f r 1sas
TRANSCRIPT
-
8/10/2019 f r 1sas
1/47
Configuration of Proxy Server
GRWP Tasgaon Page 1
1.INTRODUCTION
1.1 PROBLEM DEFINITION:-
We can block unwanted websites by words, by websites, by sentence.
To speed up access to resources using caching. Faster Internet Connections for Internal LAN.Secure the Internal LAN When browsing the Internet. Blocks the unwanted activity by clients on
the www.
1.2 OBJECTIVE
Squid is a high-performance HTTP and FTP caching proxy server. It isalso known as a Web proxy cache. It can make your network connections more efficient. As it
stores data from frequently used Web pages and files, it can often give your users the data they
need without having to look to the Internet.
Studies on very busy networks suggest that a Squid server can reduce thesize, or bandwidth, of your Internet connection by 10-20 percent. That can lead to considerable
savings for larger office.
-
8/10/2019 f r 1sas
2/47
Configuration of Proxy Server
GRWP,Tasgaon Page 2
2. PLANNING AND SYSTEM
2.1 STUDY OF EXISTING SYSTEM:-
In existing System we block the website using Internet
browser setting but it take more time and effort. In LAN connection if we want to block some
website then we require configure internet setting in all machines in that LAN. But there is
possibility to user can change this setting of machine in LAN connection in school and colleges.
Using proxy server we can avoid all this possibilities and efforts. So we require configure proxy
server on main server of that LAN.
2.2 PROPOSED SYSTEM:-
In our whole project we mostly concentrate on configuring proxy
server using two features that are blocking website and cashing most frequently webpages.
For that purpose we need to install the following:-
1] Red Hat Enterprise Linux
2] Bind Packages
3] Squid package
In the LINUX operating system proxy server is also called squid
proxy server. In our system all machines are connected to Proxy server. User can not directly
access Internet connection. If user wants to Internet connection then it has to be send request to
the first proxy server. When proxy server accept this request then he first check it is accessible or
not in the directory. If this request is accessible then it send to main server and main server. If
request is dined then he sends response to user that is access dined.
And also proxy server cashing most frequently WebPages. If therequested webpage is store in cache then proxy server give response that webpage without
forwarding this request to the main server.
-
8/10/2019 f r 1sas
3/47
-
8/10/2019 f r 1sas
4/47
Configuration of Proxy Server
GRWP,Tasgaon Page 4
Types of Proxy Server
Transparent Proxy:-
A Transparent Proxy Server tells the remote Computer the IP Address of
your Computer. This provides no privacy. Anonymous Proxy Servers can further be broken
down into two more categories, Elite and Disguised. An Elite Proxy Server is not identifiable to
the remote computer as a Proxy in any way. A Disguised Proxy Server gives the remote
computer enough information to let it know that it is a Proxy, however it still does not give away
the IP of the Computer it is relaying information for.
Open proxy:-
An open proxy is a proxy server which will accept client.connections fromany IP address and make connections to any Internet resource. Abuse of open proxies is currently
implicated in a significant portion of e-mail spam delivery. Spammers frequently install open
proxies on unwitting end users' operating systems by means of computer viruses designed for
this purpose. Internet Relay Chat (IRC) abusers also frequently use open proxies to cloak their
identities.
Anonymous Proxy
This type of proxy server identifies itself as a proxy server, but does not make
the original IP address available. This type of proxy server is detectable, but provides reasonableanonymity for most users.
Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an
incorrect original IP address available through the http headers.
High Anonymity Proxy:-
This type of proxy server does not identify itself as a proxy server and does not make available
the original IP.
-
8/10/2019 f r 1sas
5/47
Configuration of Proxy Server
GRWP,Tasgaon Page 5
3. REQUIREMENT ANALYSIS
3.1 Software Requirement :
1. Red Hat Linux Enterprise Edition 5.
2. Squid Package.
3. Bind Package.
Advantages of Linux :
Multitasking:
Several programs can run at the same time.
Multiuser:
Several users can logon to the same machine at the same time. There is no need to
have separate user licenses.
Multiplatform:
Linux runs on many different CPUs that mean it supports multiprocessor
machine.
Demand loads executables:
Linux only reads from those parts of a program that are actually used on the disk.
-
8/10/2019 f r 1sas
6/47
Configuration of Proxy Server
GRWP,Tasgaon Page 6
3.2 HARDWARE REQUIREMENT
PROCESSOR 32-bit/64-bit Pentium 4
RAM 4 GB
(may vary depends on number of
clients)
Hard Disk
Ethernet Cards
300 GB
(As there are number of users have
own disk space)
Two
-
8/10/2019 f r 1sas
7/47
Configuration of Proxy Server
GRWP,Tasgaon Page 7
4. DESIGN METHODLOGY
4.1 System Architecture
This field gives the overall information of the project via diagrammatic
structure. The system architecture contain following fields:-
1. Installing Red Hat Enterprise Linux 5 server.
2. Configuration of Network services.
3. Configuration of squid.
4. Etc
The diagrammatic representation shows how the system will work. Also is
shows that how the data should flow in overall system. The explanation
Related to the system architecture is as following:-
1. Installing Red Hat Linux 5:-
Linux operating system is very secure and its file system is very Strong. So
we choose the Linux operating system &install Linux Red Hat RHEL5.
2. Configuration of Network services:-
In the configuration of Network services we configure Host file & assign
IP.
3.
Configuration of squid:-
Then configure this file using different acl(Access Control List) statements.
a. Deny access to specific user
b. Deny access by websites
c. Deny access by time
d. Allow websites
e. Caching recently requested web pages
-
8/10/2019 f r 1sas
8/47
Configuration of Proxy Server
GRWP,Tasgaon Page 8
SYSTEM ARCHITECTURE
C1 C2 C3 C4
Proxy Server
Installing
RHEL 5 server
Administrator
Configure
Network
services
Implement
Proxy
Assigning
IP
Configure
host file
Configure
Squd.conf file
Deny access to
specific userDeny access
to Website
Deny Access
by time
Allow
Websites
Cashing
Web pages
Web Server
-
8/10/2019 f r 1sas
9/47
Configuration of Proxy Server
GRWP,Tasgaon Page 9
DATA FLOW DIAGRAMS
DFD Level 1
aw
Web
Server
Main Server
Proxy
Server
C1
C2
C3
C4
-
8/10/2019 f r 1sas
10/47
Configuration of Proxy Server
GRWP,Tasgaon Page 10
DFD LEVEL 2
Web
Server
C1
C2
C3
C4
Main Server
ProxyServer
CashingBlocking Log
-
8/10/2019 f r 1sas
11/47
Configuration of Proxy Server
GRWP,Tasgaon Page 11
DFD LEVEL 3
Web
Server
Cashing
C1
C2
C3
Main Server
Proxy
Server
BlockingLog
Directory
Hard
Disk
Deny
access to
specific
user
Deny
Access
by time
Deny
access
to
Websit
Log
Report
-
8/10/2019 f r 1sas
12/47
Configuration of Proxy Server
GRWP,Tasgaon Page 12
UML DIAGRAM
UML (Unified Modeling Language)
UML is a (Unified Modeling Language).It is a standard language for writing software blueprints.
The UML is used to
a) Visualize
b) Specify
c) Construct
d) Document the artifacts of software-intensive system.
We implement three types of UML diagrams that are
1. Use case Diagram
2. Sequence Diagram
3. Activity Diagram
1. Use case Diagram:-
Use case diagram is useful to view a set of use cases that is special type of
class and their relationships.
2. Sequence Diagram:-
In Sequence diagram an interaction is made up of set of objects and their
relationships
3. Activity Diagram:-
Activity Diagram represents the flow from activity to activity within a system. It is type of State
chart diagram.
-
8/10/2019 f r 1sas
13/47
Configuration of Proxy Server
GRWP,Tasgaon Page 13
1. USE CASE DIGRAM
User
Proxy Server
Request web site
Filtering web site
Allow and deny
specific web sites
Deny access to
s ecific user
Caching web sites
Response for
Allow web site
Maintain log record
Administrat
-
8/10/2019 f r 1sas
14/47
Configuration of Proxy Server
GRWP,Tasgaon Page 14
2. SEQUENCE DIAGRAM
USER PROXY SERVER MAIN SERVER
1. Request for web side
2. Filtering
3. Allow the web side
5. Blocked web sit
6. Response to website
4. Response to web site
10. Response to web page
7. Most frequently web pages
8. Check it is in cache
9. Web page found
11. Web page not found
12. Request to main server
13. Response for web pages
5. Caching
16. Maintain log records
15. Response for webpage 14. Cashing
-
8/10/2019 f r 1sas
15/47
Configuration of Proxy Server
GRWP,Tasgaon Page 15
3. ACTIVITY DIAGRAM
User
Proxy Server
Filtering
Check it is
in cache
Main Server
Send
Response
Send
response to
proxy server
Send Request Access is denied
Block Website
Allow Websites
Not found in cache
Found in cache
Send
Response
-
8/10/2019 f r 1sas
16/47
-
8/10/2019 f r 1sas
17/47
Configuration of Proxy Server
GRWP,Tasgaon Page 17
Step 2: - Keyboard Configuration
Next step is to select the correct layout type (for example U.S. English)for the
keyboard you would prefer to use for the installation and as the system default as shown in fig 5.2.
Figure 5.2. Keyboard Configuration
Once selecting the appropriate type then click on Next to continue.
-
8/10/2019 f r 1sas
18/47
Configuration of Proxy Server
GRWP,Tasgaon Page 18
Step 3: - Disk Partitioning Setup
Partitioning allows you to divide your hard drive into isolated sections,
where each section behaves as its own hard drive. Partitioning is particularly useful if you run
multiple operating systems. On this screen, we choose to perform automatic partitioning.
Step 4: - Automatic Partitioning
While doing automatic partitioning the three options are:
A] Remove all Linux partitions on this system
B] Remove all partitions on this system:-
We select this option to remove all partitions on your hard drive.
C] Keep all partitions and use existing free space
Figure5.3. Automatic Partitioning
-
8/10/2019 f r 1sas
19/47
Configuration of Proxy Server
GRWP,Tasgaon Page 19
Clicking Next to continue.
Step 5: - Partitioning Your System
If you chose automatic partitioning and selected Review, you can eitheraccept the current partition settings (click Next), or modify the setup using Disk Druid, the
manual partitioning tool.
If you chose to partition manually, you must tell the installation program
where to install Red Hat Enterprise Linux. This is done by defining mount points for one or more
disk partitions in which Red Hat Enterprise Linux is installed. You may also need to create
and/or delete partitions at this time.
Figure5.4 Partitioning with Disk Druid on x86, AMD64, and Intel EM64T Systems
-
8/10/2019 f r 1sas
20/47
Configuration of Proxy Server
GRWP,Tasgaon Page 20
Figure5.5. Partitioning with Disk Druid on Itanium Systems
Step 5.1: - Adding partitions
To add a new partition, select the New button
Step 5.5:- Adding Partitions
To add a new partition, select the Newbutton.
-
8/10/2019 f r 1sas
21/47
Configuration of Proxy Server
GRWP,Tasgaon Page 21
Fig.5.6. Creating a New Partition
Mount Point:-
Enter the partition's mount point. For example, if this partition should be the root
partition, enter /; enter /boot for the /boot partition, and so on.
File System Type:-
Using the pull-down menu, select the appropriate file system type for this partition.
Allowable Drives:
This field contains a list of the hard disks installed on your system. If a hard disk's
box is highlighted, then a desired partition can be created on that hard disk. If the box is notchecked, then the partition will never be created on that hard disk. By using different checkbox
settings, you can have Disk Druid place partitions where you need them, or let Disk Druid decide
where partitions should go.
-
8/10/2019 f r 1sas
22/47
Configuration of Proxy Server
GRWP,Tasgaon Page 22
Size (MB):
Enter the size (in megabytes) of the partition. Note, this field starts with 100 MB;
unless changed only a 100 MB partition will be created.
Additional Size Options:
Choose whether to keep this partition at a fixed size, to allow it to "grow" (fill up the
available hard drive space) to a certain point, or to allow it to grow to fill any remaining hard
drive space available.
Step 6: - Network Configuration
Figure 6.1 Network Configurations
The installation program automatically detects any network devices you have and
display them in the Network Devices list.
-
8/10/2019 f r 1sas
23/47
Configuration of Proxy Server
GRWP,Tasgaon Page 23
Once you have selected a network device, click Edit. From the Edit
Interface pop-up screen, you can choose to configure the IP address and Netmask of the device
via DHCP (or manually if DHCP is not selected) and you can choose to activate the device at
boot time. If you select Activate on boot, your network interface is started when you boot. If you
do not have DHCP client access or you are unsure what to provide here, please contact your
network administrator.
Figure 6.2 Editing a Network Device
-
8/10/2019 f r 1sas
24/47
Configuration of Proxy Server
GRWP,Tasgaon Page 24
Step 7: - Firewall Configuration
Red Hat Enterprise Linux offers firewall protection for enhanced system
security. A firewall exists between your computer and the network, and determines which
resources on your computer remote users on the network can access.
Figure7.1. Firewall Configuration
Next, we decide whether to enable a firewall for your Red Hat Enterprise Linux system.
-
8/10/2019 f r 1sas
25/47
Configuration of Proxy Server
GRWP,Tasgaon Page 25
No firewall
No firewall provides complete access to your system and does no security checking.
Security checking is the disabling of access to certain services. This should only be selected if
you are running on a trusted network (not the Internet) or plan to do more firewall configuration
later.
Enable firewall
If you choose Enable firewall, connections are not accepted by your system (other
than the default settings) that is not explicitly defined by you. By default, only connections in
response to outbound requests, such as DNS replies or DHCP requests are allowed. If access to
services running on this machine is needed, you can choose to allow specific services through the
firewall. If you are connecting your system to the Internet, this is the safest option to choose.
Next, select which services, if any, should be allowed to pass through the firewall.
Enabling these options allow the specified services to pass through the firewall. Note, these
services may not be installed on the system by default. Make sure you choose to enable any
options that you may need.
Remote Login (SSH)
Secure Shell (SSH) is a suite of tools for logging in to and executing commands on a
remote machine. If you plan to use SSH tools to access your machine through a firewall, enablethis option. You need to have the openssh-server package installed in order to access your
machine remotely, using SSH tools.
Web Server (HTTP, HTTPS)
The HTTP and HTTPS protocols are used by Apache (and by other Web servers) to
serve WebPages. If you plan on making your Web server publicly available, enable this option.
This option is not required for viewing pages locally or for developing WebPages. You must
install the httpd package if you want to serve WebPages.
File Transfer (FTP)
The FTP protocol is used to transfer files between machines on a network. If you
plan on making your FTP server publicly available, enable this option. You must install the
vsftpd package in order to publicly serve files.
-
8/10/2019 f r 1sas
26/47
Configuration of Proxy Server
GRWP,Tasgaon Page 26
Mail Server (SMTP)
If you want to allow incoming mail delivery through your firewall, so that remote
hosts can connect directly to your machine to deliver mail, enable this option. You do not need toenable this if you collect your mail from your Internet Service Provider's server using POP3 or
IMAP, or if you use a tool such as fetch mail. Note that an improperly configured SMTP server
can allow remote machines to use your server to send spam.
Three states are available for you to choose from during the installation process:
i) Disable
Select Disable if you do not want SELinux security controls enabled on this
system. The Disabled setting turns enforcing off and does not set up the machine for the use of a
security policy.
ii) Warn
Select Warn to be notified of any denials. The Warn state assigns labels to data
and programs, and logs them, but does not enforce any policies. The Warn state is a good starting
place for users who eventually want a fully active SELinux policy, but who first want to see what
effects the policy would have on their general system operation.
iii) Active
Select Active if you want SELinux to act in a fully active state. The Active
state enforces all policies, such as denying access to unauthorized users for certain files and
programs, for additional system protection. Choose this state only if you are sure that your
system can still properly function with SELinux fully enabled.
Step 8: - Language Support Selection
We select a language to use as the default language. The default language is the
language used on the system once the installation is complete. Typically, the default language is
the language you selected to use during the installation.
-
8/10/2019 f r 1sas
27/47
Configuration of Proxy Server
GRWP,Tasgaon Page 27
Figure8.1. Language Support Selection
Step 9:- Time Zone Configuration
Set your time zone by selecting the city closest to your computer's physical location.
There are two ways for you to select your time zone:
Using mouse, click on the interactive map to select a specific city (represented by a yellow dot).
A red Xappears indicating your selection.
We can also scroll through the list at the bottom of the screen to select your time zone. Using
your mouse, click on a location to highlight your selection.
-
8/10/2019 f r 1sas
28/47
Configuration of Proxy Server
GRWP,Tasgaon Page 28
Figure9.1. Configuring the Time Zone
Step 10:- Set Root Password
Setting up a root account and password is one of the most important steps during
your installation. Your root account is similar to the administrator account used on Windows NT
machines. The root account is used to install packages, upgrade RPMs, and perform most system
maintenance. Logging in as root gives you complete control over your system.
-
8/10/2019 f r 1sas
29/47
Configuration of Proxy Server
GRWP,Tasgaon Page 29
Figure 10.1 Root Password
Step 11: - Package Group Selection
The Package Installation Defaults screen appears and details the default package set for
your Red Hat Enterprise Linux installation. This screen varies depending on the version of Red Hat
Enterprise Linux you are installing.
To customize your package set further, select Customize the set of packages to be installed
option on the screen. Clicking Next takes you to the Package Group Selection screen.
You can select package groups, which group components together according to function
(for example, X Window System and Editors), individual packages, or a combination of the two.
-
8/10/2019 f r 1sas
30/47
Configuration of Proxy Server
GRWP,Tasgaon Page 30
Figure 11.1 Package Group Selection
Select each component you wish to install. Selecting Everything (at the end of the
component list) installs all packages included with Red Hat Enterprise Linux. Once a package
group has been selected, click on Details to view which packages are installed by default, and to
add or remove optional packages from that group.
-
8/10/2019 f r 1sas
31/47
Configuration of Proxy Server
GRWP,Tasgaon Page 31
Figure11.2 Package Group Details
A screen preparing you for the installation of Red Hat Enterprise Linux now appears.
Step 12: - Installation Complete
Congratulations! Your Red Hat Enterprise Linux installation is now complete!
-
8/10/2019 f r 1sas
32/47
-
8/10/2019 f r 1sas
33/47
Configuration of Proxy Server
GRWP,Tasgaon Page 33
# TAG: http_access
# Allowing or Denying access based on defined access lists
#
# Access to the HTTP port:
# http_access allow|deny [!]aclname ...
#
# NOTE on default values:
# If there are no "access" lines present, the default is to deny
# the request.
#
# If none of the "access" lines cause a match, the default is the
# opposite of the last line in the list. If the last line was
# deny, the default is allow. Conversely, if the last line
# is allow, the default will be deny. For these reasons, it is a
# good idea to have an "deny all" or "allow all" entry at the end
# of your access lists to avoid potential confusion.
#
#Default:
# http_access deny all
##Recommended minimum configuration:
#
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager
# Deny requests to unknown ports
http_access deny !Safe_ports
-
8/10/2019 f r 1sas
34/47
Configuration of Proxy Server
GRWP,Tasgaon Page 34
#
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
# Example rule allowing access from your local networks. Adapt
# to list your (internal) IP networks from where browsing should
# be allowed
#acl our_networks src 192.168.1.0/24 192.168.2.0/24
#http_access allow our_networks
# And finally deny all other access to this proxy
http_access allow localhost
http_access deny web_deny
http_access allow allow_network
http_access deny all
# TAG: http_reply_access
# Allow replies to client requests. This is complementary to http_access.
#
# http_reply_access allow|deny [!] aclname ...
#
# NOTE: if there are no access lines present, the default is to allow
# all replies
-
8/10/2019 f r 1sas
35/47
Configuration of Proxy Server
GRWP,Tasgaon Page 35
#
# If none of the access lines cause a match the opposite of the
# last line will apply. Thus it is good practice to end the rules
# with an "allow all" or "deny all" entry.
#
#Default:
# http_reply_access allow all
#
#Recommended minimum configuration:
#
# Insert your own rules here.
#
#
# and finally allow by default
http_reply_access allow all
# TAG: icp_access
# Allowing or Denying access to the ICP port based on defined
# access lists
#
# icp_access allow|deny [!]aclname ...
#
# See http_access for details
#
-
8/10/2019 f r 1sas
36/47
Configuration of Proxy Server
GRWP,Tasgaon Page 36
# OPTIONS WHICH AFFECT THE CACHE SIZE
# -----------------------------------------------------------------------------
# TAG: cache_mem (bytes)
# NOTE: THIS PARAMETER DOES NOT SPECIFY THE MAXIMUM PROCESS
SIZE.
# IT ONLY PLACES A LIMIT ON HOW MUCH ADDITIONAL MEMORY SQUID
WILL
# USE AS A MEMORY CACHE OF OBJECTS. SQUID USES MEMORY FOR
OTHER
# THINGS AS WELL. SEE THE SQUID FAQ SECTION 8 FOR DETAILS.
#
# 'cache_mem' specifies the ideal amount of memory to be used
# for:
# * In-Transit objects
# * Hot Objects
# * Negative-Cached objects
#
# Data for these objects are stored in 4 KB blocks. This
# parameter specifies the ideal upper limit on the total size of
# 4 KB blocks allocated. In-Transit objects take the highest
# priority.
#
# In-transit objects have priority over the others. When
# additional space is needed for incoming data, negative-cached
# and hot objects will be released. In other words, the
# negative-cached and hot objects will fill up any unused space
# not needed for in-transit objects.
-
8/10/2019 f r 1sas
37/47
Configuration of Proxy Server
GRWP,Tasgaon Page 37
# If circumstances require, this limit will be exceeded.
# Specifically, if your incoming request rate requires more than
# 'cache_mem' of memory to hold in-transit objects, Squid will
# exceed this limit to satisfy the new requests. When the load
# decreases, blocks will be freed until the high-water mark is
# reached. Thereafter, blocks will be used to store hot
# objects.
#
#Default:
cache_mem 8 MB
# TAG: cache_swap_low (percent, 0-100)
# TAG: cache_swap_high (percent, 0-100)
#
# The low- and high-water marks for cache object replacement.
# Replacement begins when the swap (disk) usage is above the
# low-water mark and attempts to maintain utilization near the
# low-water mark. As swap utilization gets close to high-water
# mark object eviction becomes more aggressive. If utilization is
# close to the low-water mark less replacement is done each time.
#
# Defaults are 90% and 95%. If you have a large cache, 5% could be
# hundreds of MB. If this is the case you may wish to set these
# numbers closer together.
#
-
8/10/2019 f r 1sas
38/47
-
8/10/2019 f r 1sas
39/47
Configuration of Proxy Server
GRWP,Tasgaon Page 39
# TAG: cache_access_log
# Logs the client request activity. Contains an entry for
# every HTTP and ICP queries received. To disable, enter "none".
#
#Default:
cache_access_log /var/log/squid/access.log
# TAG: cache_log
# Cache logging file. This is where general information about
# your cache's behavior goes. You can increase the amount of data
# logged to this file with the "debug_options" tag below.
#
#Default:
cache_log /var/log/squid/cache.log
# TAG: cache_store_log
# Logs the activities of the storage manager. Shows which
# objects are ejected from the cache, and which objects are
# saved and for how long. To disable, enter "none". There are
# not really utilities to analyze this data, so you can safely
# disable it.
#
#Default:
cache_store_log /var/log/squid/store.log
-
8/10/2019 f r 1sas
40/47
Configuration of Proxy Server
GRWP,Tasgaon Page 40
# TAG: cache_swap_log
# Location for the cache "swap.state" file. This log file holds
# the metadata of objects saved on disk. It is used to rebuild
# the cache during startup. Normally this file resides in each
# 'cache_dir' directory, but you may specify an alternate
# pathname here. Note you must give a full filename, not just
# a directory. Since this is the index for the whole object
# list you CANNOT periodically rotate it!
#
# If %s can be used in the file name it will be replaced with a
# a representation of the cache_dir name where each / is replaced
# with '.'. This is needed to allow adding/removing cache_dir
# lines when cache_swap_log is being used.
#
# If have more than one 'cache_dir', and %s is not used in the name
# these swap logs will have names such as:
## cache_swap_log.00
# cache_swap_log.01
# cache_swap_log.02
#
# The numbered extension (which is added automatically)
# corresponds to the order of the 'cache_dir' lines in this
# configuration file. If you change the order of the 'cache_dir'
# lines in this file, these log files will NOT correspond to
# better to keep these log files in each 'cache_dir' directory.
#
-
8/10/2019 f r 1sas
41/47
Configuration of Proxy Server
GRWP,Tasgaon Page 41
In this way we block this web site using acl statements. We also create recode for cashing most
frequently web pages.
Web-deny
www.facebook .com
www.youtube.com
www.rediffmail.com
http://www.youtube.com/http://www.youtube.com/ -
8/10/2019 f r 1sas
42/47
-
8/10/2019 f r 1sas
43/47
-
8/10/2019 f r 1sas
44/47
Configuration of Proxy Server
GRWP,Tasgaon Page 44
ADVANTAGES
Faster internet connection for LAN.
Secure the LAN when browsing the internet.
Blocks the unwanted activity by clients on the http.
Allow the internet access to the authorized users only.
Always watch & filter the sensitive data.
Proxy Server is give to speed up access to resource using cashing.
Do the acceleration of web page.
-
8/10/2019 f r 1sas
45/47
Configuration of Proxy Server
GRWP,Tasgaon Page 45
FUTURE ENHANCEMENT
In advance we implement following features of proxy server
SMTP Proxy
Implementation of firewall in proxy server
Anonym zing proxy
Open proxy
Forced proxy
-
8/10/2019 f r 1sas
46/47
Configuration of Proxy Server
GRWP,Tasgaon Page 46
9. CONCLUSION
In our project finally we conclude that Proxy Server is a invisible to the user. All
internet request & returned responses appear to be directly with the addressed internet server. It is act as aboth server as well as server. It reduces Network traffic and they could regulate, allowing disallowing
certain communication. It is able to share single internet connection.
Proxy server used in LAN connections, school, colleges etc.
-
8/10/2019 f r 1sas
47/47
Configuration of Proxy Server
10. Bibliography
Books:
Computer Network :- Andrew S. Tanenbumb.
The Complete Reference Book :- Oraig Zacker.
Web site:
www.squidproxy.net
www.adeelkml.tk
www.linux.org
http://www.squidproxy.net/http://www.adeelkml.tk/http://www.linux.org/http://www.linux.org/http://www.adeelkml.tk/http://www.squidproxy.net/