Monday, October 21, 2019

Word of the Day: proxy firewall

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | October 21, 2019
proxy firewall

A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A proxy firewall may also be called an application firewall or gateway firewall.

Just like a proxy server or cache server, a proxy firewall acts as an intermediary between in-house clients and servers on the Internet. The difference is that instead of simply intercepting Internet requests and responses, a proxy firewall also monitors incoming traffic for layer 7 protocols, including HTTP and FTP.

In addition to determining which traffic is allowed and which is denied, a proxy firewall uses stateful inspection technology and deep packet inspection to analyze incoming traffic for signs of attack.

Proxy firewalls are considered to be the most secure type of firewall because they prevent direct network contact with other systems. Because a proxy firewall has its own IP address, an outside network connection will never receive packets from the sending network directly.

Having the ability to examine the entire network packet, rather than just the network address and port number, also means that a proxy firewall will have extensive logging capabilities -- a valuable resource for security administrators who are dealing with security incidents.

 

According to Marcus Ranum, who is credited with conceiving the idea of a proxy firewall, the goal of the proxy approach is to create a single point that allows a security-conscious programmer to assess threat levels represented by application protocols and put error detection, attack detection and validity checking in place.

The added security offered by a proxy firewall has its drawbacks, however. Because a proxy firewall establishes an additional connection for each outgoing and incoming packet, the firewall can become a bottleneck, causing a degradation of performance or becoming a single point of failure.

Quote of the Day

 
"While gateways that filter at the application layer provide considerable data security, they can dramatically affect network performance." - Robert G. Ferrell

Learning Center

 

The 5 different types of firewalls
Learn about the similarities and differences among five basic types of firewalls, including packet filtering firewalls, application-level gateways and next-gen firewalls.

Automation improves firewall migration and network security
Firewall migration is a compelling automation use case, as automation scripts can shorten the migration process, eliminate unused rules and bolster overall network security.

How to select and implement a next-gen firewall
This buyer's guide helps pinpoint needs based on product comparison and features for companies that want to implement NGFWs in their organization.

What tools can reinforce network edge security?
Application-layer firewalls, intrusion prevention systems and network-based malware protection are some of the key tools to monitor IP network traffic and boost network edge security.

Quiz Yourself

 
What are network firewalls? Test your network security IQ
Network firewalls have been an essential part of network security since the internet began. This quiz covers what network firewalls are and tests your security expertise.

 

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: