The Fastest Proxy Server

proxy server

High-performance enterprise content management at decentralized locations

Even in the age of modern and powerful fiber optic cable many wrap Companies still have their data traffic over narrow band connections such as analog telephone lines. Either because powerful Network connections are not due to the individual geographical situation are feasible, or simply for cost reasons.

Frequently these are companies decent rally organized and maintained a wide-spread network of distributed offices,

However, the competition makes it necessary, even on internal information quickly to be able to access. But narrow-band lines not only bring the companies decisive disadvantages in the rapid provision of business-relevant documents.

Also an efficient handling of the business processes associated with the documents is delayed significantly. The solution to this problem is called proxy server. Of the Proxy Server can organize traffic on low-performance networks so that the exchange of information on a virtual information superhighway extremely efficiently handled by fast buffer.

To use this Cache, also referred to as cache, is proxy server ideally suited, because they organize the entire “traffic” between control centers, Branches, branches, offices, departments and divisions fully automatic, without expensive investment in new hardware components and without large administration effort.

Exactly for this special task the proxy server has been developed. In conjunction with the Ecosystems guarantees the company locations a completely uncomplicated way Information management that is essential for your effective business is.

But this does not only include the sole access to information and their Distribution, but also a targeted and fast information search in the collected knowledge of all involved divisions. And even regardless of the number of users currently active in the system.

Cache functions.

When using the proxy server for data exchange via narrow-band lines, the client software is used as standard, which are also used in a locally installed client / server environment comes. For the users, it is thus completely irrelevant, whether at their sites actually a “real” server or “only” a proxy server is working.

The basic principle of the proxy server is based on a cache memory for win dream ECM objects. The objects are not just the documents defined their additional attributes (meta data), but also the internal ones Objects of the ECM core such as document types, folder types, masks, Attributes of an object type and so on.

If an object or a document is requested by a client, the client directs its request to the Proxy server.

This checks whether the binary object in the current version is in the cache memory lies. If the binary object is present in the cache, it immediately becomes the associated application made available. At the same time it will be in the central archive of the ECM system locked to prevent concurrent access by multiple clients.

In this way, the proxysite resolves possible inconsistencies of data consistently and without further intervention by the user. If the binary object is not in the cache of the proxy server, it will request it to the central archive.

The binary object can now be linked with the linked application open as usual and is locked in the central archive during the processing period. After Successful updating or editing by the user is the

Proxy server the binary object back in the central archive for other users and available picks up the lock. At the same time, the object is in fast cache memory for more Access granted by the user.

An intelligent business logic ensures that the objects in the cache are always available synchronously with the data available in the central archive are.

The access of a client is analogous to a direct access of the Clients to the actual main server. The proxy server adds to it Provides the same interfaces as the ECM service and thus enables also a transparent work on the interfaces.

The proxy server is executable from 4.0 as client / server system. The proxy server and the main servers must be installed on separate computers.

It also works without major investment. The proxy server enables companies to an efficient and inexpensive data connection without much investment too realize.

In particular, companies and organizations working in many individual locations work independently and work independently, benefit from the performance of the Proxy servers to a considerable extent.

Apart from that, the proxy server exchanges data between geographically separated branches in each case accelerated significantly, will be a high-performance exchange of information on electronic Way through the proxy server often possible in the first place.

What actually is a proxy firewall?

proxysite

A proxy firewall

A proxy firewall, in contrast to a packet-oriented firewall, is able to monitor and filter application-level communication. It protects networks and their resources against unwanted or dangerous traffic.

The Proxy Firewall is also called Application Layer Firewall or Application Firewall for short. It is a security system that can monitor and filter application-level communication. In contrast to purely packet-oriented firewalls, it not only evaluates address and protocol data from IP packets, but also analyzes traffic directly in the application layer.

It uses the Proxysite rationale by acting as a proxy between the resources to be protected and other networks, such as the Internet. The proxy firewall intercepts all requests to and from the Internet, filters them and passes them on behalf of or blocks them. At the same time, the proxy firewall can cache functions of a proxy server bar. All connections from the network to be protected or from the protected network terminate the proxy firewall itself. As a result, it acts as an independent communication partner for the target and source systems.

Through this proxy function, the proxy firewall can analyze the data contiguously up to layer seven of the OSI layer model. Compared to the target system, the proxy firewall behaves like a client, like a server to the requesting client.

Display

To be able to analyze and filter the traffic, the proxy firewall must know the protocols to be monitored. It has its own filter for each protocol, such as HTTP, SMTP, FTP or DNS. In this, unwanted protocol options or data communications can be prohibited. The proxy-based firewall is considered a very secure form of firewall because it blocks direct network traffic between internal and external systems. An internal device can never directly receive a data packet from an external system. The firewall is always in between and at the same time the source and destination of any communication.

The proxy rationale

The proxy policy is based on the proxy function for network services. A proxy works as a proxy for a client who wants to gain access to a particular service. As a result, it shields both services and clients from each other and prevents direct connections between the two communication partners. If a client wants to establish a connection to a service, it first communicates with the proxy. This establishes the connection to the server on behalf of the client. The proxy forwards the data from the client to the server and transmits the data received from the server to the client.

Distinction between transparent and non-transparent proxy

There are two principal ways in which a proxy works. It can be transparent or non-transparent from the client’s point of view. If it is a non-transparent proxy, the client must be informed about its existence. For this purpose, the client and its software receive a special proxy configuration, which ensures that the traffic to the outside is first addressed to the proxy. If this configuration does not exist, the client cannot communicate through the proxy. However, as the proxy usually provides the only communication path to other networks, communication to the outside without the corresponding proxy configuration is generally cut off.

By contrast, the transparent proxy knows nothing about the client’s existence. The transparent proxy intercepts the communication requests of the client to the outside and intervenes as deputy instance. Outwardly, the transparent proxy acts like the non-transparent proxy as a communication partner. However, the client assumes that it communicates directly with the target system. This is made possible by the manipulation of the IP addresses. The clients do not need a special configuration for a transparent proxy.

The operation of a proxy firewall

Since the proxy firewall carries all communication on behalf of the clients to be protected, it can analyze the transmitted data in great detail. It verifies that the communication complies with the previously established protocol rules and policies and allows traffic to be blocked or blocked.

The received packets can not only be examined for source and destination addresses or ports, but the information can be analyzed directly at the application level. Due to the address conversion taking place through the proxy firewall, the clients remain completely hidden in the network to be protected.