User Guide
135
CHAPTER 9
Configuring Proxied
Services
Proxy filtering goes a step beyond packet filtering by
examining a packet’s content, not just the packet’s
header. Consequently, the proxy determines whether a
forbidden content type is hidden or embedded in the
data payload. For example, an email proxy examines
all SMTP packets to determine whether they contain
forbidden content types, such as executable programs
or items written in scripting languages. Such items are
common methods of transmitting computer viruses.
The SMTP proxy knows these content types are not
allowed, while a packet filter would not detect the
unauthorized content in the packet’s data payload.
Proxies work at the application level, while packet fil-
ters work at the network and transport protocol level.
In other words, each packet processed by a proxy is
stripped of all network wrapping, analyzed,
rewrapped, and forwarded to the intended destina-
tion. This adds several layers of complexity and pro-
cessing beyond the packet filtering process. What this
means, of course, is that proxies use more processing
bandwidth than packet filters. On the other hand, they
Содержание Firebox X1000
Страница 1: ...WatchGuard Firebox System User Guide WatchGuard Firebox System...
Страница 12: ...xii WatchGuard Firebox System...
Страница 44: ...Chapter 2 Service and Support 22 WatchGuard Firebox System...
Страница 61: ...Cabling the Firebox User Guide 39...
Страница 68: ...Chapter 3 Getting Started 46 WatchGuard Firebox System...
Страница 78: ...Chapter 4 Firebox Basics 56 WatchGuard Firebox System...
Страница 156: ...Chapter 8 Configuring Filtered Services 134 WatchGuard Firebox System...
Страница 182: ...Chapter 9 Configuring Proxied Services 160 WatchGuard Firebox System...
Страница 220: ...Chapter 11 Intrusion Detection and Prevention 198 WatchGuard Firebox System...
Страница 242: ...Chapter 12 Setting Up Logging and Notification 220 WatchGuard Firebox System...
Страница 255: ...Working with Log Files User Guide 233 appear until the remote office Firebox has been properly configured...
Страница 256: ...Chapter 13 Reviewing and Working with Log Files 234 WatchGuard Firebox System...
Страница 274: ...Chapter 14 Generating Reports of Network Activity 252 WatchGuard Firebox System...