This kind of proxy understands all the commands that can pass through the proxy. Command-aware proxies allow legitimate commands and reject commands that are not legitimate. Commands are logged and the proxy may filter the commands. The filters may be controlled by the administrator. In-protocol challenges are possible. Note: the results and/or data transfers associated with the commands are not logged or filtered.