Proxy Server

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Proxy Server

Every computer that is connected to the network has an IP (Internet Protocol)


address that identifies the device uniquely. Similarly, the proxy server is a
computer on the network that has its own IP address. But sometimes, we want
to access those websites or servers that are restricted and we do not want to
show our identity (IP address). In such a scenario, the proxy server comes into
existence. We can achieve the same by using the proxy server. It provides
varying levels of functionality, security, and privacy that depend on the use
case, needs, or policies of the company

Proxies provide a valuable layer of security for your computer. They can be set
up as web filters or firewalls, protecting your computer from internet threats
like malware.
This extra security is also valuable when coupled with a secure web gateway or
other email security products. This way, you can filter traffic according to its
level of safety or how much traffic your network—or individual computers—can
handle.

– A firewall is software or firmware that prevents unauthorized access to


a network.
– A gateway is a network node used in telecommunications that
connects two networks with different transmission protocols together.
Gateways serve as an entry and exit point for a network as all data
must pass through or communicate with the gateway prior to being
routed.

The proxy server is a computer on the internet that accepts the incoming


requests from the client and forwards those requests to the destination server.
It works as a gateway between the end-user and the internet. It has its own IP
address. It separates the client system and web server from the global network.
The most important point about a proxy server is that it does not encrypt
traffic.
It is a server, referred to as an “intermediary” because it goes between end-
users and the web pages they visit online.

There are two main purposes of proxy server:


● To keep the system behind it anonymous.
● To speed up access to a resource through caching.
How Proxy Server works ?

● Normally, when you type in a website name (Amazon.com or any


other), your Internet Service Provider (ISP) makes the request for you
and connects you with the destination—and reveals your real IP
address, as mentioned before.
● When you use a proxy your online requests get rerouted.
● While using a proxy, your Internet request goes from your computer to
your ISP as usual, but then gets sent to the proxy server, and then to
the website/destination. Along the way, the proxy uses the IP address
you chose in your setup, masking your real IP address.

The proxy server accepts the request from the client and produces a response
based on the following conditions:
. If the requested data or page already exists in the local cache, the
proxy server itself provides the required retrieval to the client.
. If the requested data or page does not exist in the local cache, the
proxy server forwards that request to the destination server, use its
own ip.
. The proxy servers transfer the replies to the client and also being
cached to them.
Therefore, it can be said that the proxy server acts as a client as well as
the server
Advantages of Proxy Server
There are the following benefits of using the proxy server:
● It improves the security and enhances the privacy
of the user.
● It hides the identity (IP address) of the user.
● It controls the traffic and prevents crashes.
● Also, saves bandwidth by caching files and compressing incoming
traffic.
● Protect our network from malware.
● Allows access to the restricted content.

Need of Proxy Server


● It reduces the chances of data breaches.
● It adds a subsidiary layer of security between server and outside
traffic.
● It also protects from hackers.
● It filters the requests.

Proxy Server Vs. VPN


Proxy server and VPN (Virtual Private Network) are quite similar. Both allow
clients to hide their IP addresses, location and allows access to the restricted
websites. The only difference is that the proxy server does not encrypt the
traffic while VPN does the same. Another difference is that no one can track
the activity of the VPN user while the activity of the proxy server user can be
tracked.
Basis of Comparison Proxy Server VPN
Encryption It does not encrypt the It encrypts the traffic.
traffic.
Software It does not have its I t h a s its own
own software. software.
Speed It is faster than VPN. It is slower in
comparison to the
proxy server.
Cache It uses cache. It does not use cache.
IP Address It hides the IP address T h e I P a d d re ss i s
but the proxy owner completely hidden.
can see the client's IP
address.
Connection It is unstable. It is seamless.
Pricing It is mostly free. It is chargeable.
Reliability Its connection drops Its connection is more
more frequently. reliable.
Level of Working It works on the It works on the
application level. operating system
level.
Security It is less secure. It provides greater
security.

Types of Proxy Servers:


. Forward Proxy :
– Forward proxies send the requests of a client onward to a web server.
Users access forward proxies by directly surfing to a web proxy
address or by configuring their Internet settings. 
– After collecting the data from the sites, it forwards the data to the
internet users directly. It bypasses the firewall made by authorities.
but may sometimes be used to download illegal materials such as
copyrighted materials or child pornography.

. Reverse Proxy:
– Unlike a forward proxy, which sits in front of clients, a reverse proxy is
positioned in front of web servers and forwards requests from a
browser to the web servers. It works by intercepting requests from the
user at the network edge of the web server. It then sends the requests
to and receives replies from the origin server.
– Reverse proxies are a strong option for popular websites that need to
balance the load of many incoming requests. They can help an
organization reduce bandwidth load because they act like another web
server managing incoming requests. The downside is reverse proxies
can potentially expose the HTTP server architecture if an attacker is
able to penetrate it. This means network administrators may have to
beef up or reposition their firewall if they are using a reverse proxy.

. Transparent Proxy: Transparent proxies are well-suited for


companies that want to make use of a proxy without making
employees aware they are using one. It is a proxy server that does not
modify the request or response beyond what is required for proxy
authentication and identification. It works on port 80.

. Anonymous Proxy : The server tries to anonymizing the web surfing.


– An anonymous proxy focuses on making internet activity untraceable.
It works by accessing the internet on behalf of the user while hiding
their identity and computer information.

. Web Proxy Server: The proxy that is targeted to the world wide web
is known as a web proxy server.

Get Proxy
There are hardware and software versions. Hardware connections sit between
your network and the internet, where they get, send, and forward data from the
web. Software proxies are typically hosted by a provider or reside in the cloud.
You download and install an application on your computer that facilitates
interaction with the proxy.
How Does the Proxy Protect Computer Privacy and Data?
A proxy server performs the function of a firewall and filter. The end-user or a
network administrator can choose a proxy designed to protect data and
privacy. This examines the data going in and out of your computer or network.
It then applies rules to prevent you from having to expose your digital address
to the world. Only the proxy’s IP address is seen by hackers or other bad
actors. Without your personal IP address, people on the internet do not have
direct access to your personal data, schedules, apps, or files.
With it in place, web requests go to the proxy, which then reaches out and gets
what you want from the internet. If the server has encryption capabilities,
passwords and other personal data get an extra tier of protection.

packet is a small segment of a larger message. Data sent over computer
networks*, such as the Internet, is divided into packets.network packet is a
formatted unit of data carried by a packet-switched network. A packet consists
of control information and user data; the latter is also known as the payload. 

You might also like