Operation Manual
The KEN! Proxy Server
94 KEN! – 5 KEN! for the Network Specialist
KEN! proxy functions as a gateway to Internet applications
like Telnet or online services with HBCI. KEN! Service trans-
lates the inquiries sent to its defined ports at its IP address
into inquiries to defined servers in the Internet. The Internet
applications of the KEN! Users register the IP address of the
KEN! Service PC as their server.
KEN! proxy supports proxy authentication (registration with
name and password). When the proxy is activated, access to
the Internet can be granted or denied for the KEN! Users indi-
vidually. Initially a window appears in the browser which re-
quests the KEN! User to enter login data. The services HTTP,
FTP and SOCKS v5 are authenticated.
The KEN! proxy saves loaded web sites depending on their
cache attributes and age. When a page is requested again, it
is retrieved from the cache on the local hard drive and thus
accelerated considerably.
The KEN! proxy also supports proxy servers on the Internet
provider’s end. Proxy-to-proxy communication promises
even greater advantages in terms of speed. KEN! supports
proxy authentication on the Internet provider side as well.
KEN! proxy logs the URLs requested by the browser, the
amount of data transferred and the connection times, all
broken down by IP address.
KEN! proxy supports the suppression of banner advertising,
which can speed up Internet surfing considerably. The URLs
of the undesired banner ads are compiled in a “Filter List”
which is compatible with the widespread Junkbuster format
(see also http://internet.junkbuster.com/).
KEN! Proxy also allows you to suppress undesired URLs so
that users are barred from access.
The KEN! Proxy’s communication with the Internet occurs
through the name resolution internal to KEN! Service and
over the default route (0.0.0.0).










