
22-6 Industrial Communication Systems
entire application. erefore, a proxy acts as a man-in-the-middle: to the outside network, a proxy behaves
like the destination device; to the inside network, the proxy acts as the request origin; and vice versa.
Sophisticated application proxies are completely transparent to the involved communication parties.
Due to the importance of rewalls, they have to be reliable and robust against security attacks. To min-
imize vulnerabilities, rewalls are oen isolated, stand-alone devices that are kept as simple as possible.
Furthermore, access to rewalls is only permitted to users with special administrator ...