One of the major role of a systems or network administrator is to secure the network. This can be done by using not only passwords and encryption software, but also by adding firewalls and proxies. A proxy server allows internal end users to access the Internet, however, prevents certain access to forbidden sites, as well as filter inbound connections or messages. A properly configured proxy server helps in securing the network and improves performance.
Set up WinProxy. WinProxy is widely used for windows-based servers which also provides Network Address Translation (NAT) and also supports HTTP, Real Audio, Real Video, FTP, Telnet, Secure Sockets and DNS. The system is popularity because it doesn't need to have any software loaded on the client's end, thereby saving time and effort.
Ensure that all the systems, including the client's systems, have been configured with TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP is the basic communication language or protocol used by Internet, as well as private networks, to access the intranet (internal sites) or extranet (external sites).
Run the installation wizard for the WinProxy. You would need to initially enter the product key on the initial screen to register the product.
Select the type of Internet connection and choose the name of your connection.
Enter the user name and password of your Internet connection.
Let the automactic configuration scripts of the WinProxy run. This allows WinProxy to assign IP (Internet Protocol) addresses automatically to each device within the LAN (Local Area Network), meaning the internal connections. Each IP is unique on each device.
Follow the prompt to disconnect from your network, if you are already connected. WinProxy will then go through the verifications of each operation.
Verify if your proxy server works by having a tester or client computer test the system. The person should be allowed to get through the selected sites. Also, the proxy server should be able to check the URL (Uniform Resource Locator) of outgoing requests made for Web pages. This is done by inspecting HTTP GET and POST messages. Lastly, the system should also be able to see incoming data traffic, including filtering content of incoming messages.
Things You'll Need
Computer or server
To block specific addresses, you can adjust the settings or add this IP address as restricted for users to connect to.