TERM PAPER OF CSE404

TOPIC-INSTALLATION OF PROXY SERVER
SUBMITTED TO:MISS JASNEET KAUR SUBMITTED BY:SHAHWAZ AHMAD ROLL NO:-F27E1B25 REG NO:-1070070146 SECTION:-F27E1

CONTENTS

INTRODUCTION

WHAT IS PROXY SEVER

WINPROXY

INSTALLATION OF PROXY SERVER
 telnet login        setting up network adresss setting up proxies setting proxy options Setting the Proxy Wakeup Optio command optio security Saving Changes and Rebooting

TROUBLESHOOTING  FORGOT THE SERVER IP ADDRESS?  USING A DIALOG SCRIPT ON THE TERMINAL?

REFERENCES

INTODUCTION

In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address orprotocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly. A proxy server has a large variety of potential purposes, including:
 

To keep machines behind it anonymous (mainly for security).[1] To speed up access to resources (using caching). Web proxies are commonly used To apply access policy to network services or content, e.g. to block undesired sites. To log / audit usage, i.e. to provide company employee Internet usage reporting. To bypass security/ parental controls. To scan transmitted content for malware before delivery. To scan outbound content, e.g., for data leak protection. To circumvent regional restrictions.

to cache web pages from a web server.[2]
     

A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet. A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as loadbalancing, authentication, decryption or caching. WHAT IS PROXY SERVER A proxy server is one that receives requests intended for another server and that acts on the behalf of the client (as the client proxy) to obtain the requested service. A proxy server is often used when the client and the server are incompatible for direct connection. For example, the client may be unable to meet the security authentication requirements of the server but may be required to access some services. It may also be used for screening purposes to enable the administrator to control access to undesirable sites. The proxy server may also be used for caching purposes which enables faster access to frequently used websites. All the computers connected to the LAN access the Internet through a single IP address which results in improved security simply because the number of ports exposed is reduced.

Proxy servers work on the seventh layer (theApplication Layer) of the OSI model thus tending to be application dependent unlike firewalls that work at lower layers. They are also more difficult to install and maintain than firewalls, as proxy functionality for each application protocol like HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy server improves network security and performance. Since proxy servers function at the OSI Application layer, their filtering capabilities are relatively intelligent. For example, proxy web servers can check the URL (Uniform Resource Locator) of outgoing requests for Web pages by inspecting HTTP GET and POST messages. Using this feature, network administrators can bar access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot see Web domain names inside those messages. Likewise for incoming data traffic, ordinary routers can filter by port number or network address, but proxy servers can also filter based on application content inside the messages.

WINPROXY One of the most popular proxy servers available for Windows based systems is WinProxy. One of the reasons for its popularity is that no software has to be installed on the client systems. This is possible since WinProxy is a transparent proxy server meaning that it also provides NAT (Network Address Translation). Due to this the client system is virtually unaware of the existence of the proxy server. Apart from the usual caching and security features it also supports important protocols like HTTP, Real Audio/Video, Mail, FTP, NNTP News, Telnet, Socks, Secure Sockets, DNS, IMAP 4, etc. The WinProxy Server may be installed and configured as follows as follows: 1. Install the TCP/ IP protocol on all systems connected to the network. 2. Run the Install Wizard. The first screen is the product registration screen which require you to enter the product key. 3. The next two screens require information about your Internet connection. Select the type of connection and the name of your connection. 4. Enter the username and password of the Internet connection to be used.

5. WinProxy then configures the internal and external IP addresses. It automatically assigns a unique address to each device on the LAN as internal addresses. The IP address assigned to the modem/ router by your ISP is taken as the external address. 6. WinProxy then prompts you to disconnect from the Internet if you are already connected. 7. In the final step WinProxy works through all the steps and verifies that all operations have been performed properly.

INSTALLATION OF PROXY SERVER
Installation of the Secure Proxy Server entails the following steps: • • • • • Apply power to the server. Establish a telnet connection to the server and login. Assign the appropriate local network address to the server. Setup at least one proxy. Reboot the server and connect it to the local network.

Telnet Login The default network address of the server is 192.168.0.100. The initial telnet session, at port 1923, used to configure the server for the local network can be established by one of the following methods: • • • • • Connect a wireless access point (AP) directly to the ethernet port on the server. Connect the server to a hub and connect a PC to the same hub. Configure the PC as IP Address: 192.168.0.100 Netmask: 255.255.255.0 Gateway: None

follows:

The following screen shots demonstrate a telnet login using a wireless terminal running the PowerNet Twin Client:

Log in as tec with the default password of tec123. The administrative setup menu system is accessed by typing the command su – crf (note that there are spaces on both sides of the dash) , using the default password of crf123. The setup menu system is very simple: Menu selections are made by pressing the menu number key followed by the Enter key. Returning to a previous menu is accomplished by pressing the Enter key alone.

Setting the Network Address The following screen shots demonstrate access to the Network menu where the network address of the server is set. The 1 Show menu choice displays the current settings.

The remaining Network Menu choices set the server Name, Address, Netmask, Broadcast,

and Gateway addresses respectively, as required for the local network. Setting Up Proxies The server supports up to eight proxies, numbered 1 to 8. By default, Proxy 1 is set to listen on the standard telnet port 23. Proxies 2 and 3 are set to the standard Internet browser port 80 (Proxy 2 handles the TCP port and Proxy 3 handles the UDP file-transfer port. By default, the hosts for these proxies are the telnet server (port 1923) and http server (port 1980) on the Proxy Server.

The 1 Show menu choice displays the current settings of the selected proxy. The 2 Enabled

menu choice toggles the proxy; that is, selecting the 2 Enabled choice disables the selected proxy

Setting Proxy Options The following options may be configured for each proxy: Option AutoTN Description Automatic telnet session parameter re-negotiation after an interrupted session is re-established Proto HOST Wakeup NETWORK PROTOCOL Type of host Keystrokes sent to the host automatically after an interrupted session is re-established Kalive Timeout COMMAND Socket level keep alive Inactivity timer, in minutes Run a local process 0=off, 1=on 0=off, 1-9999 minutes See Command Option TCP, UDP Telnet,Web Values -On, -Off

The first three menu choices (AutoTN, Proto, and Host) are toggles. The last two menu choices (Kalive and Timeout) prompt for numeric values. The following screen shots demonstrate setting the Timeout option.

Setting the Proxy Wakeup Option The server can automatically send a keystroke and/or series of characters to the host after an interrupted session is re-established. If the proxy is supporting a VT, 5250, or 3270 telnet emulation, the keystroke for the respective protocol may be selected by menu. Entering a ? displays the available keys. For example, the following screenshots demonstrate the selection of the function key pf12 in the VT protocol

Note that the hexadecimal representation of the protocol sequence is displayed in a colondelimited format. The 5 Custom menu choice permits direct input of any desired sequence in this same format.

Command Option This option provides for the execution of a local process to establish a proxy session. For example, a Secure Shell proxy for an SSH host is created by selecting the Command option and making an entry as follows: /usr/bin/ssh address where address is the IP address of the SSH host

Security The crf administration and tec passwords are changed from the Main Menu choice, 4 Security. The user will be prompted to enter the passwords twice. Warning: The unit must be shipped back to the factory for a re-load if the passwords are forgotten.

Saving Changes and Rebooting After the Network, Proxy, and Security have been configured for the local network, select the 5 Save choice from the Main Menu

After responding with y to the Reboot (y/n)? prompt, the unit will reboot automatically with the new network settings and with the enabled proxies running. Subsequent telnet access to the unit is then made at its new address on the local network. Troubleshooting Forgot the Server IP Address? Connect the supplied USB-to-serial cable to the server. Then obtain a null-modem cable and make the connection to a serial port on a PC. Run telnet on the PC to login and access the menu system. The server’s serial port is set to 9600 baud, 8 data bits, no parity, 1 stop bit. Using a Dialog Script on the Terminal? The script will need to be modified to handle an automatically re-established session. The ideal method for handling this will depend on the script itself. In the simplest case, the user can be prompted with an option to bypass the script and go directly into session. Alternately, the script can be changed to recognize the application screen and bypass the rest of the script automatically.

REFERENCES • • • http://en.wikipedia.org/wiki/Proxy_server http://www.tech-faq.com/how-to-setup-a-proxy-server.html http://www.connectrf.com/Documents/manproxy.pdf

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.