Types of Proxies | Inside Network Perimeter Security (2nd Edition)

Responsive image
source