Download Proxy server
Document related concepts
no text concepts found
Transcript
A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes. In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet. Network: In information technology, a network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks and contain subnetworks. The most common topology or general configurations of networks include the bus, star, and Token Ring topologies. Networks can also be characterized in terms of spatial distance as local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN). A given network can also be characterized by the type of data transmission technology in use on it (for example, a TCP/IP or Systems Network Architecture network); by whether it carries voice, data, or both kinds of signals; by who can use the network (public or private); by the usual nature of its connections (dial-up or switched, dedicated or nonswitched, or virtual connections); and by the types of physical links (for example, optical fiber, coaxial cable, and Unshielded Twisted Pair). Large telephone networks and networks using their infrastructure (such as the Internet) have sharing and exchange arrangements with other companies so that larger networks are created. Nodo: In a network, a node is a connection point, either a redistribution point or an end point for data transmissions. In general, a node has programmed or engineered capability to recognize and process or forward transmissions to other nodes. host The term "host" is used in several contexts, in each of which it has a slightly different meaning: 1) In Internet protocol specifications, the term "host" means any computer that has full two-way access to other computers on the Internet. A host has a specific "local or host number" that, together with the network number, forms its unique IP address. If you use Point-to-Point Protocol to get access to your access provider, you have a unique IP address for the duration of any connection you make to the Internet and your computer is a host for that period. In this context, a "host" is a node in a network. 2) For companies or individuals with a Web site, a host is a computer with a Web server that serves the pages for one or more Web sites. A host can also be the company that provides that service, which is known as hosting. 3) In IBM and perhaps other mainframe computer environments, a host is a mainframe computer (which is now usually referred to as a "large server"). In this context, the mainframe has intelligent or "dumb" workstations attached to it that use it as a host provider of services. (This does not mean that the host only has "servers" and the workstations only have "clients." The server/client relationship is a programming model independent of this contextual usage of "host.") 4) In other contexts, the term generally means a device or program that provides services to some smaller or less capable device or program. ISP An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting. An ISP has the equipment and the telecommunication line access required to have a point-of-presence on the Internet for the geographic area served. The larger ISPs have their own high-speed leased lines so that they are less dependent on the telecommunication providers and can provide better service to their customers. Among the largest national and regional ISPs are AT&T WorldNet, IBM Global Network, MCI, Netcom, UUNet, and PSINet. ISPs also include regional providers such as New England's NEARNet and the San Francisco Bay area BARNet. They also include thousands of local providers. In addition, Internet users can also get access through online service providers (OSP) such as America Online and Compuserve. The larger ISPs interconnect with each other through MAE (ISP switching centers run by MCI WorldCom) or similar centers. The arrangements they make to exchange traffic are known as peering agreements. There are several very comprehensive lists of ISPs world-wide available on the Web. An ISP is also sometimes referred to as an IAP (Internet access provider). ISP is sometimes used as an abbreviation for independent service provider to distinguish a service provider that is an independent, separate company from a telephone company. Server 1) In general, a server is a computer program that provides services to other computer programs in the same or other computers. 2) The computer that a server program runs in is also frequently referred to as a server (though it may contain a number of server and client programs). 3) In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs. Specific to the Web, a Web server is the computer program (housed in a computer) that serves requested HTML pages or files. A Web client is the requesting program associated with the user. The Web browser in your computer is a client that requests HTML files from Web servers. Proxy server In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion. A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user. To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.) An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging. The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall. firewall The term you selected is being presented by searchSecurity.com, a TechTarget site for Security professionals. A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates. A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. Router On the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each Internet point-of-presence. A router is often included as part of a network switch. A router may create or maintain a table of the available routes and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through a number of network points with routers before arriving at its destination. Routing is a function associated with the Network layer (layer 3) in the standard model of network programming, the Open Systems Interconnection (OSI) model. A layer-3 switch is a switch that can perform routing functions. An edge router is a router that interfaces with an asynchronous transfer mode (ATM) network. A brouter is a network bridge combined with a router. Hub In general, a hub is the central part of a wheel where the spokes come together. The term is familiar to frequent fliers who travel through airport "hubs" to make connecting flights from one point to another. In data communications, a hub is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. A hub usually includes a switch of some kind. (And a product that is called a "switch" could usually be considered a hub as well.) The distinction seems to be that the hub is the place where data comes together and the switch is what determines how and where data is forwarded from the place where data comes together. Regarded in its switching aspects, a hub can also include a router. 1) In describing network topologies, a hub topology consists of a backbone (main circuit) to which a number of outgoing lines can be attached ("dropped"), each providing one or more connection port for device to attach to. For Internet users not connected to a local area network, this is the general topology used by your access provider. Other common network topologies are the bus network and the ring network. (Either of these could possibly feed into a hub network, using a bridge.) 2) As a network product, a hub may include a group of modem cards for dial-in users, a gateway card for connections to a local area network (for example, an Ethernet or a Token Ring), and a connection to a line (the main line in this example). Switch In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. In the traditional circuit-switched telephone network, one or more switches are used to set up a dedicated though temporary connection or circuit for an exchange between two or more parties. On an Ethernet local area network (LAN), a switch determines from the physical device (Media Access Control or MAC) address in each incoming message frame which output port to forward it to and out of. In a wide area packet-switched network such as the Internet, a switch determines from the IP address in each packet which output port to use for the next part of its trip to the intended destination. In the Open Systems Interconnection (OSI) communications model, a switch performs the layer 2 or Data-Link layer function. That is, it simply looks at each packet or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. However, in wide area networks such as the Internet, the destination address requires a look-up in a routing table by a device known as a router. Some newer switches also perform routing functions (layer 3 or the Network layer functions in OSI) and are sometimes called IP switches. On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the backbone and gateway levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as core switches and the latter as desktop switches. In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a Token Ring or bus arrangement in which each possible destination inspects each message and reads any message with its address. Circuit-Switching version Packet-Switching A network's paths can be used exclusively for a certain duration by two or more parties and then switched for use to another set of parties. This type of "switching" is known as circuit-switching and is really a dedicated and continuously connected path for its duration. Today, an ordinary voice phone call generally uses circuit-switching. Most data today is sent, using digital signals, over networks that use packet-switching. Using packet-switching, all network users can share the same paths at the same time and the particular route a data unit travels can be varied as conditions change. In packet-switching, a message is divided into packets, which are units of a certain number of bytes. The network addresses of the sender and of the destination are added to the packet. Each network point looks at the packet to see where to send it next. Packets in the same message may travel different routes and may not arrive in the same order that they were sent. At the destination, the packets in a message are collected and reassembled into the original message. Point of presence: (POP) A point-of-presence (POP) is an access point to the Internet. A POP necessarily has a unique Internet Protocol (IP) address. Your Internet service provider (ISP) or online service provider (such as AOL) has a point-of-presence on the Internet and probably more than one. The number of POPs that an ISP or OSP has is sometimes used as a measure of its size or growth rate. A POP may actually reside in rented space owned by the telecommunications carrier (such as Sprint) to which the ISP is connected. A POP usually includes routers, digital/analog call aggregators, servers, and frequently frame relays or ATM switches. Network layer In the Open Systems Interconnection (OSI) communications model, the Network layer knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and Quality of Service, and recognizes and forwards to the Transport layer incoming messages for local host domains. Among existing protocol that generally map to the OSI network layer are the Internet Protocol (IP) part of TCP/IP and NetWare IPX/SPX. Both IP Version 4 and IP Version 6 (IPv6) map to the OSI network layer. Domain: A domain name locates an organization or other entity on the Internet. For example, the domain name www.totalbaseball.com locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www". The "com" part of the domain name reflects the purpose of the organization or entity (in this example, "commercial") and is called the top-level domain name. The "totalbaseball" part of the domain name defines the organization or entity and together with the toplevel is called the second-level domain name. The second-level domain name maps to and can be thought of as the "readable" version of the Internet address. A third level can be defined to identify a particular host server at the Internet address. In our example, "www" is the name of the server that handles Internet requests. (A second server might be called "www2".) A third level of domain name is not required. For example, the fully-qualified domain name could have been "totalbaseball.com" and the server assumed. Subdomain levels can be used. For example, you could have "www.nyyankees.totalbaseball.com". Together, "www.totalbaseball.com" constitutes a fully-qualified domain name. Second-level domain names must be unique on the Internet and registered with one of the ICANNaccredited registrars for the COM, NET, and ORG top-level domains. Where appropriate, a toplevel domain name can be geographic. (Currently, most non-U.S. domain names use a top-level domain name based on the country the server is in.) To register a U. S. geographic domain name or a domain name under a country code, see an appropriate registrar. On the Web, the domain name is that part of the Uniform Resource Locator(URL) that tells a domain name server using the domain name system (DNS) whether and where to forward a request for a Web page. The domain name is mapped to an IP address (which represents a physical point on the Internet). More than one domain name can be mapped to the same Internet address. This allows multiple individuals, businesses, and organizations to have separate Internet identities while sharing the same Internet server. To see the IP address for a domain name, (ping). It may be worth noting that the domain name system contains an even higher level of domain than the top-level domain. The highest level is the root domain, which would be represented by a single dot (just as in many hierarchical file systems, a root directory is represented by a "/" ) if it were ever used. If the dot for the root domain were shown in the URL, it would be to the right of the top-level domain name. However, the dot is assumed to be there, but never shown. Internet protocol The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified. Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet. Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order. IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data. (The reason the packets do get put in the right order is because of TCP, the connection-oriented protocol that keeps track of the packet sequence in a message.) In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer. The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP Version 6 (IPv6) is also beginning to be supported. IPv6 provides for much longer addresses and therefore for the possibility of many more Internet users. IPv6 includes the capabilities of IPv4 and any server that can support IPv6 packets can also support IPv4 packets. Trend Micro La Clave para una Solución Antivirus Eficiente Trend ServerProtect™ es parte de la familia integrada de productos de Trend Micro para protección antivirus que cubre todos los puntos de acceso de virus (Gateways de Internet, servidores de correo electrónico, servidores de Intranet, servidores de redes locales y estaciones de trabajo.). Permite programar actualizaciones automáticas [más]. Detecta y elimina virus macro conocidos y desconocidos en tiempo real [más]. Rastrea la infección por medio de un detallado registro de actividad [más]. Comparte la lista de virus con otros productos de Trend. Provee instalación y administración centralizada para múltiples dominios [más] Ofrece una segura administración remota [más]. Permite programar rastreos y bajar actualizaciones automáticamente [más] Actualiza y distribuye en todas las estaciones de trabajo, la lista de virus con un solo clic. Disponible para Windows NT y NetWare Certificado por ICSA para detectar el 100% del los virus “in the wild Certificado por Secure Computing Checkmark para detectar el 100% de los virus “in the wild Plataformas: Windows NT, NetWare y DEC Alpha Idiomas disponibles: Inglés, Chino, Japonés, Coreano Requerimientos del sistema: Server: Windows NT Server 3.51 o 4.0 (hasta el Service Pack 4), Novell NetWare 3.x, 4.x o 5.0 CPU: Intel Pentium 166 MHz o mejor, 32 MB RAM, 32 MB de espacio libre en el disco. Information Server: Windows NT Server 3.51 o 4.0 (hasta el Service Pack 4), Novell NetWare 3.x, 4.x o 5.0 CPU: Intel Pentium 166 MHz or better 32 MB RAM 50 MB de espacio libre en el disco. Management Console: Windows 95/98/NT Nueva generación de protección del servidor ServerProtect provee una tecnología antivirus de nueva generación para cubrir las necesidades de las organizaciones que utilizan Windows NT o Netware para operar sus redes. La administración y distribución centralizadas, junto con la tecnología probada de rastreo de virus de Trend Micro, ofrece una poderosa y efectiva herramienta de protección contra ataques de virus. Administración centralizada del dominio La administración del ServerProtect es la simplicidad en sí misma. Se pueden instalar y administrar múltiples servidores y múltiples dominios desde una única consola, configurar todos los servidores en el mismo dominio y generar informes integrados sobre actividades de virus desde todos los servidores. Adicionalmente, ServerProtect protege la consola de administración mediante un password. Administración Remota El protocolo estancad RPC (Remote Procedure Call) de Trend ServerProtect NT permite la administración segura de toda la red desde una única consola. Algunas de las funciones especiales de la administración remota son: Iniciar el rastreo y limpieza de servidores remotos. Mensajes de alerta Instalación y configuración. Reporte de los registros de virus. El ServerProtect para NetWare provee estas funciones a través de herramientas específicas de NetWare. Rastreo en tiempo real En el corazón del ServerProtect se encuentra la tecnología de Trend ganadora de premios por detección de virus. Corriendo en tiempo real, el motor de búsqueda detecta el 100% de los virus actualmente “in the wild” y más del 90% de otros miles conocidos. ServerProtect monitorea la conducta de los virus no conocidos para aislarlos y utiliza la tecnología MacroTrap™ (patente pendiente) para detectar instantáneamente virus macro conocidos y desconocidos. Además, rastrea archivos con múltiples niveles de compresión en los siguientes formatos: PKZip, LZH, ARJ, Microsoft Compress, PKLite, LZExe. Actualización de la lista de virus Todo antivirus es efectivo si está actualizado. ServerProtect obtiene automáticamente las listas de virus y las distribuye a todos los servidores en el mismo dominio cuando la lista de virus del servidor designado son actualizadas. Los clientes FTP y BBS incorporados pueden acceder a una actualización automática con un solo click. Rastreos múltiples programados ServerProtect permite a los administradores, realizar rastreos manuales y programados especificando: Qué archivos / unidades / directorios hay que rastrear. Día y hora en la cual hay que desea realizar el rastreo. Acción a tomar en caso de detectar un virus. Notificaciones y registro de actividades Ante la detección de un virus, el administrador es inmediatamente notificado por medio de: consola SNMP, pager, e-mail o Windows pop-up. Los registros de actividad que Trend ServerProtect realiza, permiten controlar y administrar los incidentes en forma simple. Soporte Comprensivo Incorporado La ayuda inteligente del ServerProtect ofrece soluciones a los problemas relacionados con virus. ¿Por qué Trend Micro? La tecnología antivirus de Trend Micro es usada por más de 18 millones de usuarios en el mundo y fue adoptada para la seguridad de las redes de empresas tales como Sun Microsystems, Netscape, WorldTalk, Intel.