list free european proxy servers

Windows Strengths and Weaknesses
The overwhelming bulk of computers, both personal and corporate, use Microsoft Windows, which has included Internet access for well over a decade and as Windows became more complex, so bears its Internet connectivity software. Windows 98 Second Edition brought in Internet Connection Sharing (ICS) to provide group access to the Internet from a local network. More complexities constituted added with the outbreak of Routing and Remote admittance Service in Widows 2000 Server with its Network call Translation (NAT) functions.

It took awhile before experts commented that ICS has specific shortcomings. ICS changes network bill addresses, which can cause problems on intranets. Because from this, ICS can only be used in small authority or home networks and even then, ICS in authority networks is not recommended, because there is no exploiter authorization or validation with ICS. Even using it along a home network makes any connection to the net insecure, since it is so easy for criminals to gain access to your computers by falsifying where it's coming from (their IP and MAC addresses).

Some Help is Needed
Windows can organize Internet sharing, merely security has never been a strong point. In do either hardware or software solutions from other companies are generally purchased to provide the security solutions needed. One of the more important of these is UserGate Proxy Server.

UserGate Proxy Server provides local network users on a secure Internet access by defining policies of these access, forbidding particular Internet resources, and limiting traffic or time of a user’s work on the Internet. To boot, UserGate can keep distinct traffic calculations of users and of protocols, which greatly simplifies Internet traffic cost ascendancy. Lately, among Internet Service Providers (ISP) there has been a tendency towards unlimited traffic and for that design, UserGate Proxy Server provides a very flexible system by rules.

UserGate Proxy Server with NAT support works Windows 2000/2003/XP with the Internet (using the standard TCP/IP protocols). UserGate can also work Windows 98 and Windows NT 4.0, but without NAT support. UserGate does not require any special resourcefulnesses for its operation; it simply needs a relatively diminished amount of hard drive memory for its cache and log files. UserGate can also be installed on a dedicated computer to maximize your network’s resources.

Proxy waiters
Your web browser (whether it is Internet Explorer, Firefox, Safari, Netscape, Opera or Mozilla to name the most pop) is already able to cache documents. However, meaning disk space is not reserved for these purposes if the Internet connection is shared by an entire authority. The reason for this is that the probability from one person visiting the same web pages is Army for the Liberation of Rwanda less than if dozens or hundreds of people are sharing the connection. Creating a common cache for a company can greatly decrease bandwidth waste as well equally make almost instantaneous the receipt of documents that are commonly accessed by employees. UserGate Proxy Server can besides link with the external cascade proxy servers (of your Internet Service Provider) to increase the speed of experiencing data and reduce your Internet bills (traffic costs because a provider are usually less when a proxy waiter is used).

Program Configuration
Configuring the cache settings comprises done from the «Services» page. The first step comprises to enable the cache, then you can set it is separate options, which include caching of POST requests, dynamical objects, cookies, and FTP content. You can also arrange the size of the disc space for the hoard and the time-to-live of cached documents.

Other options mustiness also be set before you can start working with the program. As a rule, this task is discharged in the following order:

1. Create users of the program.

2. Configure DNS and NAT on the UserGate server. At this stage you can configure NAT using the wizard.

3. Set parameters of the various protocols (HTTP, FTP, SOCKS), the intranet interface on which they will be listened for, and whether cascading will constitute done. All of these can be set at their corresponding pages of service settings.

4. Configure the mesh connection on each client computer, including gateway and domain name server in TCP/IP in network connection properties, which mustiness be set.

5. Create an Internet access policy.

Mental faculty* to Make Things Easier
To make the program a lot user-friendly, we divided it into several modules:

The waiter module is started at a computer that has net access. This module controls the execution of all jobs.

UserGate administration is performed with the help of a special module: UserGate Administrator, which handles all server mise en scene*.

UserGate Authentication Client is a client application installed along each user’s computer. This module monitors and controls exploiter authorization to the UserGate server, if you choose an authorization independent of IP or IP+MAC.

Security and Permissions
UserGate Proxy Server locks out unauthorized access. For each one user can be authorized automatically by their IP accost alone or by a correct combination of IP and hardware (MAC) address. Each user can be assigned specific permissions

To make it easy to add users and to quickly assign the same permissions to a chemical group of similar users a separate page is provided because the managing of users and groups. Groups come through easy to manage users that should have common mise en scene*, including network access and rates. You can create equally many groups as you need. Groups are usually produced based on company structure and hierarchy.

Each group canful be given its own rate that is used to manage Internet access expenses. A default rate can chevy or left empty, in which case the connectednesses of all users in a group are not bore unless a different rate is set in a exploiters own properties.

There are a number of default NAT rules provided in the program. These are access decrees through Telnet, POP3, SMTP, HTTP, ICQ and other protocols. While setting group properties you can identify which decrees will be applied to the group and its exploiters.

A dial on demand option can be used once an Internet connection is through a modem. Therein case the modem dials up the connection only if it is requested. Dial on demand can also constitute used with ADSL, if in order to get associated to the Internet provider it is necessary to dial up a VPN connection. In this case the VPN connection can be set as dial on demand.

If a computer with UserGate is in an Active Directory domain, users can be imported to it so divided into groups that need similar access rights: authority type, rate, NAT rules (if group rules do not fully meet the user’s needs).

Authorization Types and decrees
UserGate Proxy Server supports several authorization types, including authority through Active Directory and Windows Login, which allows desegregation UserGate into existing network infrastructures.

UserGate uses its have client authentication module for some types of authorization. Contingent on the type of authorization you choose they are necessary to indicate, in user options, either the exploiters IP address (or IP address range), assign a log-in (username and password) or assign just a username. If you want to send to a user, reports from their Internet traffic use you can enter the exploiters e-mail here.

UserGate rules can be more flexibly configured than RRAS Remote Access Policy. Using rules you will be able to lock access to specific URLs, limit traffic on sure protocols, set time limits, set a maximum file size that a user can download, etc. Windows does not provide the functionality needed to fulfill these tasks.

Decrees can be created with the help of the adept provided. Each rule has application conditions and an objective it is executed when one or more conditions is met. For examples, close a connection, assign a charge per unit or speed, etc. Conditions include protocols used, time by work, a user’s traffic limits (incoming and outgoing), income remaining on account, as well as, IP address broadcast and URL list. Settings also allow the specifying by any file extensions that users cannot download.

In an number of organizations the use of instant messengers, such ICQ, is prohibited. This is easy with UserGate. To prohibit ICQ you simply create a rule, engaging out any connection with the host ‘*login.icq.com*’ and apply it to all users.

UserGate Proxy host provides rules to allow varying rates for day or night time access, to local or common resources (whenever such variations are offered by your Internet provider). E.g., for switching between day and night rates 2 rules are created: one that performs the switching at a fixed time from day to night rate and the other that switches back to the day charge per unit.

DNS and NAT Settings
DNS (Domain Name System) are what is used on the Internet so you do not have to remember a site’s numbers (its real cyberspace address), such as 53.128.182.67), but alternatively you can just remember its name, such as www.famatech.com. One of the controlling parts of the Internet’s DNS is the DNS server, which is an computer (there are many DNS servers) on the cyberspace that translates the names of sites to their acts, so when your browser goes to www.famatech.com, the DNS server knows the correct IP number to send the browser request to.

The DNS kicking in UserGate Proxy Server is simply the locations (IPs) of one or two of these DNS servers (the closer the DNS server is to your ISP’s active location, generally the better), where each client’s DNS askings will be forwarded to. It is necessary to argue the IP address in your network interface of UserGate Proxy Server as the gateway and DNS in the TCP/IP properties of each user’s network connection about their local computer.

There is another way to adjust the DNS. You can add a new NAT rule out which the IP receiver (the internal interface) and the IP sender (the external interface) are set to port 53 and the protocol to UDP. If you use this method, this rule must be applied to all users. In connection settings of each local calculator, the IP address of the ISP’s DNS servers moldiness be set as the DNS and the IP of UserGate Proxy Server set as the gateway about each local computer.

Mail clients can be set either through port mapping or through NAT. If instant couriers are allowed to be used in the organization, the network settings must be changed for them: both drug user firewall and proxy, the IP address of the home network interface of UserGate Proxy Server must be argued, and the protocol HTTPS or SOCKS needs be chose. If you use Yahoo Messenger, you should keep inch mind that when you work through a proxy host, Yahoo’s chat rooms and video chats are unavailable.

Statistics for each user are recorded in a log. This include data on the time each connection started, it has duration, total cost, the URLs and IPs visited, the number of bytes received and bytes sent. It's impossible to cancel or falsify the recording of whatever of this information about user connections in UserGate placeholder Server’s statistics file. The statistics can be viewed either from the Server Administrator or from a special faculty Statistics. Statistics data can be filtered by user, communications protocol and time period; and these stats can be exported to Microsoft Excel for further processing.

The early adaptations of UserGate Proxy Server cached only HTTP (web) foliates. The latest version introduced new components designed to assure information security. Now UserGate users can capitalize on the built-in firewall and Kaspersky Antivirus modules. The firewall can control (permit or block) specific TCP ports and can also publish a company’s resources on the cyberspace. UserGate Proxy Server processes all packets received from the network. Every port that is open in the broadcast, for example HTTP, SOCKS and others, are either chose by the administrator or can be opened in the firewall automatically. You can see which ports are afford in the auto rules table on the Firewall conventions page.

Future development plans for UserGate Proxy Server admit creation of its own VPN server—so you've an alternative VPN solution to that offered by windowpanes—an introduction of a mail server that has it has own antispam support and the development of an healthy firewall at the application level.

No comments :