World is Welcome To The World of Linux

Journey into the world of linux

Menu
  • About
  • Welcome
Menu

Proxy Firewall and Gateway Firewall: Introduction

Posted on June 28, 2010 by Ganesh Sharma

If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting!

The terms proxy firewall and gateway firewall are used synonymously. These firewalls help to maintain the transparency between the requester and server. As you know, the packet filter firewall inspects the headers of the packets, so it works at network transport layer. But to do inspection of packets at deeper level for better security, we need the proxy firewalls which works at application layer. Moreover, these firewalls are aware of the application protocol, so they provide better inspection capabilities.

Every packet entering your internal network passes through your firewall. The firewall resides as a gateway between the user and the network, so it’s also referred to as Gateway firewall. The terms proxy firewall, firewall proxy, gateway firewall, firewall gateway, application gateway, application proxy refer to the same thing: Proxy Firewall.

Difference Between Packet Filter and Gateway Firewall

The major difference between the two main types of firewalls is that, the proxy(gateway) firewall understands the application. Being application specific, these can be programmed to allow or disallow the access to a particular service. You can even specify which functions of the application are accessible and which not. The squid proxy server is the example of this type of firewall. If placed at gateway position between internet and internal network, the access to various sites can be blocked based on IP address of the internal workstations. The set of rules which are consulted to allow/disallow the http traffic are called ACLs(Access Control List). Not only this, but bandwidth can also be controlled.

Benefits of Proxy Firewall

The proxy firewall offers several advantages. The list goes as below:

  1. Since the gateway understands the application, so the packet inspection is better.
  2. These act in both directions. From internal client to the server on internet and vice versa. Means this is also configurable, which internet hosts can send the requests to the internal clients.
  3. They act as single point of contact where you can better control access to the services of your network and internet.
  4. Extensive logs can be collected which help the network administrator at several levels.
  5. Based on the content of data, some proxies can help to filter the traffic as per your rules.
  6. The network information about internal workstations and servers is protected from internet.

Disadvantages of Proxy Firewall

The disadvantages are also there which are listed below:

  1. The proxy firewalls needs to understand the applications in detail, so to act as a proxy, you need that many proxy server applications as you want the number of services.
  2. The single point of contact can also act as single point of failure. So, backup servers are also necessary for this.
  3. The clients also need to be modified if you want them to use the proxy severs. The examples are, to use proxy squid server, you need to configure client browsers.

4 thoughts on “Proxy Firewall and Gateway Firewall: Introduction”

  1. Proxy says:
    March 13, 2011 at 20:04

    Thanks for giving me the chance to read such a well written article, keep up the good work.

    Reply
  2. Samarth says:
    January 29, 2012 at 23:52

    Whether firewall and gateway can be same ?

    Reply
  3. Pradip Patil says:
    September 23, 2013 at 12:34

    Dear Author/Writer

    The Article written by you on packet Filtering firewall kind of interesting and more clear. I search lot of on google to find such a meaningful article on Proxy Firewall and Gateway Firewall: Introduction. Thanks for sharing this valuable information. Now i come to the point. I writing a book on Ethical hacking and Security and it covered lot of interesting topics along with hacking and security as well. I also include one chapter on “Firewall, IDS & IPS” which are cover some basics of firewall and IDS/IPS.

    Now here i want you to use your above article in my book so the people who don’t read your article yet, able to read it through my book.

    I’ll give you 100% credit for this topic with your name and article link in my book.

    Please give me approval to you use this article in my book. and please replay this mail on my email ID: “Patil.pradip37@gmail.com”

    Thank You & Waiting for your replay…

    Warm Regards
    Pradip Patil

    Reply
  4. Manwendra says:
    May 19, 2014 at 17:43

    Thanks for the article, it was really helpful.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Date Command Tutorial(Video)
  • grep Command Tutorial – 1(Video)
  • Introduction To ls Command(Video)
  • Chapter 3
  • Set Position Of Poll Module Into Joomla

Recent Comments

  • Kansas City Trailer Proz on Physical Volume In AIX – A Primer
  • Create volume group in AIX | myunixsheet on How To Create Volume Group
  • Restore of AIX backup on other Unix system - TecHub on What is mksysb And What Are Its Components
  • Firewall Unleashed - InfoSec Institute on Packet Filtering Firewall: An Introduction
  • Manwendra on Proxy Firewall and Gateway Firewall: Introduction

Archives

  • January 2019
  • June 2010
  • May 2010
  • February 2010
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008

Categories

  • 30 Days To Joomla WebSite Setup
  • A Journey To The World of Linux System Administration
  • Aix
  • Backups
  • Books
  • Firewalls
  • Introduction
  • Joomla
  • Joomla Backup
  • Joomla Web Technology
  • Linux
  • LPAR and Virtualization
  • LVM
  • Pluggable Authentication Modules
  • section navigator pro
  • Security
  • Security Knowledge Base
  • Tips and Tricks
  • Uncategorized
  • World is Welcome Products

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org
©2023 World is Welcome To The World of Linux | WordPress Theme by SuperbThemes