In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet. What steps are involved in this process?

What will be an ideal response?


1. An internal host makes a request to access a Web site.
2. The request goes to the proxy server, which examines the header and data of the packet against rules configured by the firewall administrator.
3. The proxy server re-creates the packet in its entirety, with a different source IP address.
4. The proxy server sends the packet to its destination; the packet appears to be coming from the proxy server, not the original end user who made the request.
5. The returned packet is sent to the proxy server, which inspects it again and compares it against its rule base.
6. The returned packet is rebuilt by the proxy server and sent to the originating computer; when received, the packet appears to have come from the external host, not the proxy server.

Computer Science & Information Technology

You might also like to view...

To save time, a document that will be used repeatedly should be saved as ________

A) an extension B) in HTML format C) a leader D) a template

Computer Science & Information Technology

When creating a calculate field, existing field names must be enclosed in brackets

Indicate whether the statement is true or false

Computer Science & Information Technology

=INDEX(A2:B5,MATCH(MAX(B2:B5),B2:B5,0),1 ) is an example of a nested function

Indicate whether the statement is true or false

Computer Science & Information Technology

A data table with five rows and five columns must have ________ input variables

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology