Security.com

proxy firewall

By TechTarget Contributor

What is a proxy firewall?

A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A proxy firewall is also be called an application firewall or gateway firewall.

A proxy firewall is also a proxy server, but not all proxy servers are proxy firewalls. A proxy server acts as an intermediary between clients and servers. It can cache webpages to reduce bandwidth demands, compress data, filter traffic and detect viruses. A proxy server can also be used to hide user information or to connect to services that would be blocked. On the other hand, a proxy firewall inspects all network traffic to detect and protect against potential threats. It can also detect network intrusion and enforce security policies.

Proxy firewall vs. traditional firewall

A proxy firewall acts as a gateway between internal users and the internet. It can be installed on an organization's network or on a remote server that is accessible by the internal network. It provides security to the internal network by monitoring and blocking traffic that is transmitted to and from the internet.

In contrast, a traditional firewall acts as a gateway between two networks. By blocking unwanted external traffic, a traditional firewall protects the computers and networks behind it from unauthorized access and attacks.

Filtering at the application level

Proxy firewalls filter traffic at the application layer, which is Layer 7 of the Open Systems Interconnection model. The technology is similar to traditional packet filtering firewalls, but proxy firewalls add an extra level of protection. A proxy firewall has its own Internet Protocol (IP) address, so an outside network connection will never receive packets directly from the sending network.

Proxy firewalls are often used as the first layer of defense in a secure web or application infrastructure. In this regard, they protect the network from external threats, while ensuring that internal web services and applications can be used safely with no impact on performance.

How are proxy firewalls used?

Proxy firewalls protect critical systems from unauthorized access. They act as a barrier between authorized users and unauthorized users. Proxy firewalls can be deployed within a hardware device, such as a router or firewall. They can also help accomplish the following:

Proxy firewalls are also used to restrict access to sensitive sites or sites that are only relevant to specific users. For example, a proxy firewall can be used to prevent employees from accessing Facebook or Twitter during working hours, while still allowing them access to their personal accounts.

Proxies can be installed in the network itself -- between the internet and the internal network -- or on each individual computer.

Learn more about the zero-trust world

Weighing the future of firewalls in a zero-trust world

What is zero trust? Ultimate guide to the network security model

Zero-trust framework ripe for modern security challenges

How to build a zero-trust network in these 4 steps

Advantages and disadvantages of proxy firewalls

It is important to assess both the advantages and disadvantages of proxy firewalls when deciding how or if to use them.

Advantages

The main advantages of proxy firewalls include the following:

Disadvantages

Proxy firewalls disadvantages include the following:

There are many kinds of firewalls, including firewall as a service. Find out about them as part of our guide to Secure Access Service Edge.

23 Jun 2021

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement