Monitoring/Blocking (Proxy) mode enables the Database Firewall to both monitor and block SQL traffic, as well as optionally substitute SQL statements.

You configure clients to connect to the Database Firewall instead of the database so that the firewall can intercept all SQL traffic and take the necessary actions, based on policies that you define. In all cases, the database server identifies the Database Firewall as the client.

Oracle recommends that you configure the database to reject all connections that do not come from the Database Firewall.

You can deploy the Monitoring/Blocking (Proxy) mode in the following ways:

When you deploy the Database Firewall as a proxy without network separation, the Database Firewall has one NIC called the Database Firewall management interface, which handles all communication between the clients and databases, as well as between the Database Firewall and the Audit Vault Server. This NIC is deployed in the management subnet.

The example in this diagram has three subnets:

The following letter callouts describe how traffic flows to and from the Database Firewall in the diagram:

When you deploy the Database Firewall as a proxy without network separation using a dedicated NIC, the Database Firewall has two NICs:

The example in this diagram has three subnets:

The following letter callouts describe how traffic flows to and from the Database Firewall in the diagram:

When you deploy the Database Firewall as a proxy with network separation, the Database Firewall has a minumum of three NICs:

The example in this diagram has three subnets:

The following letter callouts describe how traffic flows to and from the Database Firewall in the diagram: