bbc proxy server

Windows Strengths and failings
The overwhelming majority of computers, both personal and bodied, use Microsoft Windows, which has included Internet access as well over a decade and as Windows became harder, so has its Internet connectivity software. Windows ninety-eight Second Edition introduced Internet Connection Sharing (ICS) to allow group access to the Internet from a local network. More complexities were added with the outbreak of expelling and Remote Access Service in Widows 2000 Server on its Network Address Translation (NAT) functions.

It took a long time before experts noticed that ICS has specific shortcomings. Intelligence Community* changes network card addresses, which can cause problems about intranets. Because of this, ICS can only be applied in small office or home networks and even and so, ICS in office networks is not recommended, because there has no user authorization or validation with ICS. Even out using it on a home network makes any association to the Internet insecure, since it is so at ease for criminals to gain access to your computers along falsifying where they are coming from (their IP and MAC addresses).

Some Help is Needed
Windows can coordinate Internet sharing, but security has never been a forte. In practice either hardware or software solutions by other companies are generally purchased to provide the certificate solutions needed. One of the more important of this is UserGate Proxy Server.

UserGate Proxy Server provides local anaesthetic network users with a secure Internet access by delimitating policies of this access, forbidding particular Internet resources, and limiting traffic or time of a user’s work about the Internet. Additionally, UserGate can keep distinct traffic computations of users and of protocols, which greatly simplifies cyberspace traffic cost control. Lately, among Internet Service Providers (ISP) there has been a tendency towards unlimited traffic and for that purpose, UserGate Proxy Server provides a identical flexible system of rules.

UserGate Proxy Server with NAT support works on Windows 2000/2003/XP with the Internet (using the standard TCP/IP protocols). UserGate can also work on Windows 98 and Windows NT forty, but without NAT support. UserGate does not ask any special resources for its operation; it simply asks a relatively small amount of hard drive memory as its cache and log files. UserGate can also comprise installed on a dedicated computer to maximize your electronic network* resources.

Proxy Servers
Your web browser (whether it are Internet Explorer, Firefox, Safari, Netscape, Opera or Mozilla to name the most popular) is already able to hive up documents. However, significant disk space is not reserved as these purposes if the Internet connection is shared along an entire office. The reason for this is that the probability of one person visiting the same cyberspace pages is far less than if dozens or 100s of people are sharing the connection. Creating a basal cache for a company can greatly decrease bandwidth barren as well as make almost instantaneous the receipt by documents that are commonly accessed by employees. UserGate placeholder Server can also link with the external cascade placeholder servers (of your Internet Service Provider) to increase the speed of receiving data and reduce your Internet accounts (traffic costs for a provider are usually less as a proxy server is used).

Program Configuration
Configuring the cache settings is done from the «Services» page. The first step is to enable the cache, then you are able to set its separate options, which include caching by POST requests, dynamic objects, cookies, and FTP content. You are able to also set the size of the disc blank for the cache and the time-to-live of cached paperses.

Other options must also be set before you can buoy start working with the program. As a rule, these task is completed in the following order:

1. Make users of the program.

2. Configure DNS and NAT on the UserGate server. At this stage you can buoy configure NAT using the wizard.

3. Set parameters by the various protocols (HTTP, FTP, SOCKS), the intranet port on which they will be listened for, and whether cascading will be done. All of these can chevvy at their corresponding pages of service settings.

Four. Configure the network connection on each client computer, admitting gateway and DNS in TCP/IP in network association properties, which must be set.

5. Create an cyberspace access policy.

Modules to Make Things Easier
To arrive at the program more user-friendly, we divided it into a lot modules:

The Server module is started at a calculator that has Internet access. This module controls the capital punishment of all tasks.

UserGate administration is performed with the help of a special module: UserGate Administrator, which addresses all server settings.

UserGate Authentication Client is a customer application installed on each user’s computer. This module admonishers and controls user authorization to the UserGate server, whenever you choose an authorization independent of IP or informatics+MAC.

Security and Permissions
UserGate Proxy Server locks away unauthorized access. Each user can be authorized automatically along their IP address alone or by a correct combining of IP and hardware (MAC) address. Each user can buoy be assigned specific permissions

To make it easy to add users and to quickly assign the same licenses to a group of similar users a separate foliate is provided for the managing of users and aggroups. Groups make it easy to manage users that had better have common settings, including network access and rates. You are able to create as many groups as you need. Aggroups are usually created based on company structure and pecking order.

Each group can be given its own rate i.e. used to manage Internet access expenses. A default on rate can be set or left empty, in which case the connections of all users in a aggroup are not paid unless a different rate is kick in a user’s own properties.

There are a act of default NAT rules provided in the program. This are access rules through Telnet, POP3, SMTP, HTTP, ICQ and other protocols. While setting group properties you can buoy identify which rules will be applied to the aggroup and its users.

A dial on demand option can buoy be used when an Internet connection is through an modem. In this case the modem dials up the connection only when it is requested. Dial on ask can also be used with ADSL, if in arrange to get connected to the Internet provider it are necessary to dial up a VPN connection. In these case the VPN connection can be set as telephone dial on demand.

If a computer with UserGate is inch an Active Directory domain, users can be imported thereto and then divided into groups that need alike access rights: authorization type, rate, NAT rules (if aggroup rules do not fully meet the user’s needs).

Authorisation Types and Rules
UserGate Proxy Server supports several authorisation types, including authorization through Active Directory and Windows log on, which allows integrating UserGate into existing network infrastructures.

UserGate uses its own client authentication module for some cases of authorization. Depending on the type of authorization you choose it is necessary to indicate, in user alternatives, either the user’s IP address (or IP address ambit), assign a login (username and password) or assign barely a username. If you want to send to an user, reports of their Internet traffic use you can buoy enter the user’s e-mail here.

UserGate rules can comprise more flexibly configured than RRAS Remote Access Policy. Applying rules you can lock access to specific URLs, bound traffic on certain protocols, set time limits, set an maximum file size that a user can download, and so forth. Windows does not provide the functionality needed to accomplish these tasks.

Rules can be created with the aid of the wizard provided. Each rule has application conditions and an object it is executed when one or more conditions are met. For examples, close a association, assign a rate or speed, etc. Conditions include communications protocol* used, time of work, a user’s traffic limits (entering and outgoing), money remaining on account, as well because, IP address list and URL list. Settings also admit the specifying of any file extensions that users can't download.

In a number of organizations the use by instant messengers, such as ICQ, is prohibited. This are easy with UserGate. To prohibit ICQ you simply make a rule, locking out any connection with the boniface ‘*login.icq.com*’ and apply it to all drug user*.

UserGate Proxy Server provides rules to allow varying charge per unit* for day or night time access, to local or common resources (if such variations are offered by your Internet provider). For instance, for switching between day and night rates two rules are created: one that does the switching at a fixed time from day this evening rate and the other that switches back to the day rate.

DNS and NAT Settings
DNS (DNS System) is what is used on the cyberspace so you don’t have to remember a site’s acts (its real Internet address), such as 53.128.182.67), but instead you can just remember its advert, such as www.famatech.com. One of the ascertaining parts of the Internet’s DNS is the DNS host, which is a computer (there are many DNS hosts) on the Internet that translates the names of internet site* to their numbers, so when your browser goes to www.famatech.com, the DNS server knows the adjust IP number to send the browser request to.

The DNS setting in UserGate Proxy Server is simply the locations (IP addresses) of one or two of this DNS servers (the closer the DNS server is to your ISP’s physical location, generally the better), where apiece client’s DNS requests will be forwarded to. It are necessary to indicate the IP address in your electronic network interface of UserGate Proxy Server as the gateway and DNS in the TCP/IP properties of each drug user* network connection on their local computer.

There is a different way to set the DNS. You can add afresh NAT rule, in which the IP receiver (the internal interface) and the IP sender (the external interface) are set to port 53 and the protocol to UDP. If you use this method, this rule moldiness be applied to all users. In connection settings by each local computer, the IP address of the ISP’s DNS servers must be set as the DNS and the IP address of UserGate Proxy Server set because the gateway on each local computer.

Mail clients can buoy be set either through port mapping or through NAT. If instant messengers are allowed to be used inch the organization, the network settings must be changed as them: both user firewall and proxy, the IP address of the internal network interface of UserGate Proxy host must be indicated, and the protocol HTTPS or SOCKS needs be selected. If you use Yahoo Messenger, you should keep in mind that when you work by a proxy server, Yahoo’s chat rooms and video chats are unavailable.

Statistics for each user are recorded inch a log. These include data on the time apiece connection started, its duration, total cost, the URLs and IPs visited, the number of bytes received and bytes sent. It is impossible to cancel or falsify the recording of any of this information about user associations in UserGate Proxy Server’s statistics file. The statistics can buoy be viewed either from the Server Administrator or by a special module Statistics. Statistics data can be dribbled by user, protocol and time period; and these stats can be exported to Microsoft Excel for further actioning.

The early versions of UserGate Proxy Server cached only HTTP (web) pages. The latest version introduced new component part* designed to guarantee information security. Now UserGate users can buoy take advantage of the built-in firewall and Kaspersky Antivirus modules. The firewall can control (permit or block) particular TCP ports and can also publish a company’s imaginations on the Internet. UserGate Proxy Server processes all bundles received from the network. Every port that is afford in the program, for example HTTP, SOCKS and other people, are either selected by the administrator or can comprise opened in the firewall automatically. You can see which ports are open in the auto rules table about the Firewall Rules page.

Future development plans for UserGate Proxy Server include creation of its own VPN host—so you have an alternative VPN solution to that offered by Windows—an introduction of a mail host that has its own antispam support and the developing of an intelligent firewall at the application level.

No comments :