Additionally, application-based firewall systems are set up as proxy servers to act on the behalf of someone inside an
organization’s private network. Rather than relying on a generic packet filtering tool to manage the flow of Internet
services through the firewall, a special-purpose code called a proxy server is incorporated into the firewall system.
For example, when someone inside the corporate network wants to access a server on the Internet, a request from the
computer is sent to the proxy server. The proxy server contacts the Internet server, and the proxy server then sends
the information from the Internet server to the computer inside the corporate network. By acting as a go-between,
proxy servers can maintain security by examining the program code of a given service (e.g., FTP, Telnet). It then
modifies and secures it to eliminate known vulnerabilities. The proxy server can also log all traffic between the
Internet and the network.
Additionally, application-based firewall systems are set up as proxy servers to act on the behalf of someone inside anorganization’s private network. Rather than relying on a generic packet filtering tool to manage the flow of Internetservices through the firewall, a special-purpose code called a proxy server is incorporated into the firewall system.For example, when someone inside the corporate network wants to access a server on the Internet, a request from thecomputer is sent to the proxy server. The proxy server contacts the Internet server, and the proxy server then sendsthe information from the Internet server to the computer inside the corporate network. By acting as a go-between,proxy servers can maintain security by examining the program code of a given service (e.g., FTP, Telnet). It thenmodifies and secures it to eliminate known vulnerabilities. The proxy server can also log all traffic between theInternet and the network.
การแปล กรุณารอสักครู่..