Many a times we come across the name proxy server and firewall. Proxy
servers are used as intermediary for requests from clients requesting
resources from other servers. The advantage here is the remote machine
hosting the information never comes in contact with your computer. All
communication is handled through the proxy server. When multiple resources
request for the same data, all requests are redirected to the proxy server
if the information is available in the cache it is sent without connecting
to the main server all the time, hence its faster and also helps blocking
irrelevant content and managing user requests easier. For example if an
organization wants to restrict access to certain sites, it easier to change
the settings in the proxy server.
servers are used as intermediary for requests from clients requesting
resources from other servers. The advantage here is the remote machine
hosting the information never comes in contact with your computer. All
communication is handled through the proxy server. When multiple resources
request for the same data, all requests are redirected to the proxy server
if the information is available in the cache it is sent without connecting
to the main server all the time, hence its faster and also helps blocking
irrelevant content and managing user requests easier. For example if an
organization wants to restrict access to certain sites, it easier to change
the settings in the proxy server.
Today with a lot of outsourcing and increase use of internet, the need for
data security has also increased. To transfer information from the intranet
(LAN) to external network (WAN) and to ensure that only the required
information gets transferred across the network a DMZ (Demilitarized zone)
is created. This set up is also similar to the proxy. The computers within
the DMZ send request to the hopping server (firewall or bridge) and the
hopping server send request to the client. At times they could be more than
one hopping servers. Each system holds only the address of the host to which
it should respond and the host to which it should forward the request. Ports
are enabled only to transfer selected information. The source and
destination IP is hidden. In this way a more secure connection is made,
enabling working from different geographical locations and sharing the
piece of work among different organizations. DMZ is an additional layer of
security for sensitive data. The diagram below gives a rough sketch of how
data is transmitted.
data security has also increased. To transfer information from the intranet
(LAN) to external network (WAN) and to ensure that only the required
information gets transferred across the network a DMZ (Demilitarized zone)
is created. This set up is also similar to the proxy. The computers within
the DMZ send request to the hopping server (firewall or bridge) and the
hopping server send request to the client. At times they could be more than
one hopping servers. Each system holds only the address of the host to which
it should respond and the host to which it should forward the request. Ports
are enabled only to transfer selected information. The source and
destination IP is hidden. In this way a more secure connection is made,
enabling working from different geographical locations and sharing the
piece of work among different organizations. DMZ is an additional layer of
security for sensitive data. The diagram below gives a rough sketch of how
data is transmitted.
Post a Comment