Hello sir,
I understood the proxy created in between the client and the server that only accepts the request from the Dual-Home firewalls in place.
My question is, how can an attacker sitting in the same network (kind of like MiTM) create or enforce this settings so that he/she gets all decrypted client's request and server's response in real time. Can it be abused, even if it could, how will the client's browser not show the IP/location of the proxy, and still think it is the server that they are talking to?
Your insights on this will be greatly appreciated.