> Can someone explain the operation of a transparent proxy? I thought either
> the application had to be modified (i.e. made proxy aware) or an interim
> step of connecting directly to the firewall was necessary for all
> application firewalls.
Some firewall products -- such as the Gauntlet Internet Firewall --
support transparency through the firewall (usually as part of an
optional set-up). This means usually and typically exactly what it
says. Internal hosts and client software and users interact -- for all
supported services -- as if the firewall was not there. In the case of
the Gauntlet Internet Firewall, The firewall *looks* like it is acting
as a router (or packet screen), but in fact the firewall is
intercepting the connection request and firing up the appropriate
application gateway program.