What is a Proxy?
A proxy (or proxy server) is an intermediary between a client (such as a web browser) and a destination server (such as a website or application). The proxy receives requests from the client and forwards them to the destination — and vice versa.
Proxies are often used for security, performance, access control or Monitoring.
🎯 What does a proxy do?
- Hides the internal IP address of the client
- Filters traffic (for example by blocking websites or protocols)
- Speeds up access through caching of frequently visited content
- Logs and monitors network traffic
- Applies policy based on user, time, content or device
🛠 Types of proxy server
| Type | Description |
|---|---|
| Forward proxy | Client → Proxy → Internet (most often used in companies) |
| Reverse proxy | Internet → Proxy → Internal server (protects backend systems) |
| Transparent proxy | Operates in the background without users noticing |
| Application proxy | Specialised per protocol (e.g. HTTP, FTP, SMTP) |
| Caching proxy | Stores previously fetched content locally for faster access |
| Web proxy | Used in browsers for anonymous or filtered surfing |
🧱 Use in OT and IT environments
-
OT environment:
-
Used to provide secure access to HMI, SCADA, Historian or PLC data from IT
-
Often placed in a DMZ or alongside a Jump Server
-
Capability for protocol conversion (e.g. from OPC UA to HTTP)
-
IT environment:
-
Web filtering, DLP, internet access, malware blocking
-
Integration with SIEM for monitoring
🔐 Security benefits
| Security function | Explanation |
|---|---|
| IP shielding | External systems only see the proxy address |
| Access control | Can be combined with IAM, RBAC and user profiles |
| Content filtering | Blocks unwanted sites or file types |
| SSL inspection | Decryption of encrypted traffic (with the right certificates) |
| Logging and auditing | Comprehensive monitoring of outbound traffic |
📌 In summary
A proxy acts as an intermediary between networks or systems and provides additional layers of control, filtering and security. Indispensable in networks where segmentation, Monitoring and risk reduction are essential.
