Internet Connectivity  «Prev  Next»

Lesson 9

Microsoft Proxy Server Conclusion

This module taught you to evaluate and create Internet connectivity solutions using Microsoft® Proxy Server 2.0®. It began by outlining the features and design decisions inherent in a Proxy Server solution. Then it described the methods and benefits of integrating Proxy Server within a network. Finally, it discussed Proxy Server client requirements.
By now, you should be able to:
  1. Define the features of Proxy Server
  2. Explain the factors that determine the appropriateness of a Proxy Server solution
  3. Describe the benefits of integrating Proxy Server with other networking services
  4. Describe the decisions involved in creating a functional Internet connectivity Proxy Server solution
  5. Identify the decisions involved in the placement of Proxy Server within a network
  6. Describe how to select the proxy server interface characteristics that affect the integration of the Proxy Server into the network
  7. Identify the Proxy Server client requirements to be included in the Proxy Server design

In which year did Microsoft release the successor Technology to Microsoft Proxy Server?

Microsoft released the successor technology to Microsoft Proxy Server in 2006, with the introduction of Microsoft Internet Security and Acceleration (ISA) Server 2006. ISA Server was designed to provide enhanced network security features and web publishing capabilities, building on the basic proxy server functionality of Microsoft Proxy Server.
ISA Server 2006 provided several new features and improvements over its predecessor, including enhanced web filtering and URL blocking capabilities, support for Secure Sockets Layer (SSL) bridging and bridged authentication, and improved integration with Active Directory and other Windows technologies. It also introduced the concept of "network protection," which involved configuring policies and settings to protect network resources and prevent unauthorized access.
ISA Server 2006 was later succeeded by Microsoft Forefront Threat Management Gateway (TMG) in 2010, which provided further improvements in network security and web publishing features. However, Microsoft has since announced that TMG has been discontinued, and that organizations should consider other products and technologies for network security and web publishing.

Internet Proxy Server Terms

Here is a list of terms used in this module that may be new to you:.
  1. FTP: The File Transfer Protocol (FTP) is the standard network protocol used for the transfer of computer files between a client and server on a computer network.
  2. HTTP:The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.
  3. HTTPS:(Secure Hypertext Transfer Protocol) HTTPS is used to protect the data moving to and from a secure web server.
  4. Gopher:A network service used in the past to allow users to search the contents site. Gopher has lost favor in most environments, but may still be encountered at some university sites.
  5. IPX: (Internetwork Packet Exchange). The network layer protocol used to move data in IPX/SPX networks. Most commonly associated with NetWare Server environments.
  6. SPX:(Sequenced Packet Exchange) SPX is used as the Transport Layer protocol for IPX/SPX networks.
  7. VPN tunnels:A VPN, or Virtual Private Network, is a method of linking two locations like they are on a local private network. There are several reasons why you might want to set one up.
  8. WinSock:(Windows Sockets) This is a session layer interface responsible for accepting requests from WinSock programs.

Designing Proxy Server Solution - Quiz

Click the Quiz link below to review the steps required in designing a Proxy Server solution.
Designing Proxy Server Solution - Quiz