One of the primary functions of a proxy server is to secure your internal network resources from Internet intruders.
Proxy Server 2.0 includes several methods that allow you to secure your internal network resources, such as packet filters and network address translation. The security of a Proxy Server design is measured by the ability of the design to prevent unauthorized access to data transmissions and private network resources. Proxy Server enhances security by isolating the private network from the Internet and restricting traffic between the private network and the Internet.
By the end of this module, you will understand how to:
- Restrict access to Internet resources
- Define the number of screened subnets required in the Internet connectivity design
- Restrict IP traffic by using IP packet filters
- Restrict IP traffic by using domain filters
- Restrict inbound traffic by using Web Publishing
Microsoft introduced Microsoft Internet Security and Acceleration (ISA) Server as the successor to Microsoft Internet Proxy Server (MIPS). ISA Server represents a significant evolution from MIPS, integrating superior firewall protection, web caching, and VPN (Virtual Private Network) support to provide a robust and versatile network security solution.
The ISA Server provides an enterprise-level firewall and network security suite that offers a multitude of features:
- Secure Web Proxy: ISA Server acts as a secure web proxy, providing comprehensive HTTP, HTTPS, FTP and SOCKS protocol support.
- Application Layer Firewall: In addition to basic packet filtering, ISA Server provides application-layer filtering, ensuring more robust protection by inspecting data up to the application layer of the OSI model.
- Integrated VPN: ISA Server also supports VPN connections, allowing secure remote access to the internal network.
- Web Caching: Leveraging web caching technology, ISA Server can store and serve frequently requested web content, improving network performance.
- Policy-Based Access Control: Administrators can control user access based on various policies including IP addresses, protocols, applications, and even specific users or groups.
- Intrusion Detection: ISA Server features built-in intrusion detection mechanisms to detect and thwart potential network threats.
- Performance Monitoring and Logging: ISA Server provides extensive logging and reporting capabilities to monitor network usage and detect any abnormal activities.
ISA Server was later succeeded by Microsoft Forefront Threat Management Gateway (TMG), which continued the legacy of providing comprehensive, flexible network security for Microsoft-based infrastructures.
Proxy server is an intermediary server between client and the interner. Proxy servers offers the following basic functionalities:
- Firewall and network data filtering.
- Network connection sharing
- Data caching
Proxy servers allow to hide, conceal and make your network id anonymous by hiding your IP address.
Following are the reasons to use proxy servers:
- Monitoring and Filtering
- Improving performance
- Accessing services anonymously
In the next lesson, you will learn how to restrict access to Internet resources.