Standards for Technology in Automotive Retail
Proxy servers provide additional security by hiding networks from each other. All communication between the networks goes through the proxy. In a dealership environment, the PC’s communicate with the proxy server, and the proxy server in turn communicates with the Internet. Data packets going to the Internet are “repackaged” with the IP address of the proxy server, so that intruders are not able to determine the true source of the packets.
A proxy server has many potential purposes, including:*
To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
To apply access policy to network services or content, e.g. to block undesired sites.
To log / audit usage, i.e. to provide company employee Internet usage reporting.
To bypass security/ parental controls.
To scan transmitted content for malware before delivery.
To scan outbound content, e.g., for data leak protection.
Proxy servers are not required to communicate with the OEMs over the Internet. However, they can be configured to provide additional services that may be desirable. These services may include:
Authentication — the process of identifying and verifying any individual attempting to gain access to a network.
Authorization — the process of determining whether an individual has the right or authority to perform an operation on a protected resource. Authorization services are a critical part of an application’s security architecture. After a user authenticates his identity, authorization services enforce the business policy by defining what services and information the user can access.
Caching — the storage of recently accessed web pages for quicker retrieval.
Logging — the automatic generation and storage of service requests including those who access to the Internet.
URL filtering — the ability to prevent users from visiting undesirable websites.