Proxies 2.1 Flashcards
Proxies
Sits between the users and the external network. Receives user requests and sends the request on their behalf. It’s useful for caching information, access control, URL filtering, content scanning. Applications may need to know how to use the proxy (explicit). Some proxies are invisible and needs no additional config (transparent).
Application Proxies
A simple type of proxy known as a NAT (network-level proxy) Most proxies in use are application proxies. The proxy knows the way the application works. Some proxies only know one application such as HTTP, while others can know HTTP, HTTPS, FTP, etc.
Forward Proxy
Some proxies are inside the network. These are commonly used to protect and control access to the internet.
Reverse Proxy
Inbound traffic from the internet is proxied. These are primarily for servers expecting a lot of inbound traffic.
Open Proxy
A third-party uncontrolled proxy. These are used to circumvent existing security controls. An employee trying to view a website that is blocked can use these to view their website. The owner of the proxy can add whatever they like to the network communication. This means they could add their own malicious code.