DispersedNet
SiteMap
Active Directory
DHCP - TCPIP
Disaster Recovery
Install Windows
Proxy Server
Terminal Services
Proxy Server Design
«Prev
Next»
Internet Proxy Server
Network Address Translation
NAT Protocol
Non-NAT Protocols
Functional Design Decisions
Nat-with-services
Selecting NAT Server
NAT Conclusion
Securing NAT Solution
Restricting Internet Traffic
Access Address Pools
Enhancing NAT Security
NAT Design Performance
Securing NAT Designs
Microsoft Proxy Server
Proxy Server Features
Design Decisions Solution (L3)
Integrate Networking Services
Private Public Works
Functional ProxyServer Solution(L5)
Placing within Network
Integrate Proxy Server(L7)
Determine Client Requirements
Proxy Server Conclusion
Securing Proxy Server
Restrict Internet Access
Screened Subnet
Packet Filtering Firewall
Restricting Outbound Traffic
ProxyServer Domain Filter
Proxy Server Access
Secure Proxyserver Conclusion
Proxy Server Design
Enhancing Outbound Availability
Proxy Server design using cache method - Exercise
Troubleshoot Network Traffic
Optimizing a Proxy Server Design: using the cache method
Objective:
Provide Proxy Server recommendations for decreases in response time.
Scoring
This exercise provides you an opportunity to practice what you learned in the previous lesson. You will be presented with a troubleshooting scenario, but unlike Problem Solver exercises, you will not submit your response. Instead, work offline in Notepad® or Microsoft Word®. When you have completed your solution, click the
Submit
button to compare your results.
Scenario
Your are the systems administrator for a multisite company that has 6,500 client computers that need to access the Internet. For security reasons, you have decided that the company will use a single, central Internet connection that is located at the company's main office. In order to provide secure access to the Internet, you have installed a single proxy server on the edge of the network. All of the organization's machines will access Internet resources via this proxy server. After implementing your centralized proxy server solution, you begin to receive calls from users complaining about slow response times when they try to access Web objects via their browsers. In response to these complaints, you perform a network analysis using Network Monitor to assess if there is a problem related to network utilization. After running the Network Monitor trace, you see that network utilization peaks out several times a day for extended periods of time. You decide to perform a System Monitor analysis as well, which shows several extended periods of processor utilization over 80 percent, which seems to be due to proxy server services.
Task
How might the implementation of the proxy server be changed to address the increased demand?