Networking Glossary for Proxy Users: 60+ Terms Explained
Working with proxies, web scraping, and data collection requires a solid understanding of networking fundamentals. This glossary covers the key networking terms you will encounter when configuring proxy servers, debugging connection issues, and building data collection infrastructure.
A
ACL (Access Control List)
A set of rules that define which traffic is allowed or denied through a network device. In proxy contexts, ACLs control which IPs can connect to the proxy and which destinations the proxy can reach.
ARP (Address Resolution Protocol)
Protocol that maps IP addresses to MAC (hardware) addresses on a local network. Not directly related to proxies but important for understanding how network devices discover each other on the same subnet.
ASN (Autonomous System Number)
A unique identifier assigned to a network operator (ISP, hosting provider, or large organization). ASN databases reveal whether an IP belongs to a datacenter, residential ISP, or mobile carrier — critical information for proxy type identification.
B
Bandwidth
The maximum rate of data transfer across a network connection, measured in bits per second (bps). Proxy bandwidth affects how quickly data can flow through the proxy. Metered proxies charge based on bandwidth consumed.
BGP (Border Gateway Protocol)
The protocol that routes traffic between autonomous systems on the internet. BGP determines the path your data takes across the internet. Understanding BGP helps explain why proxy latency varies between locations.
Binding
The process of associating a specific local IP address or port with a socket. In proxy servers, binding determines which network interface and port the proxy listens on for incoming connections.
C
CDN (Content Delivery Network)
A distributed network of servers that delivers web content from the server closest to the user. CDNs like Cloudflare, Akamai, and Fastly also provide security features including bot detection. Scraping CDN-protected sites often requires specialized approaches.
CIDR (Classless Inter-Domain Routing)
A method for allocating IP addresses and routing IP packets. CIDR notation like 192.168.1.0/24 represents a range of 256 IP addresses. Used to describe proxy pool sizes and IP subnet ranges.
Connection Pooling
Reusing existing network connections instead of creating new ones for each request. Connection pooling significantly improves proxy performance by avoiding the overhead of TCP handshakes and TLS negotiations for every request.
CORS (Cross-Origin Resource Sharing)
A browser security mechanism that restricts web pages from making requests to domains different from the serving domain. CORS headers control which origins can access resources. Not applicable when using proxies for server-side scraping.
D
DHCP (Dynamic Host Configuration Protocol)
Protocol that automatically assigns IP addresses to devices on a network. Residential proxies use IPs assigned by ISPs via DHCP, which is why they appear as legitimate home connections.
DNS (Domain Name System)
The system that translates domain names (example.com) to IP addresses (93.184.216.34). DNS resolution can reveal your identity if DNS queries bypass your proxy — known as a DNS leak.
DNS Leak
When DNS queries are sent outside the proxy tunnel, revealing which domains you are accessing. Proper proxy configuration routes DNS through the proxy or uses secure DNS (DoH/DoT) to prevent leaks.
DNS over HTTPS (DoH)
Encrypting DNS queries inside HTTPS connections for privacy. DoH prevents ISPs and network monitors from seeing which domains you are resolving.
E
Egress
Outbound network traffic from a network or server. In proxy terms, egress traffic flows from the proxy to the target website. Some cloud providers charge for egress bandwidth.
Ephemeral Port
A temporary port number assigned by the OS for outbound connections. Range typically 49152-65535. Each proxy connection uses an ephemeral port, and running out of ports limits concurrent connections.
F
Firewall
Network security device that monitors and controls incoming and outgoing traffic. Firewalls may block proxy connections on non-standard ports. Corporate firewalls often require HTTP proxy configuration for internet access.
FTP (File Transfer Protocol)
A protocol for transferring files between systems. Some proxy types support FTP traffic, though HTTP/HTTPS proxies do not. SOCKS5 proxies can handle FTP connections.
G
Gateway
A network device that serves as an entry/exit point between networks. A proxy server functions as an application-level gateway between client networks and the internet.
H
Handshake
The negotiation process when establishing a connection. TCP uses a three-way handshake (SYN, SYN-ACK, ACK). TLS adds additional handshake steps for encryption negotiation. Each handshake adds latency to proxied connections.
Header
Metadata included with HTTP requests and responses. Common headers include User-Agent, Accept, Cookie, Authorization, and proxy-specific headers like X-Forwarded-For and Proxy-Authorization.
HTTP (Hypertext Transfer Protocol)
The foundation protocol of the web. HTTP defines how clients request and servers respond with web content. HTTP proxies understand and can modify HTTP traffic.
HTTP/2
The second major version of HTTP. HTTP/2 introduces multiplexing (multiple requests over one connection), header compression (HPACK), and server push. HTTP/2 connections through proxies require the CONNECT method for tunneling.
HTTP/3
The third version of HTTP, built on QUIC (UDP-based transport). HTTP/3 offers improved performance on unreliable networks. Proxy support for HTTP/3 is still evolving.
I
ICMP (Internet Control Message Protocol)
Protocol used for diagnostic and error messages (ping, traceroute). Most proxies do not handle ICMP traffic, which is why you cannot ping through an HTTP proxy.
Ingress
Inbound network traffic entering a network or server. In proxy terms, ingress is traffic from clients connecting to the proxy server.
IP Address
A numerical label assigned to each device on a network. IPv4 addresses (e.g., 192.168.1.1) use 32 bits; IPv6 addresses use 128 bits. Proxies provide alternative IP addresses to mask your real one.
K
Keep-Alive
An HTTP feature that maintains a persistent connection between client and server across multiple requests. Keep-Alive reduces latency by avoiding repeated TCP/TLS handshakes. Critical for proxy performance optimization.
L
Latency
The time delay between sending a request and receiving the first byte of the response. Proxy latency includes the extra hops through the proxy server. Measured in milliseconds (ms). Typical proxy latency: 50-500ms depending on type.
Load Balancer
A device or service that distributes traffic across multiple servers. Proxy providers use load balancers to distribute requests across their proxy pool, ensuring even usage and preventing overload.
M
MAC Address
A hardware identifier assigned to network interface cards. Unlike IP addresses, MAC addresses are not transmitted beyond the local network and are not visible through proxies.
MTU (Maximum Transmission Unit)
The largest packet size that can be transmitted on a network segment. Default is 1500 bytes for Ethernet. Proxy tunneling may reduce effective MTU due to encapsulation overhead.
Multiplexing
Sending multiple data streams over a single connection. HTTP/2 multiplexing allows concurrent requests without opening multiple TCP connections, improving proxy efficiency.
N
NAT (Network Address Translation)
A technique that maps multiple private IP addresses to a single public IP. Mobile carriers use CGNAT (Carrier-Grade NAT), sharing one public IP among many subscribers — which is why mobile proxy IPs are shared and trusted.
Network Mask
A bitmask that divides an IP address into network and host portions. A /24 mask (255.255.255.0) creates a subnet of 256 addresses. Used to define proxy pool subnet ranges.
O
OSI Model
The seven-layer model of networking: Physical, Data Link, Network, Transport, Session, Presentation, Application. HTTP proxies operate at Layer 7 (Application), while SOCKS proxies operate at Layer 5 (Session).
P
Packet
A unit of data transmitted over a network. Packets include headers (routing info) and payload (actual data). Proxy servers receive, inspect, and forward packets between clients and destinations.
Port
A logical endpoint for network communication. Well-known ports: HTTP (80), HTTPS (443), SOCKS (1080). Proxy servers typically listen on specific ports (e.g., 8080, 3128).
R
Round-Trip Time (RTT)
The time for a packet to travel from source to destination and back. RTT is a key metric for proxy performance. Lower RTT means faster response times.
Routing
The process of selecting paths for network traffic. Internet routing uses BGP between autonomous systems. Proxy routing adds an intermediate hop between client and destination.
S
Socket
An endpoint for network communication combining an IP address and port number. Proxy servers create sockets to listen for client connections and to connect to target servers.
SSL/TLS
Secure Sockets Layer / Transport Layer Security. Cryptographic protocols that encrypt network communications. HTTPS uses TLS. Proxy servers handle TLS through either CONNECT tunneling or TLS termination.
Subnet
A logically visible subdivision of an IP network. Subnets are identified by CIDR notation. Proxy providers often sell access to specific subnets.
T
TCP (Transmission Control Protocol)
A reliable, connection-oriented transport protocol. TCP guarantees ordered delivery of data. HTTP, HTTPS, and most proxy protocols run over TCP.
Throughput
The actual rate of successful data transfer, measured in bytes per second. Differs from bandwidth (maximum capacity). Proxy throughput depends on the proxy server’s processing power, network quality, and target server response speed.
Timeout
The maximum time a client waits for a response before considering the request failed. Proxy timeouts should be set higher than direct connection timeouts to account for additional routing delay.
Traceroute
A network diagnostic tool that shows the path packets take between source and destination. Traceroute reveals intermediate hops including proxy servers. Not all proxies are visible in traceroute results.
U
UDP (User Datagram Protocol)
A connectionless transport protocol that trades reliability for speed. Used by DNS, gaming, and streaming. SOCKS5 proxies support UDP relay; HTTP proxies do not.
URL (Uniform Resource Locator)
The address of a web resource (e.g., https://example.com/path?query=value). HTTP proxy requests include the full URL; HTTPS proxy requests use the CONNECT method with only the hostname.
V
VLAN (Virtual Local Area Network)
A logical network segment within a physical network. VLANs isolate traffic groups. Datacenter proxy infrastructure may use VLANs to separate proxy pools.
VPN (Virtual Private Network)
An encrypted tunnel between your device and a VPN server. Unlike proxies, VPNs encrypt all traffic at the OS level. See our proxy vs VPN comparison.
W
WebSocket
A protocol providing full-duplex communication over a single TCP connection. WebSockets are used for real-time applications. Some proxies support WebSocket connections; CONNECT-based proxies handle them transparently.
X
X-Forwarded-For
An HTTP header added by proxies to identify the originating client IP. Transparent and anonymous proxies may include this header. Elite/high-anonymity proxies do not add this header.
FAQ
What networking knowledge do I need for proxy configuration?
At minimum, understand IP addresses, ports, DNS, HTTP/HTTPS, and TCP. For advanced proxy setups, familiarity with TLS, SOCKS protocol, and network routing helps significantly.
Why does my proxy connection time out?
Common causes: firewall blocking the proxy port, proxy server down, incorrect authentication, DNS resolution failure, or the proxy server being too far away geographically. Check each component systematically.
What is the difference between TCP and UDP in proxy contexts?
TCP provides reliable, ordered delivery and is used by HTTP, HTTPS, and most web traffic. UDP is faster but unreliable, used by DNS, gaming, and streaming. HTTP proxies only handle TCP. SOCKS5 proxies can handle both TCP and UDP.
- Anti-Bot Detection Glossary: 50+ Terms Defined
- Anti-Bot Terminology Glossary: Complete A-Z Reference 2026
- Backconnect Proxies Deep Dive: Architecture and Real-World Performance
- Best Proxies in Southeast Asia: Singapore, Thailand, Indonesia, Philippines
- How to Build a 4G/5G Mobile Proxy Farm with Raspberry Pi
- How to Configure a Proxy in FoxyProxy for Firefox
- Anti-Bot Detection Glossary: 50+ Terms Defined
- Anti-Bot Terminology Glossary: Complete A-Z Reference 2026
- Backconnect Proxies Deep Dive: Architecture and Real-World Performance
- Best Proxies in Southeast Asia: Singapore, Thailand, Indonesia, Philippines
- How to Build a 4G/5G Mobile Proxy Farm with Raspberry Pi
- How to Configure a Proxy in FoxyProxy for Firefox
- Anti-Bot Detection Glossary: 50+ Terms Defined
- Anti-Bot Terminology Glossary: Complete A-Z Reference 2026
- 403 Forbidden Error: What It Means & How to Fix It
- 407 Proxy Authentication Required: Fix Guide
- Backconnect Proxies Deep Dive: Architecture and Real-World Performance
- Best Proxies in Southeast Asia: Singapore, Thailand, Indonesia, Philippines
Related Reading
- Anti-Bot Detection Glossary: 50+ Terms Defined
- Anti-Bot Terminology Glossary: Complete A-Z Reference 2026
- 403 Forbidden Error: What It Means & How to Fix It
- 407 Proxy Authentication Required: Fix Guide
- Backconnect Proxies Deep Dive: Architecture and Real-World Performance
- Best Proxies in Southeast Asia: Singapore, Thailand, Indonesia, Philippines