SlideShare a Scribd company logo
How Corporate Firewalls Work

    ●   About Firewall
    ●   About FTP
    ●   About Bastion Host
    ●   About Proxy Server
About Firewall
●   System to prevent from it being invaded a computer
    network in the organization with the firewall by the outside
●   In addition, the computer which such a system was
    incorporated in
●   Of the third person invades it through outside networks such
    as the Internet in the networks such as companies, and data
    or an underlook the destruction of the program being
    performed watch data drifting to the border with the outside
    so that there is not it, and it is necessary for the detection to
    intercept unjust access
●   A system realizing such a function is a firewall
About FTP
●   The FTP is abbreviation of File Transfer Protocol (a file
    transfer protocol) and becomes "the file-transfer protocol"
    when I translate it into Japanese
●   When it says intelligibly, it is long and sends a file into a
    machine in the remote place from a machine in one's very
    front, and it is structure far-off, to copy a file from a machine
    in the remote place in the reverse
●   When I thought that it would make one's homepage that a
    general Internet user employed being aware of FTP. When I
    employ a modem or TA (a terminal adaptor), and a general
    person connected to the Internet makes one's homepage
    with dial-up connection
About Bastion Host
●   A bastion host is a special purpose computer on a
    network specifically designed and configured to
    withstand attacks
●   The computer generally hosts a single application, for
    example a proxy server, and all other services are
    removed or limited to reduce the threat to the computer
●   It is hardened in this manner primarily due to its location
    and purpose, which is either on the outside of the
    firewall or in the DMZ and usually involves access from
    untrusted networks or computers
About Proxy Server
●   Proxy server is a server that acts as a go-between for
    requests from clients seeking resources from other
    servers
●   Proxy server evaluates the request according to its
    filtering rules
●   Proxy server may optionally alter the client's request or
    the server's response, and sometimes it may serve the
    request without contacting the specified server

More Related Content

Viewers also liked

Valtti-koulutus 20.1.2009
Valtti-koulutus 20.1.2009Valtti-koulutus 20.1.2009
Valtti-koulutus 20.1.2009
jennikaisto
 
为什么培训
为什么培训为什么培训
为什么培训20004
 
企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)20004
 
岗 前 培 训
岗  前  培  训岗  前  培  训
岗 前 培 训20004
 
1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)20004
 
教练型领导
教练型领导教练型领导
教练型领导20004
 
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom PresentationC:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom Presentationvermigle
 
28 oct2012
28 oct201228 oct2012
28 oct2012
gymnasio
 
Extravagant 50th Birthday
Extravagant 50th BirthdayExtravagant 50th Birthday
Extravagant 50th BirthdayRobbyBarbaro
 
Txt messaging will never catch on !
Txt messaging will never catch on !Txt messaging will never catch on !
Txt messaging will never catch on !Andy Black
 
Dory squirreis
Dory squirreisDory squirreis
Dory squirreisvermigle
 
Presentation - K&Co.
Presentation - K&Co.Presentation - K&Co.
Presentation - K&Co.karelco
 
Mobile learning isn’t one flavour or one approach it’s a whole grocery store
Mobile learning isn’t one flavour or one approach it’s a whole grocery storeMobile learning isn’t one flavour or one approach it’s a whole grocery store
Mobile learning isn’t one flavour or one approach it’s a whole grocery store
Andy Black
 
Arctic fox cynthia
Arctic fox cynthiaArctic fox cynthia
Arctic fox cynthiavermigle
 
1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voicevermigle
 
28 okt 2013
28 okt 201328 okt 2013
28 okt 2013
gymnasio
 
Mike Bernos Cd Release Event Older Version Comp
Mike Bernos Cd Release Event Older Version CompMike Bernos Cd Release Event Older Version Comp
Mike Bernos Cd Release Event Older Version Comp
RobbyBarbaro
 
Shannon Sports
Shannon SportsShannon Sports
Shannon Sportsmissmarsh
 

Viewers also liked (20)

Valtti-koulutus 20.1.2009
Valtti-koulutus 20.1.2009Valtti-koulutus 20.1.2009
Valtti-koulutus 20.1.2009
 
为什么培训
为什么培训为什么培训
为什么培训
 
企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)
 
岗 前 培 训
岗  前  培  训岗  前  培  训
岗 前 培 训
 
B
BB
B
 
1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)
 
教练型领导
教练型领导教练型领导
教练型领导
 
5
55
5
 
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom PresentationC:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
 
28 oct2012
28 oct201228 oct2012
28 oct2012
 
Extravagant 50th Birthday
Extravagant 50th BirthdayExtravagant 50th Birthday
Extravagant 50th Birthday
 
Txt messaging will never catch on !
Txt messaging will never catch on !Txt messaging will never catch on !
Txt messaging will never catch on !
 
Dory squirreis
Dory squirreisDory squirreis
Dory squirreis
 
Presentation - K&Co.
Presentation - K&Co.Presentation - K&Co.
Presentation - K&Co.
 
Mobile learning isn’t one flavour or one approach it’s a whole grocery store
Mobile learning isn’t one flavour or one approach it’s a whole grocery storeMobile learning isn’t one flavour or one approach it’s a whole grocery store
Mobile learning isn’t one flavour or one approach it’s a whole grocery store
 
Arctic fox cynthia
Arctic fox cynthiaArctic fox cynthia
Arctic fox cynthia
 
1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice
 
28 okt 2013
28 okt 201328 okt 2013
28 okt 2013
 
Mike Bernos Cd Release Event Older Version Comp
Mike Bernos Cd Release Event Older Version CompMike Bernos Cd Release Event Older Version Comp
Mike Bernos Cd Release Event Older Version Comp
 
Shannon Sports
Shannon SportsShannon Sports
Shannon Sports
 

Similar to Week14

Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13sandwep3
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Network security
Network securityNetwork security
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
karthikvcyber
 
How Corporate Firewalls Work
How Corporate Firewalls WorkHow Corporate Firewalls Work
How Corporate Firewalls Workguestfc372f
 
Week14
Week14Week14
Week14
GroupB
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
Patten John
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
NetProtocol Xpert
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 

Similar to Week14 (20)

Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Network security
Network securityNetwork security
Network security
 
Week14
Week14Week14
Week14
 
Week14 F
Week14 FWeek14 F
Week14 F
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
How Corporate Firewalls Work
How Corporate Firewalls WorkHow Corporate Firewalls Work
How Corporate Firewalls Work
 
Week14
Week14Week14
Week14
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 

More from guest79a91d (15)

Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Week14

  • 1. How Corporate Firewalls Work ● About Firewall ● About FTP ● About Bastion Host ● About Proxy Server
  • 2. About Firewall ● System to prevent from it being invaded a computer network in the organization with the firewall by the outside ● In addition, the computer which such a system was incorporated in ● Of the third person invades it through outside networks such as the Internet in the networks such as companies, and data or an underlook the destruction of the program being performed watch data drifting to the border with the outside so that there is not it, and it is necessary for the detection to intercept unjust access ● A system realizing such a function is a firewall
  • 3. About FTP ● The FTP is abbreviation of File Transfer Protocol (a file transfer protocol) and becomes "the file-transfer protocol" when I translate it into Japanese ● When it says intelligibly, it is long and sends a file into a machine in the remote place from a machine in one's very front, and it is structure far-off, to copy a file from a machine in the remote place in the reverse ● When I thought that it would make one's homepage that a general Internet user employed being aware of FTP. When I employ a modem or TA (a terminal adaptor), and a general person connected to the Internet makes one's homepage with dial-up connection
  • 4. About Bastion Host ● A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks ● The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer ● It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers
  • 5. About Proxy Server ● Proxy server is a server that acts as a go-between for requests from clients seeking resources from other servers ● Proxy server evaluates the request according to its filtering rules ● Proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server