Secure Proxy Server  «Prev  Next»

Secure Proxy Server Solution(Conclusion)

In this module, you learned several different ways to secure a Proxy Server solution, and the situations where that security will be at a premium. Each solution can be adapted to the specific number and type of security requirements demanded by the organization for which you work. After completing this module, you should know how to make these adaptations. Specifically, you now know how to do the following:
  1. Restrict access to Internet resources
  2. Define the number of screened subnets required in the Internet connectivity design
  3. Restrict IP traffic by using IP packet filters
  4. Restrict IP traffic by using domain filters
  5. Restrict inbound traffic by using Web Publishing

Question:

Which of the skills that you learned in this module do you think will best meet the security requirements of your organization?

New terms

  1. Layer two: he OSI (Open Systems Interconnect) Layer 2 is the DataLink layer. The DoD-TCP/IP Layer 2 is the Internetwork Layer. Typically, when Layer 2 is discussed, the OSI model is assumed.
  2. Multihomed Proxy Server: A Proxy Server with more than one network interface card.
  3. SOCKS proxy:The SOCKS Proxy Services receives requests for Internet resources from SOCKS clients.
  4. Web proxy: The Web Proxy Service is available to CERN compliant browsers and provides HTTP, HTTPS, Gopher and FTP (Read) proxy services.
  5. WinSock proxy: The WinSock Proxy Service provides proxy services to WinSock client requests for web resources.
In the next module, you will learn how to enhance and optimize Proxy Server for availability and performance.

Create Proxy Server - Exercise

Click the Exercise link to practice identifying issues involved with creating a Proxy Server solution. Create Proxy Server - Exercise