Transparent Proxy Server Configuration
When we configure a normal squid proxy server then we need to modify i.e. configure each client's browser to use the proxy server and the proxy server's port needs to be specified in the browser so that the client machines can access internet through the proxy.This sort of proxy configuration is not effective all the time because each client machine's browser needs to be reconfigured. So in Internet Service Providers and large office it is often required that such a proxy server configured which shall be detected by the client machine by itself , or in other words the clients browsers need not be modified.This sort of proxy server configuration is call the transparent proxy server.What is done in transparent proxy server is that all the request that come to proxy server's LAN interface in port 80 is redirected to it's proxy port. This is done by firewall rule.
Central Authentication Server Usig NIS
NIS or Network Information Server can be used as a central authentication server for all the users in a network.BY configuring a Network Information Server it becomes easier to maintain the database of users and their passwords in a single computer in the network and whenever a user needs to login to a system then the NIS server checks the login information and authenticates the user.So NIS server is found to be useful for managing a central authentication Server.
Configuring A Nagios Server
A nagios Server is used to monitor hosts in a Network.In a large network system it is often required to monitor the status of the host machines,servers routers and switches for their normal operation.A nagios server works to check the status of such devices and machines in a fixed interval of time and informs the administrators via email,sms,pager or instant messaging about the status of the machines whenever their status changes.For example if a host goes down then it makes a notification and then again makes the notification when the same host comes up.So A Nagios Server Is thus a useful tool for system administrators to effectively monitor the hosts.
Friday, May 11, 2007
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment