John D. McLaren, Murray State University
Houston, We Have a Proxy
Definition of Firewall
The Application Layer Gateway
The Application Layer Firewall
The NAT-ing Firewall
Why and When to Use a Proxy
Goals of a Proxy Firewall
Advantages of Proxy Firewalls
Disadvantages of Proxy Firewalls
Proxy Characteristics and Capabilities
Building a Proxy
Proxy Firewall Characteristics
Summary of Capabilities
Types of Proxies
Application versus Circuit-Level Proxies
Forward versus Reverse Proxies
Caching Proxies/Web-Caching Proxies
Case Study: Traffic Analysis of a Proxy Operation
Details on the Proxy Scenario
As network security issues continue to dominate the world of networking, new devices and software are constantly surfacing. Proxy firewalls are just one of the players that are receiving more attention lately. Proxies have been around for a long while, but their primary purpose historically has been to serve as Web accelerators.
The endless variety of the application layer contents make it ripe for potential security vulnerabilities; there is a need for more detailed traffic analysis. Things such as viruses and spam cannot be discovered using simple packet-filtering firewalls. The solution to issues such as these is application layer and proxy firewalls. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.