You are on page 1of 8

Firewalls and Proxies

A Proxy is a central machine on the network that allows other machines in that network to use a shared Internet connection. Proxy servers are intermediate servers which accept requests from clients and forward them to other proxy servers, a source server, or service the request from their own cache. The proxy is also called 'server' or 'gateway'. Proxy allows users on a network to browse the Web, send files over FTP, and work with E-mail and other Internet services.

Proxies and Firewalls

A Firewall Proxy provides Internet access to other computers on the network but is mostly deployed to provide safety or security. It controls the information going in and out the network. Firewalls are often used to keep the network safe and free of intruders and viruses. Firewall proxy servers filter, cache, log, and control requests coming from a client.

A firewall proxy is one that is used for restricting connections from a proxy to the outside world or to the source server inside of the LAN. This is different from a conventional firewall, in that a conventional firewall restricts connections coming from the outside world.

A proxy basically does the following: Receives a request from a client inside the firewall Sends this request to the remote server outside of the firewall Reads the response Sends it back to the client Usually, the same proxy is used by all of the clients on the network. This enables the proxy to efficiently cache documents that are requested by several clients.

In a SOCKS network, all network application data flows through SOCKS, enabling SOCKS to collect, audit, screen, filter and control the network data, and create a network application data warehouse. SOCKS4 performed three functions: connection request, proxy server setup and application data relay. SOCKS5 brings authentication to the table.

Tunneling Proxy
Tunneling allows users to perform various Internet tasks despite the restrictions imposed by firewalls. This is made possible by sending data through HTTP (port 80). Tunneling protocol is very secure, making it indispensable for both average and business communications. SSL (Secure Sockets Layer) tunneling protocol allows a web proxy server to act as a tunnel for SSL enhanced protocols. The client makes an HTTP Request to the proxy and asks for an SSL tunnel. A Tunneling Proxy operates on port 443.