Solved

Port Forwarding vs Proxy

Posted on 2014-03-31
3
1,594 Views
Last Modified: 2014-03-31
As I understand it, Port forwarding sends to a specified IP(port), and this is usually performed by a router or a firewall

However, a proxy does much the same thing, but is usually a server of some sort in the DMZ as opposed to the firewall or router

So what am I missing, what is the difference between a proxy and a firewall
0
Comment
Question by:Anthony Lucia
  • 2
3 Comments
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 39967574
port forwarding deals with packet data it does not review what is in the request.

To differentiate, I'll use the snail mail approach.

port forwarding looks at the envelope and to whom the letter is addressed, and forwards it along.

the proxy in this example is a correspondence processing group of people.
When a letter arrives, they open the letter. look to whom it is addressed, and forward it along.

The difference is the basis on which the determination is made where this should go.

The packet is the envelope (TCP/IP).
The request is always enclosed within the envelope (TCP/IP)
0
 
LVL 77

Expert Comment

by:arnold
ID: 39967701
Yes I know, requests are not contained in a single packet.  For the purposes of this example, they do.
Or it would necessitate the introduction of tcp/IP packets, packet assembly, retransmission,..... etc.

Since proxy requires the receipt of all packets to determine the next step/destiantion while the port forwarding setup does not it forwards a packet at a time to be assembled on the receiving end as needed.


It might be possible to illustrate as a treasure hunt where the map is made up of pieces (puzzle) and each piece is sent individually.
Each piece of the puzzle is numbered N of M in no specific order as far as assembling the puzzle. i.e. the map is broken into 32 pieces and labeled in no speicific way 1 of 32 to 32 of 32.

port forwarding when each piece arrives will direct it to the group of people designated to assemble the map (map processors).

proxy handling will mean there is a receiving group of people, who will be charged of making sure they received all 32 pieces before delivering the pieces  to the Map processors.

The difference deals with port forwarding the map processors, would have to initiate a request to the original sender that a piece is missing.  In the proxy case, the receiving group will handle this task.

The true distinction, if all pieces are not delivered, in the proxy setup, the map processors are not aware that a map was ever sent while in the port forwarding, an incomplete set of data was sent on which the map processing group could not act.
0
 

Author Closing Comment

by:Anthony Lucia
ID: 39967873
I understand.  Thanks for taking the time to explain that
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Work with App store 7 55
Outbound Connection to known malware 4 42
Need to disable SSL Cipher 7 78
Windows Security warnings have started to pop up excessively 4 60
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question