Difference between a transparent and non-transparent proxy

transparent and non transparent proxy - proxyaqua


A proxy server is present between the user and computer and destination servers on the internet. Usually, the server that gives unmodified commands and responses is called a gateway, or sometimes it is known as tunneling proxy. Based on setups and functions proxies are divided into different categories such as transparent proxy and non-transparent proxy.

Transparent proxy:

A transparent proxy has different names. It is also known as inline, intercepting and forced proxy. It is a gateway or a server that acts as a connection between you and the internet. The proxy redirect your requests and commands and respond to your request after modifying it. You can say that where there is a transparent prosy here is also a non-transparent proxy because the server that modifies your requests is a non-transparent proxy.

The main feature of transparent-proxy is that the user does not know that their system will go through a specific site through a proxy. It happens because the necessary customization of firewall eliminates the need to configure web clients.

How to set up a transparent proxy?

The following steps should follow to set up a transparent proxy:

1.    For the configuration of a transparent proxy, there is a requirement of basic proxy setup.

2.    Setup transparent HTTP.

3.    Firewall rules.

4.    CA, transparent SSL setup.

5.    Set transparent SSL.

6.    Customize NO SSL bump.

7.    Again setup firewall rule.

8.    Configure OS/Browser.

Work of transparent proxy:

It acts as an intermediate and gateway between the user and the server. When the user connects and commands to the server, the transparent proxy interprets the command before passing it to the provider. They are known as transparent because the user is unaware of it.

Non-transparent proxy:

A non-transparent proxy is a proxy that allows the sending of requests to the firewall. In this way, the user becomes able to monitor all the web traffic with a variety of firewall. The user enables other users to authenticate the use of their original usernames from the directory.

Non-transparent proxy server:

The following steps should require to setup non-transparent proxy:

1.    First, go to the administration interphase and go to the proxy server tab.

2.    Click on the option enable transparent proxy.

3.    If you want a tunneled connection on non-standard TCP ports, then click on the option allow non-transparent proxy to all TCP ports.

4.    Now click on apply

5.    Your proxy setup finish.

6.    The new proxy server applies now.

Difference between transparent and non-transparent proxy:

Transparent proxy and non-transparent proxy both work side by side. Use of one proxy doesn't mean that another proxy is disabled. There are some functions and features that become the reason to differentiate between both proxies transparent and non-transparent.

The first type of proxy is a connection that clients send to the servers through the default system. The IP address from the clients are the original destinations IP address, and it is not the firewall. The firewall is present with the routing path to the client's default system. It enables to determine the application layer of the proxy. When data inspected, it processes further through the firewall. Clients are only responsible for their DNS system. You can say that in transparent servers, the clients are not aware of the firewall. While on the other hand, the non-transparent proxy works differently. In this proxy connection, the clients give a command to the firewall. The setting explicitly of the connection of clients specify that all requests sent to the firewall as a proxy server. The IP address of the destination is the original IP address of the firewall. For example, google.com. Just like non-transparent proxy server the firewall determines and inspect the proxy application layer data after this it NATs the data and its process further to the final destination. In this non-transparent proxy server clients is entirely aware of the firewall. But the non-transparent proxy server is complicated than the first one. The non-transparent proxy server is more beneficial; it depends upon the routing and methods you use. Some proxies that can be configured as non –transparent are FTP, HTTP, Oracle, Telnet etc.

Non-transparent proxy is better than inline proxy the one of its main is reason is that when clients use non-transparent server, it is in their knowledge that proxy uses and in this way they perform accordingly. For new users, the transparent proxy is a little bit tricky and technical to use. But it provides compelling, quick and robust proxy service. On the other hand, the inline proxy is useful for mixed environments such as Unix, Linux and Windows system. It gives the user quick access to the server.

Client’s behavior about using a transparent and non-transparent proxy:

The choice of transparent and non-transparent proxy bases on the convenience of system Understanding of user's behavior has a significant role while choosing proxies. We suggest you use proxy setup if you have managed system and transparent if your system is not manage. When clients use a proxy setup, they directly send a request to the proxy. And that proxy takes care about DNS. But behind the transparent proxy, the clients control its DNS and send message to the IP address. The non-transparent proxy setup might cause your devices ad laptops heavy, and you have to use different face issues. This discussion concludes that proxy choice is much more depends upon the user and clients.

Conclusion:

The main difference between Transparent and Non-transparent proxy is that in the case of first proxy users are unaware of the proxy while in the second case, users know about the proxy. Don't consider that only one proxy works at one time. Both proxies work side by side. It depends upon the users and system that which proxy works the best. The enabling of transparent proxy don't mean that the non-transparent server is disabled. Both proxies have their own merits and demerits. But there is no problem with what to choose for your system. The choice of both proxies based on convenience.

Comments

Popular Posts