Implemention & Administration of Proxy Server

Technologies Net Alliance (TNA), launching 2 days Open Source Training on Squid PROXY Server Administration course for IT professionals and system administrators.

 

OVERVIEW OF THE TRAINING

 

Participants will be trained to set up and configure a Squid Proxy Server. Squid is one of the most popular and most used proxy servers in the world. It is free to download and can be implemented on any distribution of Linux. It is a full-featured web proxy cache server application which provides proxy and cache services for Hyper Text Transport Protocol (HTTP), File Transfer Protocol (FTP), including basic PC-based routing and firewalling techniques.  Proxy servers are commonly used in computer networks to protect the network from attack, to filter undesirable web content and web pages requested by local users, and to speed up the delivery of web pages and web content by caching (storing) commonly requested web pages, documents, and media. Proxy servers are typically implemented on private, local area networks, to filter, protect and cache content requested by users on that network, this is called "proxy" or "transparent proxy.

 

TYPES OF PROXY SERVERS

 

Proxy Server:

 

The web browser on the client is configured to point to the proxy server's IP address. The client can bypass the proxy server by removing or altering the proxy address configuration. An administrator could prevent this by creating a GPO in Active Directory that blocks access to the web browser settings. A proxy server can also function as a caching server.

 

Transparent Proxy Server:

 

The router sends all traffic on defined ports, to the transparent proxy server, this way clients cannot bypass the proxy server. A transparent proxy server can also function as a caching server.

 

Reverse Proxy Server (Cache):

 

The reverse proxy server or cache server is placed in-front-of or prior-to the web server in order to speed up delivery of frequently requested pages and to protect the web server by creating a layer of separation and redundancy.

 

Course Outline:

 

  • Getting started with squid
  • Identifying the right version
  • Getting installation requirements
  • Running Squid
  • Constructing Access Control Lists
  • Combining ACLs and HTTP Access
  • Constructing cache peers
  • Hierarchical caching for large networks
  • Specifying the storage space and Cache replacement policies
  • Setting DNS name servers
  • Logging and Monitoring
  • Advanced Squid Setup
  • Custom error pages
  • Delay Pools
  • Squid performance tuning
  • Authentication and Access limits
  • Squid  log file rotation
  • HTTPS redirection
  • Squid Intercept mode
  • URL redirectors
  • SquidGuard configuration for Content filtering (Optional)
  • Log Analyzer (Optional)
  • Some common issues and troubleshooting.

 

Audience (Who Should Attend):

If you are a Linux or UNIX system administrator and want to enhance the performance of network or you are web developer and want to enhance the performance of your websites, this training is for you. Participants are expected to have some basic knowledge of networking concepts, but may not have used caching systems or proxy servers before now, will be able to grasp maximum knowledge using industry best practices.

 

Training Benefits

 ü  It adds value to the workplace by validating IT professionals’ competencies and expertise in system administration skills.

ü  Gain better control over Squid with command-line options that help to debug Squid.

ü  Discover which configuration option best would suit to particular network.

ü  Understand log files and log format and how to customize them to suit your needs.

ü  Implement a cache hierarchy to use in a large network

ü  Use Squid in Accelerator Mode to quickly boost the performance of a very slow website

ü  Learn how to troubleshoot Squid.

ü  This training provides a greater value, especially for jobseekers by providing them a solid foundation to build their career in the corporate world.