JSCAPE
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Pricing
  • Company
    • Blog
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
  • Support
    • Help Desk
    • Documentation
    • Customer Downloads
Get a demo

What to consider when setting up DMZ’s reverse proxy & firewall

Words by

John V.

There are a number of things to consider when setting up the reverse proxy and firewalls in your DMZ. These things are going to have a significant impact on the performance and security not only on your file transfers but for your entire network in general, so you really need to weigh the advantages and…

Published in:

Blog

/

FTP, JSCAPE MFT, Reverse Proxy, Secure File Transfer

There are a number of things to consider when setting up the reverse proxy and firewalls in your DMZ. These things are going to have a significant impact on the performance and security not only on your file transfers but for your entire network in general, so you really need to weigh the advantages and disadvantages of each set up before deciding how you are going to put everything together. Let’s talk about it when you request a free trial.

Effects of implementing NAT

Implementing NAT (Network Address Translation) on your firewalls might seem like a good way to improve security in your DMZ and internal network. For example, by referencing your hosts (including your reverse proxy) using static NAT, you can make it difficult for a potential attacker to obtain vital information about your DMZ and internal network’s infrastructure.

However, NAT also has a couple of disadvantages. Ironically, one of those disadvantages has something to do with security. You see, NAT cannot get along well with some encryption technologies. This is because NAT works by making certain changes to data packets. Specifically, it changes IP addresses and checksums. But if the packet is encrypted, NAT may not be able to do what it’s supposed to do.

Another disadvantage of NAT is that it can contribute to latency, which can slow down your file transfers. There are two instances in a NAT process that can add to latency: 1) When it looks up the NAT table for a match and 2) When it modifies the packet to perform the address translation.

Lastly, NAT can have problems with protocols like FTP and FTPS, which use more than one connection. You’ll have more success if you use SFTP. If you want a more thorough explanation regarding the issues between FTP and firewalls, please read the article Active vs Passive FTP Simplified.

What firewall architecture should you use?

There are two common firewall architectures to choose from. One is the single-firewall architecture, while the other is the dual-firewall architecture.

Single Firewall Architecture

single firewall architecture resized 600

Dual Firewall Architecture

dual firewall architecture resized 600

Obviously, the dual-firewall architecture is going to be more expensive and more complex to manage. The main advantage it offers is that, if the two firewalls are from different vendors and of different models, it would be more difficult for an attacker to break into your internal network.

Each firewall would have its own pecularities and technicalities, thus any person who would like to break through would have to be adept at two different sets of attack methods.

How should you set your DMZ firewall rules?

Regardless which architecture you want to use, you should make sure your DMZ firewall(s) and your reverse proxy are configured to work together. Ideally, firewall rules meant to control relevant traffic flowing from the Internet to the DMZ should be configured in such a way that they would all flow into the reverse proxy.

Your DMZ reverse proxy could then be set to allow only certain protocols to pass through and to connect to specific hosts in your internal network. With this configuration, the reverse proxy would serve as a single point of access to those internal hosts and thus make security implementation easier.

Lastly, firewall rules meant for traffic flowing from the DMZ to your internal network should be configured in such a way that only traffic coming from the reverse proxy and directed at certain servers in your internal network are allowed to pass through. All other packets must be rejected.

Here’s a simplified diagram of the ideal traffic flow.

ideal traffic through reverse proxy

Summary

In this post, we talked about the things you would need to consider when setting up your DMZ’s firewalls and reverse proxy server. We covered NAT-related issues, firewall rules, and firewall architectures.

Looking for a reverse proxy?

JSCAPE MFT Gateway comes with a fully-functional evaluation edition which you can request right now.

Fill out a short form to be eligible for a free trial.

Easy To Deploy, Easy To Administer, Easy To Manage

Ready to see how JSCAPE makes managed file transfer so much simpler? Schedule your demo now.

Request a demo

Popular Articles

View more by

JSCAPE
  •  
    1–2 minutes
    23/09/2025

    JSCAPE by Redwood, version 2025.3: New UI continues to make a splash

    Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive. 

    Read article

  •  
    1–2 minutes
    19/08/2025

    Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline

    The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of international tariffs throughout 2025, have…

    Read article

  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    23/07/2025

    Avoid downtime and threat actors: Getting the best of both worlds in MFT

    For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT software vulnerabilities to prevent breaches…

    Read article

Related Content

Read more about

JSCAPE MFT
  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    03/07/2025

    Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times

    Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are compelling enterprise organizations to reevaluate…

    Read article

  •  
    1–2 minutes
    31/03/2025

    SFTP vs. FTPS: Which file transfer software is best for business use?

    What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage…

    Read article

  •  
    1–2 minutes
    25/03/2025

    EDI integration with trading partners: 6 best practices

    Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI).…

    Read article

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Cookie Settings