Part of the Network software glossary:

In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.

A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server , looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.



Sun fixes flaw in Java proxy server
Sun Microsystems has fixed buffer overflow vulnerabilities in the Java System Web Proxy Server. Attackers could use the problem to remotely crash machines ...

What are the best ways to block proxy server sites?
Learn how to enhance enterprise security and detect and block proxy server sites with content monitoring tools and also how to activate company filters.

What is terminal proxy server? – a definition from
A terminal proxy server (TPS) is a program that acts as an interface for voice over Internet Protocol (VoIP) telephone sets.

How to configure reverse proxy in ESS portal?
A single URL is defined. We wish to have employees access travel thru EP. Reverse proxy and Webdipatcher configuration have some problem ...

This was last updated in December 2008
Posted by: Margaret Rouse

Related Terms



  • Network software

    - Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

  • Internet applications

    - This glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Is it possible to use DNS caching in Linux?

    Normally, the proxy client will forward the whole url to the proxy server. So it's the proxy server resolve the domain name. And the proxy server will use his own dns cache or os dns cache is depen...

  • Fixing a proxy server

    You need to install a proxy software on your computer, and make port forward rule in the router if your computer is behind the router. 

  • How do I build proxy server for WLAN.

    That's because the upper proxy server stop service at 6pm - 6am. I don't think you can get it work under this way. You can try install a proxy software on one PC that can access Internet at any tim...

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.