Saturday, April 3, 2010

PROXY SERVER

In computer networks, a proxy server is a server (a computer system or an application program) that performs as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, including a file, connection, web page, or other resource, available from a different server. The proxy server calculates the request according to its filtering rules. For instance, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specific server. In this case, it 'caches' responses from the remote server, and send back subsequent requests for the same content directly.

A proxy server has many potential objectives, such as:

* To keep machines behind it anonymous (mainly for security).
* To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
* To apply access policy to network services or content, e.g. to block undesired sites.
* To log / audit usage, in other words, to provide company employee Internet usage reporting.
* To bypass security/ parental controls.
* To scan transmitted content for malware before delivery.
* To scan outbound content, e.g., for data leak protection.
* To circumvent regional restrictions.

A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

A proxy server can be positioned in the user's local computer or at different points between the user and the destination servers on the Internet.

A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also executing tasks such as load-balancing, authentication, decryption or caching.

No comments:

Post a Comment