Also called a "proxy" or "application level gateway," it is an application that breaks the connection
between sender and receiver. All input is forwarded out a different port, closing a straight path
between two networks and preventing a hacker from obtaining internal addresses and details of a
private network. Proxy servers are available for common Internet services; for example, an HTTP
proxy is used for Web access, and an SMTP proxy is used for e-mail. Proxies generally employ
network address translation (NAT), which presents one organization-wide IP address to the
Internet. It funnels all user requests to the Internet and fans responses back out to the appropriate
users. Proxies may also cache Web pages, so that the next request can be obtained locally. Proxies
are only one tool that can be used to build a firewall.
between sender and receiver. All input is forwarded out a different port, closing a straight path
between two networks and preventing a hacker from obtaining internal addresses and details of a
private network. Proxy servers are available for common Internet services; for example, an HTTP
proxy is used for Web access, and an SMTP proxy is used for e-mail. Proxies generally employ
network address translation (NAT), which presents one organization-wide IP address to the
Internet. It funnels all user requests to the Internet and fans responses back out to the appropriate
users. Proxies may also cache Web pages, so that the next request can be obtained locally. Proxies
are only one tool that can be used to build a firewall.
Comments
Post a Comment
https://gengwg.blogspot.com/