In this module, you learned several different ways to secure a Proxy Server solution, and the situations where that security will be at a premium. Each solution can be adapted to the specific number and type of security requirements demanded by the organization for which you work.
After completing this module, you should know how to make these adaptations. Specifically, you now know how to do the following:
Restrict access to Internet resources
Define the number of screened subnets required in the Internet connectivity design
Restrict IP traffic by using IP packet filters
Restrict IP traffic by using domain filters
Restrict inbound traffic by using Web Publishing
Which of the skills that you learned in this module do you think will best meet the security requirements of your organization?
Layer two: he OSI (Open Systems Interconnect) Layer 2 is the DataLink layer. The DoD-TCP/IP Layer 2 is the Internetwork Layer. Typically,
when Layer 2 is discussed, the OSI model is assumed.
Multihomed Proxy Server: A Proxy Server with more than one network interface card.
SOCKS proxy:The SOCKS Proxy Services receives requests for Internet resources from SOCKS clients.
Web proxy: The Web Proxy Service is available to CERN compliant browsers and provides HTTP, HTTPS, Gopher and FTP (Read) proxy services.
WinSock proxy: The WinSock Proxy Service provides proxy services to WinSock client requests for web resources.
In the next module, you will learn how to enhance and optimize Proxy Server for availability and performance.