• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Working with Proxy Servers

When you connect your network to the Internet using an ISP or an IAP, you are setting up an environment that provides an unrestricted flow of information between your network and just about everyone else in the world (everyone with an Internet connection). Now, because you know and trust (at least somewhat, hopefully) the users on your internal network and have implemented some security measures on the LAN, you can consider it a trusted network. However, because you don't know everyone else in the world and have very little control over security on the Internet itself, you would have to consider the Internet an untrusted network.

Every time one of your network users connects to the Web or downloads files from an FTP site, information such as the IP address of the user's computer can be recorded by the Web or FTP site the user connects to. A way to hide important information that can easily be collected (and potentially used to crack into your network) when your users access the Internet is to use a proxy server.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint