lAll
external access can be forced to go through the proxy, creating a single access
and control point
lRequests
for certain sites can be restricted or banned
lAll
documents being transferred can be logged with the IP address of the requesting
machine. Any disputed can be solved easily)
lOnly
the IP address of the proxy will be known to outsiders, preventing bad
hackers from knowing the IP addresses of corporate machines