18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 9: Configuring Proxies<br />

Proxy basics<br />

<strong>of</strong> your <strong>Sidewinder</strong> <strong>G2</strong>. That is, the address <strong>of</strong> the network in the internal<br />

burb is not seen in the packet information on the external burb.<br />

• external burb-to-internal burb<br />

A proxy can also be set up for inbound (external-to-internal) connections. In<br />

general, inbound proxies are not desirable for security reasons (see the<br />

"Important" note below). There are, however, certain configuration options<br />

you can use such as encryption, authentication, and address or port redirection<br />

that make an inbound proxy more secure. (These options are covered<br />

in more detail later in this chapter.)<br />

Important: Network attacks using “sniffer” programs to steal users’ accounts<br />

and passwords are frequent on the Internet. To prevent such intrusions, you<br />

should use a strong authentication method (such as those described in Chapter<br />

10) that prevent an attacker from gaining account information. However, attacks<br />

can still use sniffers to compromise your data. By encrypting your network<br />

transmissions and using proxy redirection, you can provide further defense<br />

against network attacks.(Strong Cryptography is a premium feature).<br />

Configuring advanced proxy parameters on a per-rule<br />

basis using Application Defenses<br />

The Proxy window allows you to configure the basic proxy properties and<br />

enable them in the appropriate burbs. Proxy rules allow you to determine<br />

whether proxy access will be allowed or denied and under what conditions. By<br />

adding Application Defenses to your rules, you can specify advanced,<br />

application-specific proxy properties (such as MIME/anti-virus filtering, SSL<br />

decryption, and timeout properties) on a per-rule basis. For information on<br />

configuring Application Defenses and rules for proxies, see Chapter 6 and<br />

Chapter 8.<br />

Improving performance using Fast Path Sessions<br />

The <strong>Sidewinder</strong> <strong>G2</strong> supports a Fast Path Sessions option that improves<br />

system performance by lessening the load placed on the system kernel when<br />

passing proxy data through the <strong>Sidewinder</strong> <strong>G2</strong>. Performance is improved on<br />

the <strong>Sidewinder</strong> <strong>G2</strong> when the Fast Path Sessions option is enabled for<br />

protocols that use many small packets, such as Telnet.<br />

The Fast Path Session option is configured in the Application Defenses<br />

windows in the Connections area. Application Defenses can be configured in<br />

advance and added to rules later, or they can be created directly within a rule.<br />

For information on configuring Fast Path Session options, see “Configuring<br />

connection properties” on page 203.<br />

245

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!