Proxy Firewalls
John D. McLaren, Murray State University
The Application Layer Firewall
Disadvantages of Proxy Firewalls
Proxy Characteristics and Capabilities
Proxy Firewall Characteristics
Application versus Circuit-Level Proxies
Forward versus Reverse Proxies
Caching Proxies/Web-Caching Proxies
Case Study: Traffic Analysis of a Proxy Operation
INTRODUCTION
As network security issues continue to dominate the world of networking, new devices and software are constantly surfacing. Proxy firewalls are just one of the players that are receiving more attention lately. Proxies have been around for a long while, but their primary purpose historically has been to serve as Web accelerators.
The endless variety of the application layer contents make it ripe for potential security vulnerabilities; there is a need for more detailed traffic analysis. Things such as viruses and spam cannot be discovered using simple packet-filtering firewalls. The solution to issues such as these is application layer and proxy firewalls. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.