The book is called "Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)" - http://www.amazon.com/Counter-Hack-Reloaded-Step-Step/dp/0131481045/ref=pd_bb s_1?ie=UTF8&s=books&qid=1206284032&sr=8-1
The author makes several references to "proxy firewalls" and implies they are more secure than "traditional" firewalls because they ignore typical reconnaissance, probing attempts like nmap, etc. because they function at the application layer. Ed On Sat, Mar 22, 2008 at 7:38 AM, Lars Noodin <[EMAIL PROTECTED]> wrote: > Ed Flecko wrote: > > I'm reading a book on network security and it mentions "proxy > > firewalls" ... are there other "proxy firewalls" the > > author is referring to? > > Which book? Title, author, ISBN would help. Or send a link to a review. > > > > As a matter of curiosity, has anyone ran an nmap scan against an > > OpenBSD box with Squid? What did the scan results indicate? > > The results depend entirely on how you have Squid set up and how PF is > configured. > > Regards, > -Lars