Question about Office Equipment & Supplies

1 Answer

Difference between proxy server firewall and something called a gateway firewall ....Just a homework question..need another angle other then the veryconfusing textbook

Posted by on

Ad

1 Answer

  • Level 1:

    An expert who has achieved level 1.

    Corporal:

    An expert that hasĀ over 10 points.

    Mayor:

    An expert whose answer gotĀ voted for 2 times.

    Problem Solver:

    An expert who has answered 5 questions.

  • Contributor
  • 13 Answers

In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has many potential purposes, including:

  • To keep machines behind it anonymous (mainly for security).[1]
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]
  • To apply access policy to network services or content, e.g. to block undesired sites.
  • To log / audit usage, i.e. to provide company employee Internet usage reporting.
  • To bypass security/ parental controls.
  • To scan transmitted content before delivery for malware.
  • To scan outbound content, e.g. for data leak protection.
  • To circumvent regional restrictions.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is a (usually) Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching

A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.
Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.

Posted on Dec 11, 2009

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi there,
Save hours of searching online or wasting money on unnecessary repairs by talking to a 6YA Expert who can help you resolve this issue over the phone in a minute or two.

Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.

Here's a link to this great service

Good luck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

Where do I find the proxy server address for my server?


You may need to ask them, though most home networks don't have a proxy server. Only a gateway which acts as a firewall and almost pseudo proxy.

Long story, short try using the gateway IP. Go to Run / Search. Type cmd, then enter ipconfig in the command prompt. It will be noted there.

Dec 10, 2012 | HP Officejet Pro 8600 Plus E-all-in-on...

Tip

Firewall Software Types


Viruses, worms, bacteria, rabbits, etc. are the different types of unwanted programs that infect computers and cause obstruction in normal operation. To avoid this and to protect your computer against infection and to ensure proper operation, install good antivirus software to detect viruses and remove or repair the damaged files virus. Software acts as a gateway firewall; the firewall is four different types. The gateway packet filtering, circuit gateway and proxy server level.The firewall is the firewall packet filters most basic. Packet filtering firewall filters incoming and outgoing packets of the machine based on user configuration. For example, the package contains information on the package. So if the user has blocked a port number or IP address of all packets from that port number or IP address will be removed. A firewall in the safety circuit when recording with TCP or UDP protocol is established between the host and network. At the level of the application firewall works at the application level. A proxy server is a type of relay server.The proxy server forwards this request to a server which in turn looks for the IP address and sends the appropriate proxy server. A proxy acts as a firewall between the machine and the network. You can adjust the proxy settings for their own purposes. And 'one of the most powerful desktop security mechanisms available for security. In addition, the firewall provides the security system can also be used to guide the installation of backup software. For a LAN or network packet's internal filter can be ideal. external networks, application gateways and proxy servers are a must. Prevents unwanted packets of data and content. So if safety is a concern not forget to install the latest firewall software keeps your computer from viruses and fully functional.

on Feb 08, 2011 | Computers & Internet

2 Answers

ACT, PSAT, SAT disc says i need another product key #


Make sure that you are using all capital letters in the registration number. You can initiate a tech support ticket here:

http://support.topics-ent.com/cgi-bin/support.pl

If you really need a phone number, call: USA 425-656-3621

Aug 04, 2012 | TOPICS Entertainment Computers & Internet

1 Answer

Google talk sign in not open cnnection error


"This error most commonly appears when you have no connection to the internet.
If your internet connection is working, you may have an issue with your firewall or proxy server. First, make sure that your firewall is configured to Allow Google Talk; we've provided instructions for some of the more popular firewall applications below:
A proxy server requiring a proxy username and password could also cause this problem. To configure your proxy:
  1. Open Google Talk.
  2. Click Settings .
  3. Highlight Connection along the left side of the dialogue box.
  4. Select Use the following proxy .
  5. Check the box next to Proxy requires Authentication .
  6. Enter the proxy username and password.
  7. Click OK .
Finally, your network administrator may have disabled Google Talk on your network. If you continue to see this error, please contact your network administrator."

--
Google Support

Aug 06, 2011 | Google Talk

1 Answer

The server needs authentication to google talk n use of g mail can u please help me


This may happen if you have blocked by your personal firewall or if you are behind a proxy server .in order to by pass proxy server you need to enter user name and password of your proxy server

Jan 31, 2011 | Google Talk

2 Answers

What proxy server can i use on facebook with chat?


There are a lot of proxy sites available to bypass your firewall restriction.

Here are few:

http://ads-blackfriday.com/
https://www.rbypass.info/
http://bypassfacebook.us/

just type www.facebook.com on the address field and hit Go.

Please tell me how this goes. Thank you for using FixYa.

Dec 06, 2010 | Facebook Social Network

1 Answer

Yahoo server is blocked by firewall settings. options inside connection preferences are not enabled


Hello, have you tried going to Messenger > Connection as Yahoo is trying to sign in? If so, what is it set to? The normal setting to use is No Proxies, but you can switch between Firewall with no proxies or No network detection and see if it makes any difference.

If still it not work uninstall yahoo messenger and reinstall it again.

Please post me if you still face any issue

Sep 04, 2009 | Microsoft Windows Vista Home Premium with...

1 Answer

Hello


SOCKS is an Internet protocol that facilitates the routing of network packets between client-server applications via a proxy server. SOCKS performs at Layer 5 of the OSI model - the Session Layer (an intermediate layer between the presentation layer and the transport layer).

Clients behind a firewall may connect to a SOCKS proxy server in order to access external services through the firewall. Such a proxy server controls the eligibility of the client to access the external server and, if the client has eligibility, passes the request on to the server. SOCKS can also be used in the opposite way, allowing the clients outside the firewall ("exterior clients") to connect to servers inside the firewall (internal servers).

SOCKS software

* Kernel SOCKS Bouncer ksb26 (Kernel Socks Bouncer) is a Linux Kernel 2.6.x Loadable Kernel Module that redirects TCP connection (to user-defined target hosts) through socks 4/5 chains.
* SS5 Socks Server is an open-source SOCKS4/SOCKS5 server.
* Dante is an open-source SOCKS4/SOCKS5 implementation with commercial support developed by Inferno Nettverk A/S.
* OpenSSH allows dynamic creation of tunnels, specified via a subset of the SOCKS protocol, supporting the CONNECT command.
* WinSocks is a light-weight SOCKS4/SOCKS5 server developed by Proxy Labs.
* SOcat Multipurpose relay (SOcket CAT): includes socks4, and socks4a functionality (Linux / Mac)
* FreeCap Socksifyer for Windows, any App can run its network traffic transparently via a SOCKS or HTTP proxy.
* Simple Socks Server for Perl - SSS is a Simple SOCKS Server written in perl that implements the SOCKS v5 protocol.
* Sun Java System Web Proxy Server is a caching proxy server running on Solaris, Linux and Windows servers that supports HTtp://S, NSAPI I/O filters, dynamic reconfiguration, SOCKSv5 and reverse proxy.
* BarracudaDrive Web Server - commercial SOCKS HTTP HTTPS tunnel/server, available for Windows, embedded Linux and Mac OS X (PowerPC)
* DeleGate is a multi-purpose application level gateway and proxy server which runs on multiple platforms. Beside SOCKS it also supports HTTP(S), FTP, NNTP, SMTP, POP, IMAP, LDAP, Telnet, DNS and many more.

Jan 05, 2009 | Computers & Internet

2 Answers

Proxy sever


A server that sits between a client application, such as a Web browser, and a real server
. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.


Proxy servers have two main purposes:

# Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services
such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.


# Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.



A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server , looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.

Dec 17, 2008 | Sega Medieval II: Total War for Windows

2 Answers

I cannot use utoorent to download


By using the proxy gateway you havce not cracked the forti guard, you just found a loophole, that is different from cracking or hacking the system.

You can use freely the Internet and bypass proxyguard by using freegate proxy, but you wont be able to use a torrent fileshare , as this needs opening a port directly on the server, and you do not have access to server.

I have done daministration on a system protected By Bess system, and I can assure you there is noway to access to the gateway and change permissions if you are not an administrator.

Dec 12, 2008 | Fortinet, Inc. FortiGate 3000 (fg-3000-us)...

Not finding what you are looking for?
Office Equipment & Supplies Logo

Related Topics:

241 people viewed this question

Ask a Question

Usually answered in minutes!

Top Office Equipment & Supplies Experts

k24674

Level 3 Expert

8080 Answers

Cindy Wells

Level 3 Expert

5681 Answers

Marvin
Marvin

Level 3 Expert

83810 Answers

Are you an Office Equipment and Supply Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...