22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.1.4 Proxy servers<br />

Application proxies<br />

Application-level proxies were developed to provide more sophisticated levels of<br />

security. Application-level proxies stand between two networks and relay data<br />

between clients on one network to servers in the other. Instead of a direct<br />

connection between internal and external networks, application-level proxies<br />

typically serve as a middleman for Internet services. The proxy intercepts all<br />

traffic and relays packets of data back and forth between the client application<br />

and the server-based application. Application-level proxy technology can serve<br />

important security roles in the infrastructure. Application proxies fall into two<br />

categories: reverse proxies for inbound connections, and forward proxies for<br />

outbound connections. We discuss these two types of application proxies later in<br />

this section.<br />

Proxy servers are somewhat unique in that they perform network separation<br />

functions like a firewall, yet they might also behave like a server from a user’s<br />

point of view. As previously mentioned, a proxy can perform at either a session<br />

level (layer 4) or an application level (layer 7). Some firewall products provide<br />

session-level proxy capabilities, but as a general rule, application-level proxies<br />

are dedicated systems. Because application-layer proxies inspect all packets<br />

including the application data “payload,” the throughput performance of an<br />

application proxy will be considerably less than a packet or stateful packet<br />

filtering router.<br />

Proxies can work in different directions, although they are usually dedicated to a<br />

single client-server data flow direction. In order to make sense of the proxy<br />

nomenclature, remember that it is based on the internal network as the reference<br />

point of view.<br />

Reverse proxies<br />

Reverse proxies were developed to meet a need to provide access from<br />

external networks (the Internet) into corporate resources. They facilitate the<br />

elimination of data storage from outer network zones. A multi-zone<br />

architecture is discussed later in this chapter. A reverse proxy basically<br />

handles incoming requests from external clients, then performs the request<br />

against the back-end application server on behalf of the client. The client<br />

never directly connects to the destination service or application.<br />

Forward proxies<br />

Forward proxies were developed to control access from workstations within<br />

the corporate controlled network to services on external networks. Similar to a<br />

reverse proxy, the internal client request goes to the forward proxy, which<br />

then passes the request on to the external service.<br />

Chapter 4. Security components and layers 127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!