Focus2Learn
  • Way2Learn
  • OSI Model
    • Intro
    • OSI Model Layers - Functions and Protocols
    • TCP/IP Protocol Suite
    • Layers Functionalities
    • TCP and UDP ports
    • Network Connecting Devices
    • Network Security Devices
    • Network Vulnerability
    • Kerbros
  • Architectures
    • Qradar
    • Splunk ES
    • SOC Analyst Work Culture
    • Playbooks
  • Information Security
    • AAA
    • CIA Traid
    • Cyber Attacks
    • Cyber Kill Chain
    • Threat - Vulnerability - Exploit - Risk
    • MITRE ATT&CK Framework
    • Spoofing Attacks
  • Log Analysis
    • SSL
    • Splunk Queries
    • Log Aggregation, Processing and Analysis for Security
    • Firewall Logging
    • Proxy Server
    • DNS Server
    • Email Analysis
    • Network Data Analysis
    • Web Application Security
    • Threat Hunting with Microsoft O365 Logs
    • Darktrace
    • EDR
    • Random Topics
    • Incident Response
    • Windows Logs
    • Windows Ransomware Detection
    • Ref Diagrams
  • External Sites
    • Fav Links
    • Cyber-Kill-Chain_YouTube_Link
    • OWASP TOP 10 - 2017
    • Splunk UseCases
    • CCNA Course
    • Switch
    • Port Numbers
    • Windows Event IDs
    • Splunk-Oxygen
    • Privilege Escalation Attack
    • Threat Hunting with Splunk
  • PDF Files
    • Imp PDF Files
  • Online Reputation Checking Tool
  • AWS Cloud Security
    • AWS GuardDuty
  • Security Controls
  • CrowdStrike
    • Falcon Queries
    • User Sessions Hunting
    • Day to Day
    • Hunting Falcon
  • DarkTrace
    • Ref Links
  • Web Application Security
    • Links
Powered by GitBook
On this page
  • Intro
  • Reasons to use Proxy Server

Was this helpful?

  1. Log Analysis

Proxy Server

A Proxy Server acts as a gateway between you and the internet.

PreviousFirewall LoggingNextDNS Server

Last updated 4 years ago

Was this helpful?

Intro

A Proxy Server, also known as Application-Level Gateway.

is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. The proxy server may exist in the same machine as a firewall server or it may be on a separate server, which forwards requests through the .

Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.

How Does The Proxy Server Operates?

  • Every computer has its unique IP address which it uses to communicate with another node.

  • Similarly, the proxy server has its IP address that your computer knows.

  • When a web request is sent, your request goes to the proxy server first.

  • The Proxy sends a request on your behalf to the internet and then collect the data and make it available to you.

  • A proxy can change your IP address So, the webserver will be unable to fetch your location in the world.

  • It protects data from getting hacked too. Moreover, it can block some web pages also.

Proxy servers allow to hide, conceal and make your network id anonymous by hiding your IP address.

How-Does-The-Proxy-Server-Operates

Reasons to use Proxy Server

✔️
Click Here
✔️
firewall