18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8<br />

Proxy basics<br />

Figure 8-1. Example<br />

<strong>Sidewinder</strong> <strong>G2</strong> proxy<br />

connection<br />

8-2 Configuring Proxies<br />

Important: There is a security risk involved with using UDP proxies. Unlike TCP, UDP<br />

does not ensure address integrity. This makes it possible for a hacker to fake the source<br />

address for some dubious purpose.<br />

A proxy is not a server on your <strong>Sidewinder</strong> <strong>G2</strong>. Rather, a proxy<br />

controls access to a server on the other side <strong>of</strong> your <strong>Sidewinder</strong> <strong>G2</strong>.<br />

Also, a proxy can only access the kind <strong>of</strong> server that it represents. For<br />

example, as shown in Figure 8-1, a Telnet proxy can access only<br />

Telnet servers; it cannot access a Web Proxy server (or any other kind<br />

<strong>of</strong> server).<br />

Telnet client<br />

internal<br />

network<br />

Telnet<br />

proxy<br />

<strong>Sidewinder</strong><br />

<strong>G2</strong><br />

external<br />

network<br />

Telnet server<br />

Proxies can control connections between any two Type Enforced<br />

network areas, regardless <strong>of</strong> whether the areas are internal or<br />

external. The rules that you define in the active proxy rule group (see<br />

Chapter 4) determine how the networks connected to the <strong>Sidewinder</strong><br />

<strong>G2</strong> are allowed to communicate. The most common proxy directions,<br />

internal burb-to-external burb and external burb-to-internal burb, are<br />

explained below.<br />

internal burb-to-external burb<br />

The proxy connections you configure on the <strong>Sidewinder</strong> <strong>G2</strong> will<br />

typically be outbound (internal-to-external) connections. All data<br />

packets traveling out through your <strong>Sidewinder</strong> <strong>G2</strong> will appear to<br />

come from the external address <strong>of</strong> your <strong>Sidewinder</strong> <strong>G2</strong>. That is,<br />

the address <strong>of</strong> the network in the internal burb is not seen in the<br />

packet information on the external burb.<br />

external burb-to-internal burb<br />

A proxy can also be set up for inbound (external-to-internal) connections.<br />

In general, inbound proxies are not desirable for security<br />

reasons (see the "Important" note below). There are, however, certain<br />

configuration options you can use such as encryption, authentication,<br />

and address or port redirection that make an inbound<br />

proxy more secure. (These options are covered in more detail later<br />

in this chapter.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!