14 July 2004 1 CONFIGURING A PROXY SERVER IN LINUX BY ROHIT KAUL CS, BITS-PILANI.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Quick Installation Guide for Hurricane8800P
Configuring your users browsers. PRACTICAL EXERCISE - 1 We assume here that your LOCAL CACHE has been previously configured to peer with the JWCS. Advice.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 15 – INSTALL AND SET UP NETWARE 5.1. Understanding NetWare 5.1 Preparing for installation Installing NetWare 5.1 Configuring NetWare 5.1 client.
Danguardian and Squid Proxy Installation and Configuration.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
DVG-N5402SP.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
TEW-691GR Training TEW-691GR Training TEW-691GR 450Mbps Wireless N Gigabit Router.
1 Enabling Secure Internet Access with ISA Server.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Advanced Networking for DVRs
Linux Operations and Administration
Installing a DHCP Server role on Windows Server 2008 R2 in a home network. This is intended as a guide to install the DHCP role on a Domain Controller.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Thrive Installation.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Using Windows Firewall and Windows Defender
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
Chapter 9: Novell NetWare
Web Proxy Squid Setup. A proxy is a host which relays web access requests from clients a proxy server is an application program that acts as an intermediary.
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
Topics ABOUT SQUID SQUID BASICS INSTRALLATION OF SQUID SQUID SERVICE CONFIGURATION UNDERSTANDING ACCESS CONTROL LIST LOGS TRANSPARENT PROXY MONITORING.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Wireless Networks and the NetSentron By: Darren Critchley.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
 The Control Panel window will pop up. Existing LAN USB-to-Ethernet adapter  Use an inexpensive USB-to-Ethernet adapter and connect it to your computer’s.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Kickstart Installation
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Setup and Management for the CacheRaQ. Confidential, Page 2 Cache Installation Outline – Setup & Wizard – Cache Configurations –ICP.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 10: Windows Firewall and Caching Fundamentals.
Linux Operations and Administration
1. At least two computers 2. Network adapters for each computer. The cost should be approximately $ If you have a 10Base-T adapters, and only.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Remote Access Using a Netgear DG834 Router 1http://
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Web Server Administration Chapter 6 Configuring a Web Server.
Squid Jon Larsen Omaha Linux User Group May 2nd, 2006.
Web and Proxy Server.
Guide to Linux Installation and Administration, 2e
LINUX ADMINISTRATION 1
FTP - File Transfer Protocol
Fix Windows 10 Activation Error 0x80072ee2
Access eJournals Form Your Home
Presentation transcript:

14 July CONFIGURING A PROXY SERVER IN LINUX BY ROHIT KAUL CS, BITS-PILANI

14 July PRESENTATION LAYOUT  Brief introduction to LINUX  What is a proxy???  Its Uses and Need???  Security aspects and Web Caching  Connecting a PC to LAN  Introduction and Configuration of Squid  Configuration of clients’ Browser  Conclusions

14 July Introduction to Linux  Linux – a phenomenon?  Linux has provided a common platform for the Free software that was being created all over the world….  Linus Torvalds, 1991, University of Helsinki  GPL (General Public License)  Distributions in market Red Hat, Debian etc  WHY LINUX ????

14 July What is a Proxy Server ??  Intermediary server between clients and the actual server actual server  Proxy processes request  Proxy processes response  Receives the client request  Decides if request will go on to the server  May have cache & may respond from cache  Acts as the client with respect to the server  Uses one of it’s own IP addresses to get page from server

14 July Uses of Proxy-Server  Enhancing Security not individual security concerns, saves resources, money etc not individual security concerns, saves resources, money etc  Caching faster web surfing faster web surfing  Firewall  Filtering Contents

14 July A normal web transaction User IP: Security……How Do I Care???

14 July Transaction through a proxy User IP: proxy.inst.edu IP: More secure…. Add firewall…packet filter; block access to sites

14 July Caching –Proxy (Cache MISS!!) proxy.inst.edu IP: Cache MISS User IP:

14 July Caching –Proxy ( cache HIT) User IP: proxy.inst.edu IP: Cache HIT Improves speed of surfing

14 July Proxy In Linux…  Installation  Connecting Linux PC to LAN  Configuring proxy module/application  Configuring prospective clients’ browsers  INSTALLATION easy!!! easy!!!

14 July Connecting Linux PC to LAN  Red Hat menu, System Settings  Network  ( or type “neat” as root )  Network configuration window appears  Devices tab  eth0 interface ( double-click)  A pop-up window appears asking for:  DHCP / Static Addressing  Choose Static….and fill in IP Address, Netmask, Default Gateway Address. click OK, close the window and click ACTIVATE

14 July Default Gateway ???  Like routers…

14 July Configuring DNS information  DNS ???  Click DNS tab in network configuration window..  Enter primary and secondary DNS nameservers ….in case local DNS is configured enter the address as primary DNS  Click APPLY button at the bottom  Click CLOSE, and ACTIVATE

14 July Configuring SQUID  Squid????  it is a proxy – caching server which runs on *nix based platforms. *nix based platforms. Why Squid? apart from others.. 1.Available free of cost, open-source 2.Features content-filtering and password authentication for users using external programs

14 July Installation of squid  From RPM packages…  Use Package Manager and install from CD  From Source  Unzip in some temporary directory  Move to it…and run./config  Run make make install make install make clean make clean  Similar to WINZIP

14 July Squid.conf file  Open in any standard editor vi/vim emacs  Lots of options, anybody with basic knowledge of proxy and networking can configure it.  http port default 3128  Cache_mem default 8MB  Cache_dir directory subdirectory subsub directories /var/squid/cache

14 July Restricting Internet Access  ACLs ( access control Lists )  Acl acl_name acl_type data  Acl node scr  Acl node2 scr  Acl lunchtime time M 13:00-14:00  http_access deny node lunctime  http_access deny node

14 July  Starting squid squid start /etc/init.d squid start / restart squid start /etc/init.d squid start / restart  Stopping squid Squid stop /etc/init.d squid stop

14 July Dummy interface??  What is dummy interface???  eth0 eth1  eth0 eth0:0  Interface at startup .bashrc file

14 July Configuring Internet Explorer

14 July Click Start, Programs, Internet Explorer

22 Click Tools, Internet Options

14 July Click Connections

14 July Select Your Connection For LAN connection (within RRL) For LAN connection (within RRL) For Dial-UP Connection (from Home) For Dial-UP Connection (from Home)

14 July Click LAN Settings LAN connections ONLY

14 July Select Use a proxy server for this connection. In Address box, type & in Port box 8080 Select Bypass proxy server for local addresses

14 July Select Use the same proxy server for all protocols. Type *.ou.ac.lk; * in Do not use proxy server for addresses beginning with box

14 July  Click OK. Similarly one can configure graphical browsers like MOZILLA or OPERA

14 July Conclusions  In an era where even a single click of mouse is potent enough to cause a full fledged attack, installing proxies and other security modules is no more a luxury that every system administrator enjoys…  Its a necessity….

14 July

14 July