Give the internal user the illusion that she/he accesses to the exterior server
But intercepts the traffic to the server, analyzes the packets (checks the compliance with the protocol, searches for keywords, etc.), logs the requests
Using proxies (II)
Advantage
knowledge of the service/protocol => efficiency and « intelligent » filtering