What is a firewall?
Firewall is a device, which is placed between something
dangerous, and something to be protected. A typical firewall
configuration starting from the left the physical connection to the
outside world attached to a border router, which may be under the local
area network administrator or another organization. A LAN network such
as an Ethernet is attached to the border router. This network is known
as de-militarized zone (DMZ). It provides an attachment point for the
bastion hosts which provide external connection points for services such
as email, web, etc
Why System administrator Use Proxy Server?
- Using Proxy server sys admin
can control and restrict users' access to websites based on their content.
- You can allow/block a user from visiting all websites except a
list of those you add as an exception; or you can block all websites in a
specific category.
- Proxy server plays a key role in enabling organizations to limit web activity at the workplace.
- Normally a firewall is installed where your internal network connects
to the Internet. Although larger organizations may also place firewalls
between different parts of their own network that require different
levels of security, most firewalls screen traffic passing between an
internal network and the Internet. This internal network may be a single
computer or it may contain thousands of computers.
The following list includes the most common features of firewalls:
- Block incoming network traffic based on source or destination: Blocking unwanted incoming traffic is the most common feature of a firewall.
- Block outgoing network traffic based on source or destination:
Many firewalls can also screen network traffic from your internal
network to the Internet. For example, you may want to prevent employees
from accessing inappropriate Web sites.
- Block network traffic based on content: More advanced
firewalls can screen network traffic for unacceptable content. For
example, a firewall that is integrated with a virus scanner can prevent
files that contain viruses from entering your network. Other firewalls
integrate with e-mail services to screen out unacceptable e-mail.
- Make internal resources available: Although the primary
purpose of a firewall is to prevent unwanted network traffic from
passing through it, you can also configure many firewalls to allow
selective access to internal resources, such as a public Web server,
while still preventing other access from the Internet to your internal
network.
- Allow connections to internal network: A common method for employees to connect to a network is using virtual
private networks. VPNs allow secure connections from the Internet to a
corporate network. For example, telecommuters and traveling salespeople
can use a VPN to connect to the corporate network. VPNs are also used to
connect branch offices to each other. Some firewalls include VPN
functionality and make it easy to establish such connections.
- Report on network traffic and firewall activities: When
screening network traffic to and from the Internet, it's also important
to know what your firewall is doing, who tried to break into your
network, and who tried to access inappropriate material on the Internet.
Most firewalls include a reporting mechanism of some kind or another.
Use Squid Proxy Server
in debian operating system to Build Your Own Proxy server
for installation instruction see me next post>>>>>>>>>>>>>>
What is a firewall?
Firewall is a device, which is placed between something
dangerous, and something to be protected. A typical firewall
configuration starting from the left the physical connection to the
outside world attached to a border router, which may be under the local
area network administrator or another organization. A LAN network such
as an Ethernet is attached to the border router. This network is known
as de-militarized zone (DMZ). It provides an attachment point for the
bastion hosts which provide external connection points for services such
as email, web, etc
Why System administrator Use Proxy Server?
- Using Proxy server sys admin
can control and restrict users' access to websites based on their content.
- You can allow/block a user from visiting all websites except a
list of those you add as an exception; or you can block all websites in a
specific category.
- Proxy server plays a key role in enabling organizations to limit web activity at the workplace.
- Normally a firewall is installed where your internal network connects
to the Internet. Although larger organizations may also place firewalls
between different parts of their own network that require different
levels of security, most firewalls screen traffic passing between an
internal network and the Internet. This internal network may be a single
computer or it may contain thousands of computers.
The following list includes the most common features of firewalls:
- Block incoming network traffic based on source or destination: Blocking unwanted incoming traffic is the most common feature of a firewall.
- Block outgoing network traffic based on source or destination:
Many firewalls can also screen network traffic from your internal
network to the Internet. For example, you may want to prevent employees
from accessing inappropriate Web sites.
- Block network traffic based on content: More advanced
firewalls can screen network traffic for unacceptable content. For
example, a firewall that is integrated with a virus scanner can prevent
files that contain viruses from entering your network. Other firewalls
integrate with e-mail services to screen out unacceptable e-mail.
- Make internal resources available: Although the primary
purpose of a firewall is to prevent unwanted network traffic from
passing through it, you can also configure many firewalls to allow
selective access to internal resources, such as a public Web server,
while still preventing other access from the Internet to your internal
network.
- Allow connections to internal network: A common method for employees to connect to a network is using virtual
private networks. VPNs allow secure connections from the Internet to a
corporate network. For example, telecommuters and traveling salespeople
can use a VPN to connect to the corporate network. VPNs are also used to
connect branch offices to each other. Some firewalls include VPN
functionality and make it easy to establish such connections.
- Report on network traffic and firewall activities: When
screening network traffic to and from the Internet, it's also important
to know what your firewall is doing, who tried to break into your
network, and who tried to access inappropriate material on the Internet.
Most firewalls include a reporting mechanism of some kind or another.
Use Squid Proxy Server
in debian operating system to Build Your Own Proxy server
for installation instruction see me next post>>>>>>>>>>>>>>