Unit 3.pptx-1
Unit 3.pptx-1
► Forward Proxy
Protects internal users from external threats.
Used in corporate networks to control employee internet access.
Example: Squid Proxy, Blue Coat ProxySG
► Reverse Proxy
► Protects web servers from external attacks.
► Hides the real IP address of internal servers.
► Example: NGINX, Apache Reverse Proxy
► Advantages of Proxy Firewalls
► Hides Internal Network Details – Prevents attackers from knowing
the real IP addresses of internal systems.
Deep Packet Inspection (DPI) – Can filter traffic based on URLs,
keywords, and file types.
Prevents Direct Attacks – Blocks malicious requests before they
reach internal systems.
Improves Performance – Can cache frequently accessed web
content, reducing bandwidth usage.
► Disadvantages of Proxy Firewalls
► Slower Performance – Processing each request adds latency.
Complex Configuration – Requires proper setup to balance security
and usability.
Limited Support for Some Applications – Certain protocols and
applications may not work correctly behind a proxy.
Use Cases
► A Circuit Level Gateway Firewall operates at the transport layer of the OSI model,
providing a secure communication channel between trusted and untrusted networks.
This document explores the functionality, advantages, and limitations of circuit level
gateway firewalls, as well as their role in modern network security architectures.
► Circuit level gateway firewalls are a type of firewall that manage the connections
between trusted and untrusted networks by monitoring the session establishment and
maintaining the state of the connection. Unlike packet filtering firewalls, which inspect
individual packets, circuit level gateways focus on the context of the communication
sessions, making them more efficient in certain scenarios.
Functionality
An IDS can help accelerate and automate network threat detection by alerting
security administrators to known or potential threats, or by sending alerts to a
centralized security tool. A centralized security tool such as a security information
and event management (SIEM) system can combine data from other sources to
help security teams identify and respond to cyberthreats that might slip by other
security measures.
Types