In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet. What steps are involved in this process?
What will be an ideal response?
1. An internal host makes a request to access a Web site.
2. The request goes to the proxy server, which examines the header and data of the packet against rules configured by the firewall administrator.
3. The proxy server re-creates the packet in its entirety, with a different source IP address.
4. The proxy server sends the packet to its destination; the packet appears to be coming from the proxy server, not the original end user who made the request.
5. The returned packet is sent to the proxy server, which inspects it again and compares it against its rule base.
6. The returned packet is rebuilt by the proxy server and sent to the originating computer; when received, the packet appears to have come from the external host, not the proxy server.
You might also like to view...
To save time, a document that will be used repeatedly should be saved as ________
A) an extension B) in HTML format C) a leader D) a template
When creating a calculate field, existing field names must be enclosed in brackets
Indicate whether the statement is true or false
=INDEX(A2:B5,MATCH(MAX(B2:B5),B2:B5,0),1 ) is an example of a nested function
Indicate whether the statement is true or false
A data table with five rows and five columns must have ________ input variables
Fill in the blank(s) with the appropriate word(s).