Web and Proxy Server.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
SYSTEM ADMINISTRATION Chapter 19
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
Configuring a Web Server. Overview  Understand how a Web server works  Install IIS (Internet Information Services) and Apache Web servers  Examine.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
CP476 Internet Computing Browser and Web Server 1 Web Browsers A client software program that allows you to access and view Web pages on the Internet –Examples.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Web Server Setup WEB SERVER SETUP.
APACHE SERVER By Innovationframes.com »
Chapter 22 Web Hosting and Internet Servers Xuanxuan Su.
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Linux Operations and Administration
Web Server Configuration Alokes Chattopadhyay Computer & Informatics Centre IIT Kharagpur.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
System Administration and Maintenance. Proxy Server 1 Purpose – – To separate internal network from internet (NAT) To cache often used content User control:
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
1 Apache and Virtual Sites and SSL Dorcas Muthoni.
Proxy Server PROXY SERVER. What is a Web Proxy? Proxy Server A proxy is a host which relays web access requests from clients Used when clients do not.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Apache with SSL and php Apache with ssl support should be the basic platform for providing web services... There are several different implementations.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Web Server Administration Chapter 6 Configuring a Web Server.
Web Server Administration Chapter 6 Configuring a Web Server.
APACHE Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server.
A PROJECT REPORT ON TRANSPARENT PROXY SERVER BY CHANDAN KUMAR DASH CHINMAYA KUMAR PANDA D.SHIVA SHANKAR NRUSINHAJEET PARICHA PRADEEP KUMAR MOHANTY SASANK.
Defining Network Infrastructure and Network Security Lesson 8.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Presented by Michael Rainey South Mississippi Linux Users Group
Web Technology Seminar
Web Server Administration
NAT、DHCP、Firewall、FTP、Proxy
Module 3: Enabling Access to Internet Resources
Enabling Secure Internet Access with TMG
Technologies and Applications
Web Development Web Servers.
Warm Handshake with Websites, Servers and Web Servers:
Securing the Network Perimeter with ISA 2004
The Internet.
LINUX ADMINISTRATION 1
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Developing Web-Based Applications
Implementing TMG Server Publishing
Internet Applications
IIS.
Application layer Lecture 7.
Configuring Internet-related services
Web Page Concept and Design :
AbbottLink™ - IP Address Overview
INTERNET APPLICATIONS
APACHE WEB SERVER.
Firewall Installation
Web Servers (IIS and Apache)
Web Application Development Using PHP
Presentation transcript:

Web and Proxy Server

Web Server Web server is a computer where the web content is stored. Basically web server is used to host the web sites but there exists other web servers also such as gaming, storage, FTP, email etc.

Apache HTTP Server This is the most popular web server in the world developed by the Apache Software Foundation. Apache web server is an open source software and can be installed on almost all operating systems including Linux, UNIX, Windows, FreeBSD, Mac OS X and more. About 60% of the web server machines run the Apache Web Server.

Internet Information Services (IIS) The Internet Information Server (IIS) is a high performance Web Server from Microsoft. This web server runs on Windows NT/2000 and 2003 , 2008, 2012 platforms (and may be on upcoming new Windows version also). IIS comes bundled with Windows NT/2000 and 2003; Because IIS is tightly integrated with the operating system so it is relatively easy to administer it.

Http Server Installation and Configuration Yum install httpd Service httpd start

Virtual Hosting Virtual Hosting is a method of hosting multiple domain names on a server using a single IP address. This allows one server to share its resources, such as memory and process cycles, in order to use its resources more efficiently.

Virtual Hosting Example Vi /etc/httpd/conf/httpd.conf (Add the below lines at the bottom of the page) <VirtualHost 192.168.1.6:80>     ServerAdmin root@server1.example.com     DocumentRoot /var/www/user/deepak/site     ServerName deepak.example.com     ErrorLog logs/server1.example.com-error_log     CustomLog logs/server1.example.com-access_log common </VirtualHost> <VirtualHost 192.168.1.6:80>     ServerAdmin root@server1.example.com     DocumentRoot /var/www/user/amit/site     ServerName amit.example.com     ErrorLog logs/server1.example.com-error_log     CustomLog logs/server1.example.com-access_log common </VirtualHost>

HTTP caching HTTP caching occurs when the browser stores local copies of web resources for faster retrieval the next time the resource is required. As your application serves resources it can attach cache headers to the response specifying the desired cache behavior. When an item is fully cached, the browser may choose to not contact the server at all and simply use its own cached copy:

Proxy Caching Server Configuration Proxy server is a computer that sits between a client computer and the Internet, and provide indirect network services to a client. It may reside on the user's local computer, or at various points between the user's computer and destination servers on the Internet. A proxy server intercepts all client requests, and provide responses from its cache or forwards the request to the real server. A client computer is connected to the proxy server, which acknowledges client requests by providing the requested resource/data from either a specified server or the local cache memory. Client requests include files or any other resources available on various servers.

Uses of Proxy Server Proxy servers are used for several purposes. If it is used as a caching web proxy, it can dramatically improve performance of a web response. When a request is made by a client, a caching proxy returns response directly from its cache if the document already exists. Otherwise, it makes the request to the real server, returns the result, and save it in its cache for later use. Proxy servers are also used as "web proxies" to filter web page contents. An organization or company may use a proxy server to block offensive web contents from viewed by the users. Considering the growing need within organizations to prevent employees from accessing specific websites, such as facebook.com, proxy servers are being deployed across the computers connected to the intranet. Further, web proxies can be used to prevent the attack of computer viruses and malware, as well as other hostile content transferred across the internet web pages. Internet Service providers (ISPs) may also use proxies to block computer viruses and other offensive contents.

Squid Proxy Server Configuration Yum install squid Cp /etc/squid/squid.conf /etc/squid/squid.conf.default To block the facebook add following line in squid.conf # vi /etc/squid/squid.conf Add these lines in ACL Section acl ban_domains dstdomain “/etc/squid/ban_domains.txt” http_access deny ban_domains Service squid start vi /etc/squid/ban_domains.txt Add ban domains name line by line www.youtube.com www.facebook.com save and exit. Open the 3128 port from linux server

Now open up browser on client computer and point squid server IP in proxy settings with 3128 port. After adding ACL, Squid will start denying www.youtube.com.

Proxy Authentication mechanism NTLM In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager(LANMAN), an older Microsoft product. The NTLM protocol suite is implemented in a Security Support Provider, which combines the LAN Manager authentication protocol, NTLMv1, NTLMv2 and NTLM2 Session protocols in a single package. 

Proxy-MySQL Auth The MySQL Proxy is an application that communicates over the network using the MySQL Network Protocol and provides communication between one or more MySQL servers and one or more MySQL clients. In the most basic configuration, MySQL Proxy simply passes on queries from the client to the MySQL Server and returns the responses from the MySQL Server to the client. Because MySQL Proxy uses the MySQL network protocol, any MySQL compatible client (include the command line client, any clients using the MySQL client libraries, and any connector that supports the MySQL network protocol) can connect to the proxy without modification.

Proxy-Radius Auth Basics RADIUS proxies are used to redirect traffic destined for a certain server when there are multiple RADIUS servers used within the network. Based on certain predefined rules, a proxy server will determine where will be the request sent. These type of RADIUS servers can be used to redirect authentication requests based on user’s domain. Suppose you have multiple domains within your forest and each one would have its own RADIUS server to authenticate users. The proxy would be configured to forward authentication requests to the destined RADIUS server. Another common way for using a proxy is to alleviate portions of the network by load balancing traffic destined for RADIUS servers.

Troubleshooting Squid Squid logs both informational and error messages to files in the /var/log/squid/ directory. It is best to review these files first whenever you have difficulties.The squid.out file can be especially useful as it contains Squids' system errors. Another source of errors could be unintended statements in the squid.conf file that cause no errors; mistakes in the configuration of hours of access and permitted networks that were forgotten to be added are just two possibilities. By default, Squid operates on port 3128, so if you are having connectivity problems,