What Are the Different Types of Proxy Firewall?
Proxy firewall participates in the whole process of a TCP connection through a proxy technology.
Proxy firewall
Right!
- Chinese name
- Proxy firewall
- Foreign name
- Application Gateway
- Alias
- Application layer gateway
- Core
- Proxy server technology
- Proxy firewall participates in the whole process of a TCP connection through a proxy technology.
- 1 Introduction
- This kind of firewall participates in the whole process of a TCP connection through a proxy technology. Data packets sent from the inside are processed by such a firewall as if they originated from the external network card of the firewall, so as to hide the internal network structure. This type of firewall is recognized by network security experts and the media as the most secure firewall.
- 2. Security
- Proxy firewalls provide comprehensive protocol-aware security analysis for the protocols they support. This allows them to make more secure decisions than products that only consider packet header information. For example, a specific FTP-enabled proxy firewall can monitor FTP commands that actually flow out of the command channel and can stop any prohibited activities. Because the server is protected by a proxy firewall, and the proxy firewall allows protocol-aware records, this makes it easier to identify attack methods and back up existing records.
- Adding security to a proxy firewall comes at a price. The additional cost is the cost of establishing two connections for each session, plus the time required for the application layer to authenticate the request, as well as the performance degradation. You can spend your money on a proxy server, but you can still reach a bottleneck on a true high-bandwidth network. You may find it difficult to properly install and configure the required proxy for your network, and it may be difficult to get a VPN (Virtual Private Network) to work through a proxy firewall. [1]
- Security: It can effectively prevent cross-site scripting attacks (XSS).