Network Appliances: Proxy Server

Video Activity

Network Appliances: Proxy Server This lesson discusses the proxy server. A proxy server is a network appliance that is able to work in between our computers and the Internet. Proxy servers offer additional privacy and content filtering as well as increased performance and caching.

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

31 hours 29 minutes
Video Description

Network Appliances: Proxy Server This lesson discusses the proxy server. A proxy server is a network appliance that is able to work in between our computers and the Internet. Proxy servers offer additional privacy and content filtering as well as increased performance and caching.

Video Transcription
our next device that we have is are going to be our proxy servers. Now, our proxy server, we're talking about the word proxy. A proxy is something or someone that goes on our behalf. So if you think of a diplomat to another country or a person who is a an ambassador to another country, they're sort of that
the governments of the sending company there sort of are the sending countries proxy. They act as the messenger. They put the person that goes on their behalf because we can't take the entire country of a certain of the entire government of a certain country and send them to a different country. We send a proxy, we send that ambassador.
So our proxy server is an in between between our computers and some device that we're trying to connect out to on the Internet.
So why do we want to do that? What? Nets slow down our response time, our connection between us and the other person. Why do we want to have something in between us and our in point?
Well, a proxy server can do things such as providing us with additional privacy. If you think of what we're exposing our what we're exposing to the point. If we have a proxy than the in point sees, the proxy is being what's connected to them rather than us.
Our proxy essentially sins. Whatever request we send the proxy to the end point and then when it receives back the response, it's it's in the response back to us. So the proxy provides us with additional privacy because the in point doesn't see what's sending the information to the proxy.
The end point does not see us. It only since sees our proxy sending that
We also have content filtering if we have a proxy set up in our network that multiple users connect to weaken, set up content filtering on that proxy to not allow certain content to be received, weaken Set up certain rules that say, If you see any, if you see me traffic trying to go through this proxy server with
keywords in the Urals
such that we don't want in our environment types of websites that we don't want people visiting in our environment than our proxy simply will just drop those requests or they'll send back in air message that says you have your You've been blocked from seeing this content because of certain rules on our network so we can set up a
In addition to just additional privacy, we can have content filtering set upon our proxy.
Our proxy server can also give us increase performance. Well, it does this by allowing us to cash certain pages that are being viewed a lot. Our proxy may say, Okay, I'm gonna cash the pages that are viewed more than, say, three or four times by different users. So if
there's a certain page that a lot of users and our environment are visiting over and over and over and over,
rather than having to have a proxy go all the way out to the Internet to get that page, our proxy is just gonna cash the results and
say, If we go to view that page again or someone else tries to go in view that page, they're just going to get the results back from the proxy rather than the proxy having to go all the way out to the Internet to get it.
So let's take a look at our diagram here and see if we can see a little bit examples of some proxies. So we have our Internet cloud up here, and we have our network right here.
So we have two computers and we're going to say to start off that this device right here is going to be our proxy device. So rather than our computers connecting to a router to connect out to the Internet to connect to, ah, Web server somewhere out on the Internet, we connect to our proxy.
I say we have content filtering set upon that proxy so that if someone tries to send a request to that proxy for a certain website, we don't allow that our proxy will just block the request and then send back an air message. Or if we have two computers that request data from the same website up here,
then the proxy is just gonna cash that Web page
so that when our computer be requests the same page, it's just gonna get the cash to result rather than having to have the proctor to go all the way back out to the Internet and load the result again, so reduces some of our network traffic.
So our proxy is providing privacy and providing content filtering.
Now what if we want a proxy that's outside of our network? Well, that's possible, too. There are Internet based proxies that essentially allow us to connect to a different server out on the Internet and then use that server sort of as a hop to are in point. So the in point doesn't even see our local. They don't even see our I p address
of our public facing I p address.
let's say we don't have this proxy right here
in both of our devices. Just connect straight to our router.
But we have our devices configured
that before they connect to anywhere else on the Internet, they first connect to this Internet based proxy.
So if Computer A is trying to get to Cyber Re Cy buried at I T,
then Computer A is first going to send a request
through the Internet
over to our proxy server, which is on a completely different network, and then our proxy server is going to say OK, so you need to go to cyber dot i t.
Let me send a request with my information are with my i P information
over to cyber id that I t requests the page, download the page back to me,
and then I'm going to service the request.
A way back to you.
So a proxy server sort of acts is ah, hop so that we can *** weaken,
give ourselves some additional privacy. So are in point does not see exactly what we're connecting to. This may also help to prevent some people on our network. See, we're seeing what we're connecting to because they just see us as connecting to the proxy and sending requests to the proxy to connect out to the Internet. But
we're gonna talk about uneven,
a better version of that called VPN concentrators in just a second, connecting to remote devices without people on our network really seeing what's going on. But our proxy, we need to be very careful of who we're connecting to, especially for connecting to a proxy out on the Internet. Because in order to process our requests out,
this proxy server is going to send me to be seeing all of the information that we're sending through it.
So is acting. It's acting as a man in an intentional man in the middle, but if we're sending sensitive information, we don't want them to. We don't want them to see the sensitive information that we're sending. So there are a lot of websites out on the Internet that you that our act as free proxy service is that allow, you know, you can
go through me and then connect to a Web sites. And then people at work can't see what you're doing. And they can't filter what you're doing at work.
Well, they may provide that, but
as a TTE the cost of them snooping on everything that you're doing, so you may not want them to be able to snoop on all that you're doing. So
be careful what proxies you're connecting to. Onley Connect, Tiu. You're at work. Just leave your network settings. Thio what the authorized network settings are. Don't try to bypass work filters or don't try to bypass work content filters by connecting to unauthorized proxies, because that can cause a lot of a lot of troubles for you.
They can cause some issues in your network as well.
Eso just watch out for those Internet based proxies, but just back to our basic explanations when you're thinking of proxies. Remember that that proxies mean to go on our behalf. And so our proxy server is going to be a device that we connect to before we go out to our in point.
And then our proxy server is what's going to send out that request, received information and then pass it along to us.
Up Next
CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By