A proxy server refers to computers that cannot perform certain operations by themselves. The operation is performed through a server, which is the proxy server. A proxy server is a network service technology that came into being with the Internet. It can realize network security filtering, traffic control (reducing Internet usage fees), user management and other functions. Therefore, a proxy server is very useful to users of home networks and small business networks. It can not only solve the problem of insufficient IP addresses caused by many units connecting to the Internet, but also speed up the client's access to network resources, control network traffic and save Internet access costs. It can even be used as a primary network firewall to block illegal access information and prevent general hackers from invading local LANs.
The functions that the proxy server can realize include: shared Internet access, firewall, user management, traffic control, etc.
1. Share the Internet and save IP address
When connecting to the Internet, all clients must apply for an IP address, but the division of IP addresses can no longer meet users' expectations for connecting to the Internet. This contradiction can be resolved if a proxy server is used. First, connect the computers that need to be connected to the Internet into a LAN, and then connect to the Internet through a proxy server. This way, multiple computers can share an IP address on the Internet, that is, share an exit to connect to the Internet. This can save IP addresses to the maximum extent, and also save the costs of companies and units to access the Internet (node occupancy fees, depreciation fees, etc.).
2. Reduce the exit flow
Many users use proxy servers to solve the problem of shared Internet access, but it also has an important function, which is to reduce unit egress traffic. The proxy server provides users with a larger cache (Cache). When a client has accessed certain resources on the Internet, it will store these visited resources into the cache. When other clients need to browse the same information, the proxy server will automatically read from the cache. Therefore, all users who pass through the proxy server can share these accessed resources, which can greatly improve client access speed, reduce the egress load and traffic of local nodes, reduce costs, and improve economic benefits.
3. User Management
The leaders of the unit must be very troubled by how to manage employees’ Internet access. Playing games online during working hours, or chatting with QQ, etc., does affect work efficiency. If the company uses a proxy server online, it can set some parameters on the proxy server to effectively manage users. Different application functions can be opened for different users and user usage permissions can be set, such as: WWW, FTP, Telnet, E-mail, etc. You can also set user permissions for network application software such as QQ and ICQ in the proxy server. Some sites on the Internet can also be filtered so that users can only access information in a certain IP address segment or a certain domain range.
4. Firewall function of proxy server
Firewall technology is a new network security technology developed and promoted in recent years. It is a system that implements access control policies between various networks. It can not only filter illegal information flows, but also allow legal information flows. Using a proxy server can realize firewall functions to a certain extent.
The above explains the purpose of using proxy servers for the unit’s local area network. In fact, the proxy server we need is to install proxy server software on ordinary computers. The popular ones include Wingate, Winroute, Sygate, etc. These software have their own characteristics. Wingate is recommended in this solution, not only because of its powerful and comprehensive functions, but also because Wingate is an old-fashioned proxy server software with many domestic users and can get instant support and help from technical experts.
Wingate classic configuration
Before starting this article, let’s talk about the operating environment of Wingate. The best platform for Wingate is Windows 2000. Although it works on Windows 98, it has poor stability and cannot resolve machine names. It can only display IP addresses, which is not very convenient for real-time monitoring and management. The download address of Wingate is, the software installation is very convenient. Just press "Next" and finally finish. After restarting, an icon will appear in the status bar. Blue means normal operation, and red means stop or an abnormal error occurs.
1. Client browsing web pages
In fact, the Wingate proxy service can already work at this time, and the local area network can be connected to the Internet by dialing up. If you want to use IE to browse web pages, take IE5.5 as an example, just fill in the IP address of the proxy server in the menu "Tools", "Internet Options", "Connection", and "LAN Settings", and the port defaults to 80 (can be changed).
2. E-mail settings
As we all know, general email receipt uses the POP3 (Post Office Protocol 3) protocol, and sending credits is SMTP (Simple Mail Transfer) protocol. The ports correspond to 110 and 25 respectively. Wingate provides support for them at the same time. In the Wingate main interface, you can see that it lists many services, including POP3 proxy server, and the default port is also 110.
The following is a POP3 message receiving client. I use Foxmail here, taking NetEase free email as an example. Fill in the IP address of the proxy server in the email receiving server. When filling in the user name, please note that the input format is "Username#POP3 Server Address", such as "email#pop3." If your agent uses non-standard ports, you can change it in "Customer Software", "Advanced Options".
The initial installation of Wingate does not include SMTP service. We can manually add it: right-click the blank space of the "Services" column, select "SMTP proxy service" in "New Services", and then double-click the SMTP proxy service. You will see a pop-up window. In "General", you will check "Support emails through ISP mail servers". Since many free sending servers now only send emails in this domain, and will automatically refund emails for emails with reply addresses that are not in this domain, you can fill in the email address of the local ISP here. The client only needs to change the sending server to the proxy server address.
3. QQ chat settings
Many friends say that using Wingate as a proxy server cannot use QQ, but the settings are actually very simple: check "Use Sock5 proxy server" in the "System Parameters" and "Proxy Settings" of QQ, and then fill in "Proxy Server Address", and the default port 1080 is enough. The setting method of Irc chat software is the same as above, just set it in the "Firewall" option.
4. FTP settings
The settings of FTP are similar to those of E-mail. The FTP server address that needs to be connected uses the proxy server address. The key is the user name format: user name @pop3 server address.
5. Streaming media playback settings
Nowadays, many people love to watch movies online. Realplayer, Quicktime and other software are essential playback tools. However, to access the Internet through the Wingate proxy server, they also need to make some settings: in Quicktime, you need to fill in the address of Sock and Http in the "Streaming Proxy" option, and then select the port in "Stream Transport". You can watch the video smoothly when the network is good. The method set in Realplayer is: select Use PNA server in "Proxy Server", fill in the proxy server address, and the default port is 1090. Select "Use specified transfer" in "Transfer", and select "Use only Http" in "Rtsp" and "Pna".
6. Download the breakpoint continuous transmission settings
Take Getright as an example. In "Configuration" and "Internet-Proxy" of Getright, check "Use Proxy Servers", fill in the Http, Ftp and Sock proxy service addresses and ports respectively, and check "Use Http Protocol With Ftp Proxy Server" in the Ftp proxy settings.
7. Prohibit access to restricted sites
Create a standard condition in the "Prohibited List", the rule is: http address, condition: include, and add specific address. This way, whenever this user visits this site, a warning message will be displayed and recorded in Wingate's system information.
8. Downloading software is prohibited
Since the software formats available for download on the Internet are generally zip, exe, and rar, three rules can be set in the "Prohibited List" with "http address", "end", and specific address "zip, exe or rar". This can effectively prevent users from downloading software.
The functions that the proxy server can realize include: shared Internet access, firewall, user management, traffic control, etc.
1. Share the Internet and save IP address
When connecting to the Internet, all clients must apply for an IP address, but the division of IP addresses can no longer meet users' expectations for connecting to the Internet. This contradiction can be resolved if a proxy server is used. First, connect the computers that need to be connected to the Internet into a LAN, and then connect to the Internet through a proxy server. This way, multiple computers can share an IP address on the Internet, that is, share an exit to connect to the Internet. This can save IP addresses to the maximum extent, and also save the costs of companies and units to access the Internet (node occupancy fees, depreciation fees, etc.).
2. Reduce the exit flow
Many users use proxy servers to solve the problem of shared Internet access, but it also has an important function, which is to reduce unit egress traffic. The proxy server provides users with a larger cache (Cache). When a client has accessed certain resources on the Internet, it will store these visited resources into the cache. When other clients need to browse the same information, the proxy server will automatically read from the cache. Therefore, all users who pass through the proxy server can share these accessed resources, which can greatly improve client access speed, reduce the egress load and traffic of local nodes, reduce costs, and improve economic benefits.
3. User Management
The leaders of the unit must be very troubled by how to manage employees’ Internet access. Playing games online during working hours, or chatting with QQ, etc., does affect work efficiency. If the company uses a proxy server online, it can set some parameters on the proxy server to effectively manage users. Different application functions can be opened for different users and user usage permissions can be set, such as: WWW, FTP, Telnet, E-mail, etc. You can also set user permissions for network application software such as QQ and ICQ in the proxy server. Some sites on the Internet can also be filtered so that users can only access information in a certain IP address segment or a certain domain range.
4. Firewall function of proxy server
Firewall technology is a new network security technology developed and promoted in recent years. It is a system that implements access control policies between various networks. It can not only filter illegal information flows, but also allow legal information flows. Using a proxy server can realize firewall functions to a certain extent.
The above explains the purpose of using proxy servers for the unit’s local area network. In fact, the proxy server we need is to install proxy server software on ordinary computers. The popular ones include Wingate, Winroute, Sygate, etc. These software have their own characteristics. Wingate is recommended in this solution, not only because of its powerful and comprehensive functions, but also because Wingate is an old-fashioned proxy server software with many domestic users and can get instant support and help from technical experts.
Wingate classic configuration
Before starting this article, let’s talk about the operating environment of Wingate. The best platform for Wingate is Windows 2000. Although it works on Windows 98, it has poor stability and cannot resolve machine names. It can only display IP addresses, which is not very convenient for real-time monitoring and management. The download address of Wingate is, the software installation is very convenient. Just press "Next" and finally finish. After restarting, an icon will appear in the status bar. Blue means normal operation, and red means stop or an abnormal error occurs.
1. Client browsing web pages
In fact, the Wingate proxy service can already work at this time, and the local area network can be connected to the Internet by dialing up. If you want to use IE to browse web pages, take IE5.5 as an example, just fill in the IP address of the proxy server in the menu "Tools", "Internet Options", "Connection", and "LAN Settings", and the port defaults to 80 (can be changed).
2. E-mail settings
As we all know, general email receipt uses the POP3 (Post Office Protocol 3) protocol, and sending credits is SMTP (Simple Mail Transfer) protocol. The ports correspond to 110 and 25 respectively. Wingate provides support for them at the same time. In the Wingate main interface, you can see that it lists many services, including POP3 proxy server, and the default port is also 110.
The following is a POP3 message receiving client. I use Foxmail here, taking NetEase free email as an example. Fill in the IP address of the proxy server in the email receiving server. When filling in the user name, please note that the input format is "Username#POP3 Server Address", such as "email#pop3." If your agent uses non-standard ports, you can change it in "Customer Software", "Advanced Options".
The initial installation of Wingate does not include SMTP service. We can manually add it: right-click the blank space of the "Services" column, select "SMTP proxy service" in "New Services", and then double-click the SMTP proxy service. You will see a pop-up window. In "General", you will check "Support emails through ISP mail servers". Since many free sending servers now only send emails in this domain, and will automatically refund emails for emails with reply addresses that are not in this domain, you can fill in the email address of the local ISP here. The client only needs to change the sending server to the proxy server address.
3. QQ chat settings
Many friends say that using Wingate as a proxy server cannot use QQ, but the settings are actually very simple: check "Use Sock5 proxy server" in the "System Parameters" and "Proxy Settings" of QQ, and then fill in "Proxy Server Address", and the default port 1080 is enough. The setting method of Irc chat software is the same as above, just set it in the "Firewall" option.
4. FTP settings
The settings of FTP are similar to those of E-mail. The FTP server address that needs to be connected uses the proxy server address. The key is the user name format: user name @pop3 server address.
5. Streaming media playback settings
Nowadays, many people love to watch movies online. Realplayer, Quicktime and other software are essential playback tools. However, to access the Internet through the Wingate proxy server, they also need to make some settings: in Quicktime, you need to fill in the address of Sock and Http in the "Streaming Proxy" option, and then select the port in "Stream Transport". You can watch the video smoothly when the network is good. The method set in Realplayer is: select Use PNA server in "Proxy Server", fill in the proxy server address, and the default port is 1090. Select "Use specified transfer" in "Transfer", and select "Use only Http" in "Rtsp" and "Pna".
6. Download the breakpoint continuous transmission settings
Take Getright as an example. In "Configuration" and "Internet-Proxy" of Getright, check "Use Proxy Servers", fill in the Http, Ftp and Sock proxy service addresses and ports respectively, and check "Use Http Protocol With Ftp Proxy Server" in the Ftp proxy settings.
7. Prohibit access to restricted sites
Create a standard condition in the "Prohibited List", the rule is: http address, condition: include, and add specific address. This way, whenever this user visits this site, a warning message will be displayed and recorded in Wingate's system information.
8. Downloading software is prohibited
Since the software formats available for download on the Internet are generally zip, exe, and rar, three rules can be set in the "Prohibited List" with "http address", "end", and specific address "zip, exe or rar". This can effectively prevent users from downloading software.