unit is then made at its new address on the local network.

    Troubleshooting

    Forgot the Server IP Address?

    Connect the supplied USB-to-serial cable to the server. Then obtain a null-modem cable and

    make the connection to a serial port on a PC. Run telnet on the PC to login and access the

    menu system. The servers serial port is set to 9600 baud, 8 data bits, no parity, 1 stop bit.

    Using a Dialog Script on the Terminal?

    The script will need to be modified to handle an automatically re-established session. The ideal

    method for handling this will depend on the script itself. In the simplest case, the user can beprompted with an option to bypass the script and go directly into session. Alternately, the script

    can be changed to recognize the application screen and bypass the rest of the script

    automatically.

  • 8/8/2019 INSTALLATION OF PROXY SERVER Term Paper

    16/16

    REFERENCES

    http://en.wikipedia.org/wiki/Proxy_server

    http://www.tech-faq.com/how-to-setup-a-proxy-server.html

    http://www.connectrf.com/Documents/manproxy.pdf

    http://en.wikipedia.org/wiki/Proxy_serverhttp://www.tech-faq.com/how-to-setup-a-proxy-server.htmlhttp://www.connectrf.com/Documents/manproxy.pdfhttp://en.wikipedia.org/wiki/Proxy_serverhttp://www.tech-faq.com/how-to-setup-a-proxy-server.htmlhttp://www.connectrf.com/Documents/manproxy.pdf