Security Settings Menu

The Security Settings menu is used to enable IP restrictions that can be used to prevent other Internet users from accessing your proxy server. Note: To use this feature, you must have Internet Explorer 4 or above installed on the computer running CProxy Server.

Enable IP Address Restrictions
Clicking Enable IP Address Restrictions enables this feature. All access will be denied to the proxy server except to those users who are accessing the server from the from a permitted IP address range.

  • Adding an IP Address or IP Address range to the Permitted Access List: When you enable IP address restrictions, access to the proxy server is denied to all users except those that appear in the Permitted Access list. To add an IP address or IP address range to the list, enter the starting IP address in the From field and the IP address at the end of the range in the To field, e.g. From: To: and then click the Add button. This range will now appear in the list of permitted IP addresses and any IP address that falls into this range will be allowed to use the proxy server facilities.
  • Deleting an IP Address from the Permitted Access List: To remove an IP address entry or list to stop a user from accessing the proxy server, highlight the required entry in the Permitted Access list and click Delete.
  • Editing an IP Address Range or Entry: If you need to modify an existing entry in the permitted IP address list, highlight the entry and click the Edit button. Modify as required and then click Add to update the entry.
  • Search: If you are unsure of the settings you need to enter in the IP restrictions table, click the Search button which will create an IP range automatically based on the IP address of your CProxy Server.

Access Violation Log
The Access Violation Log records attempts to access your proxy server from external sources i.e. IP addresses that have not been included in the Permitted IP Address List. This log records the source IP address of the unauthorised request, the protocol requested and the date and time at which the attempt was made. Clicking the Clear Log button will erase the contents of the Access Violation Log. It is worth noting that most of the violations you will ever see contained in this log are servers on the Internet attempting to connect back to a client workstation such as chat servers. Few incidents involve hackers attempting to break into the system. If you are concerned about the source of a violation, check the corresponding IP registry: - European and African IP Addresses. - US Registry. - Asia Pacific IP Registry.

Return to Index