Wireles Networking is a practical guide to planning and building low-cost telecommunications infrastructure. See the editorial for more information.... |
Home Network Design Traffic Optimization Web Caching Preventing Bypassing the Proxy Server | |||
See also: Two Network Cards | |||
Search the VIAS Library | Index | |||
Preventing Users from Bypassing the Proxy ServerWhile circumventing Internet censorship and restrictive information access policy may be a laudable political effort, proxies and firewalls are necessary tools in areas with extremely limited bandwidth. Without them, the stability and usability of the network are threatened by legitimate users themselves. Techniques for bypassing a proxy server can be found at www.antiproxy.com. This site is useful for administrators to see how their network measures up against these techniques. To enforce use of the caching proxy, you might consider simply setting up a network access policy and trusting your users. In the layout below, the administrator has to trust that his users will not bypass the proxy server.
In this case the administrator typically uses one of the following techniques:
The only way to ensure that proxies cannot be bypassed is by using the correct network layout, by using one of the three techniques described below.
|
|||
Home Network Design Traffic Optimization Web Caching Preventing Bypassing the Proxy Server |