What is a Proxy? Transparent Proxy? Elite Proxy? Socks?

Hello all ..
It's time to write me back again after re-arranging the heart of the show (# upset mode on).

OK this time I will discuss sundry proxy. Understandably pratikum in Lab Sisjarkom taught yesterday about the proxy. OK's start with understanding the proxy.

Proxies can be easily diterjemahakan with a bridge between the client application with the ISP. While the machine that serves the use of this proxy is a proxy server.

This can be seen above the simple topology of the placement and use of proxy servers. Where after the passing of local IP proxy server will be converted into a public IP. From here the proxy can be used as a gateway or door entry and exit data from the internet to the client.

Proxy can serve as
A. Gateway, which is a bridge between public networks and local networks. In it was possible translation of the so-called Public IP Address NAT (Network Address Translation) function to share the resources of the Internet so that the clients are in a LAN (Local Area Network) can enjoy internet access together in the same time also simply using 1 piece of IP Public Address (both static and dynamic, depending on the service provided to our ISP). But in terms of better protection, it created its own Gateway usually like to use a router, modem, etc..

2. Firewall, for network security. This function can limit access and prevent unauthorized access, to resources available on the internet or intranet either by the client as well as by outsiders who do not know. Examples such as mem-block network access from the internet on certain ports or certain situs-situs/service-service prevent access client that is harmful to computers and local networks, such as viruses, Trojans, hacker attacks, etc..

3. Bandwidth Management, which is to create regulations in managing the content and speed of access to resources internet / intranet are applied to the client in the network localnya. This corresponds well with the method which carried a caching proxy servers in general (described above).

4. IP Address / Group and User Access Management, this function is a feature that is important enough to manage the rights to the user / computer / group / IP addresses can access the external network / internet.

5. Content Filtering, this feature is a rule that will filter out any information / content that is requested by a client that is not too freely and can damage / minimize the negative side of such content.

6. Non-transparent proxy and transparent proxy, which is a method whereby the client on the network, no configuration is necessary (transparent) to be able to access / connect / subject to the rules of the proxy server, but the Proxy Server to broadcast directly to any person who has have access to the internet for 'forced' through the Proxy Server first. While non-transparent proxy is the opposite of tranparent where each client that will connect / access / proxy rules apply, then in each application such as Internet Browser, FTP Client, etc.. leading to the outside network / internet must be configured to connect to the Proxy Server.

7. VPN Server and VPN Tunnel, VPN stands for (Virtual Private Network) or a private network, which is a great way to network local / individual users can access the network somewhere local / server computer other places through public media such as internet. Through this VPN, a person or a local network in a place to connect with the local IP address, so that communication occurs, as in a regular local network (LAN). But the media used are public media such as internet.

Here I will describe some kind of proxy

- Transparent Proxy
Transparent proxy is a facility where the router / proxy will do the port forward. Okay, let's take an example like this, almost every port has its own proxy server that can be arranged by our own, for example 3128, of course, every client that connects to the proxy server must configure the port on the client machine itself.

Would feel if the client is connected to bother it much at all, therefore, Transparent will do it automatically, in which the port 80 (standard port WWW) will be automatically redirected by transparent proxy earlier.

- Anonymous Proxy
Anonymous proxy is a proxy that can hide our identity so as to prevent illegal access to our computers. What are the hidden identity? That is hidden is the IP address, browser used, operating system, as well as our location.

Anonymous Proxy itself is divided into 2 and Elite Proxy Anonymous Proxy. Difference between the two is as follows

A. Anonymous Proxy server does not send HTTP_X_FORWARDED_FOR variable to host, this improves privacy since your IP address can not be logged.

2. Elite proxy (high anonymity) does not send HTTP_X_FORWARDED_FOR, HTTP_VIA and HTTP_PROXY_CONNECTION variables. The host did not even know you are using a proxy server and of course do not know your IP address.

Until this section is confused brothers and sisters? There is still one more that I want to explain his name socks proxy. Nahlo .. What else neh beings? OKK .. Let us digest a little socks proxy.

According to Wikipedia

    SOCKS is an Internet protocol That facilitates the routing of network packets Between client-server applications via a proxy server. SOCKS performs at Layer 5 of the OSI model-the session layer (an intermediate layer Between the presentation layer and the transport layer). Port 1080 is the registered designated port for the SOCKS server.

In this proxy socks easy it is we use an intermediary to connect, because a direct connection is not allowed. For example: A and B as host client and server want to connect, and C is a SOCKS proxy. But the connection from A to B is not allowed, while C to B connections are allowed. Well, we can ride a connection from C to B, so A can be connected to B.

OK so only explanation .. wait for practice the next part .. :) If there is something wrong please corrected it?
Share this article :

+ comments + 1 comments

Post a Comment

Support : Google Adsense | Twitter | Facebook | Google+
News Indonesia Choice News Indonesia Choice - All Rights Reserved
Want Consultation With Us?
Please contact us here, .. Warm Regards Editor