|Security Settings Menu
The Security Settings menu is used to enable IP restrictions that can
be used to prevent other Internet users from accessing your proxy server. Note:
To use this feature, you must have Internet Explorer 4 or above installed
on the computer running CProxy Server.
Enable IP Address Restrictions
Clicking Enable IP Address Restrictions enables this feature. All
access will be denied to the proxy server except to those users who are
accessing the server from the from a permitted IP address range.
- Adding an IP Address or IP Address
range to the Permitted Access List: When you enable IP address
restrictions, access to the proxy server is denied to all users except
those that appear in the Permitted Access list. To add an IP address
or IP address range to the list, enter the starting IP address in the From
field and the IP address at the end of the range in the To
field, e.g. From: 192.168.0.1 To: 192.168.0.254 and then click the Add
button. This range will now appear in the list of permitted IP
addresses and any IP address that falls into this range will be
allowed to use the proxy server facilities.
- Deleting an IP Address from the
Permitted Access List: To remove an IP address entry or list to
stop a user from accessing the proxy server, highlight the required
entry in the Permitted Access list and click Delete.
- Editing an IP Address Range or
Entry: If you need to modify an existing entry in the
permitted IP address list, highlight the entry and click the Edit
button. Modify as required and then click Add to update the
- Search: If
you are unsure of the settings you need to enter in the IP
restrictions table, click the Search button which will create
an IP range automatically based on the IP address of your CProxy
The Access Violation Log records attempts to access your proxy server
from external sources i.e. IP addresses that have not been included in the
Permitted IP Address List. This log records the source IP address of the
unauthorised request, the protocol requested and the date and time at
which the attempt was made. Clicking the Clear Log button will
erase the contents of the Access Violation Log. It is worth noting that
most of the violations you will ever see contained in this log are servers
on the Internet attempting to connect back to a client workstation such as
chat servers. Few incidents involve hackers attempting to break into the
system. If you are concerned about the source of a violation, check the
corresponding IP registry:
- European and African IP Addresses.
http://www.arin.net - US
Asia Pacific IP Registry.
Return to Index