Solved

Port Forwarding vs Proxy

Posted on 2014-03-31
3
1,777 Views
Last Modified: 2014-03-31
As I understand it, Port forwarding sends to a specified IP(port), and this is usually performed by a router or a firewall

However, a proxy does much the same thing, but is usually a server of some sort in the DMZ as opposed to the firewall or router

So what am I missing, what is the difference between a proxy and a firewall
0
Comment
Question by:Anthony Lucia
  • 2
3 Comments
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 39967574
port forwarding deals with packet data it does not review what is in the request.

To differentiate, I'll use the snail mail approach.

port forwarding looks at the envelope and to whom the letter is addressed, and forwards it along.

the proxy in this example is a correspondence processing group of people.
When a letter arrives, they open the letter. look to whom it is addressed, and forward it along.

The difference is the basis on which the determination is made where this should go.

The packet is the envelope (TCP/IP).
The request is always enclosed within the envelope (TCP/IP)
0
 
LVL 78

Expert Comment

by:arnold
ID: 39967701
Yes I know, requests are not contained in a single packet.  For the purposes of this example, they do.
Or it would necessitate the introduction of tcp/IP packets, packet assembly, retransmission,..... etc.

Since proxy requires the receipt of all packets to determine the next step/destiantion while the port forwarding setup does not it forwards a packet at a time to be assembled on the receiving end as needed.


It might be possible to illustrate as a treasure hunt where the map is made up of pieces (puzzle) and each piece is sent individually.
Each piece of the puzzle is numbered N of M in no specific order as far as assembling the puzzle. i.e. the map is broken into 32 pieces and labeled in no speicific way 1 of 32 to 32 of 32.

port forwarding when each piece arrives will direct it to the group of people designated to assemble the map (map processors).

proxy handling will mean there is a receiving group of people, who will be charged of making sure they received all 32 pieces before delivering the pieces  to the Map processors.

The difference deals with port forwarding the map processors, would have to initiate a request to the original sender that a piece is missing.  In the proxy case, the receiving group will handle this task.

The true distinction, if all pieces are not delivered, in the proxy setup, the map processors are not aware that a map was ever sent while in the port forwarding, an incomplete set of data was sent on which the map processing group could not act.
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39967873
I understand.  Thanks for taking the time to explain that
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question