18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Redirected proxy connections<br />

8-6 Configuring Proxies<br />

You can set up proxy rules to redirect a connection between an<br />

external client and the external side <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong> to a system<br />

inside your network. This rerouted connection to the internal host<br />

system hides the actual destination from the system requesting the<br />

connection. You can configure <strong>Sidewinder</strong> <strong>G2</strong> proxy rules to translate<br />

connection requests to different addresses or to different ports within<br />

the internal network.<br />

The address or port translation provided by redirection is usually<br />

needed when enabling proxying from the external network to the<br />

internal network. The following section provides examples <strong>of</strong> both<br />

address and port redirection as supported by the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

Important: All proxies pose a security risk. As with any external-to-internal proxy, while<br />

you can guarantee the integrity <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong>, you cannot guarantee the integrity<br />

<strong>of</strong> the system for which an external user will have access. For the rare occasion where you<br />

configure an inbound proxy, you should always use a strong authentication method.<br />

Address redirection<br />

If you need to configure a proxy that allows access to the internal<br />

network, but do not want to provide routes to the internal network<br />

you will need to configure the <strong>Sidewinder</strong> <strong>G2</strong> for address redirection.<br />

Address redirection is implemented in the Source/Dest tab <strong>of</strong> the Rule<br />

window on a per-rule basis. See Chapter 7 for information on<br />

configuring address redirection.<br />

In the configuration shown in Figure 8-2, suppose you want to allow<br />

any host in the Internet to Telnet to host 172.25.5.5 on the internal<br />

network.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!