Friday, April 4, 2014

how to setup a free proxy server for small offices ?

What is a firewall?

Firewall is a device, which is placed between something dangerous, and something to be protected. A typical firewall configuration starting from the left the physical connection to the outside world attached to a border router, which may be under the local area network administrator or another organization. A LAN network such as an Ethernet is attached to the border router. This network is known as de-militarized zone (DMZ). It provides an attachment point for the bastion hosts which provide external connection points for services such as email, web, etc 

Why System administrator  Use Proxy Server?


  • Using Proxy server  sys admin can control and restrict users' access to websites based on their content.
  • You can allow/block a user from visiting all websites except a list of those you add as an exception; or you can block all websites in a specific category.
  • Proxy server  plays a key role in enabling organizations to limit web activity at the workplace.
  •  Normally a firewall is installed where your internal network connects to the Internet. Although larger organizations may also place firewalls between different parts of their own network that require different levels of security, most firewalls screen traffic passing between an internal network and the Internet. This internal network may be a single computer or it may contain thousands of computers.
    The following list includes the most common features of firewalls:
  • Block incoming network traffic based on source or destination: Blocking unwanted incoming traffic is the most common feature of a firewall.

  • Block outgoing network traffic based on source or destination: Many firewalls can also screen network traffic from your internal network to the Internet. For example, you may want to prevent employees from accessing inappropriate Web sites.

  • Block network traffic based on content: More advanced firewalls can screen network traffic for unacceptable content. For example, a firewall that is integrated with a virus scanner can prevent files that contain viruses from entering your network. Other firewalls integrate with e-mail services to screen out unacceptable e-mail.

  • Make internal resources available: Although the primary purpose of a firewall is to prevent unwanted network traffic from passing through it, you can also configure many firewalls to allow selective access to internal resources, such as a public Web server, while still preventing other access from the Internet to your internal network.

  • Allow connections to internal network: A common method for employees to connect to a network is using virtual private networks. VPNs allow secure connections from the Internet to a corporate network. For example, telecommuters and traveling salespeople can use a VPN to connect to the corporate network. VPNs are also used to connect branch offices to each other. Some firewalls include VPN functionality and make it easy to establish such connections.

  • Report on network traffic and firewall activities: When screening network traffic to and from the Internet, it's also important to know what your firewall is doing, who tried to break into your network, and who tried to access inappropriate material on the Internet. Most firewalls include a reporting mechanism of some kind or another.



Use  Squid Proxy Server  in debian operating system to Build Your Own Proxy server

for installation instruction see me next post>>>>>>>>>>>>>> 

how to setup a free proxy server for small offices ?

What is a firewall?

Firewall is a device, which is placed between something dangerous, and something to be protected. A typical firewall configuration starting from the left the physical connection to the outside world attached to a border router, which may be under the local area network administrator or another organization. A LAN network such as an Ethernet is attached to the border router. This network is known as de-militarized zone (DMZ). It provides an attachment point for the bastion hosts which provide external connection points for services such as email, web, etc 

Why System administrator  Use Proxy Server?


  • Using Proxy server  sys admin can control and restrict users' access to websites based on their content.
  • You can allow/block a user from visiting all websites except a list of those you add as an exception; or you can block all websites in a specific category.
  • Proxy server  plays a key role in enabling organizations to limit web activity at the workplace.
  •  Normally a firewall is installed where your internal network connects to the Internet. Although larger organizations may also place firewalls between different parts of their own network that require different levels of security, most firewalls screen traffic passing between an internal network and the Internet. This internal network may be a single computer or it may contain thousands of computers.
    The following list includes the most common features of firewalls:
  • Block incoming network traffic based on source or destination: Blocking unwanted incoming traffic is the most common feature of a firewall.

  • Block outgoing network traffic based on source or destination: Many firewalls can also screen network traffic from your internal network to the Internet. For example, you may want to prevent employees from accessing inappropriate Web sites.

  • Block network traffic based on content: More advanced firewalls can screen network traffic for unacceptable content. For example, a firewall that is integrated with a virus scanner can prevent files that contain viruses from entering your network. Other firewalls integrate with e-mail services to screen out unacceptable e-mail.

  • Make internal resources available: Although the primary purpose of a firewall is to prevent unwanted network traffic from passing through it, you can also configure many firewalls to allow selective access to internal resources, such as a public Web server, while still preventing other access from the Internet to your internal network.

  • Allow connections to internal network: A common method for employees to connect to a network is using virtual private networks. VPNs allow secure connections from the Internet to a corporate network. For example, telecommuters and traveling salespeople can use a VPN to connect to the corporate network. VPNs are also used to connect branch offices to each other. Some firewalls include VPN functionality and make it easy to establish such connections.

  • Report on network traffic and firewall activities: When screening network traffic to and from the Internet, it's also important to know what your firewall is doing, who tried to break into your network, and who tried to access inappropriate material on the Internet. Most firewalls include a reporting mechanism of some kind or another.



Use  Squid Proxy Server  in debian operating system to Build Your Own Proxy server

for installation instruction see me next post>>>>>>>>>>>>>>