22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5. Proxies<br />

5<br />

The separation of security zones is a key concept in the secure deployment of<br />

applications within a given infrastructure. Typically, security zones are separated<br />

by instruments like firewalls that prevent all non explicitly authorized traffic<br />

between zones. However, another method to control access in and out of trusted<br />

network zones is through the use of a proxy server.<br />

A proxy server (also known as an application gateway) is an application that<br />

mediates traffic between a trusted network and an untrusted network. This does<br />

not remove the need for a firewall to manage the traffic at an IP level, but<br />

provides for an application-level firewall.<br />

This chapter describes the different classes and categories of proxies, not just<br />

classifying them based on their intrinsic characteristics, but primarily by their<br />

possible usage in different topologies. It is the positioning and purpose of the<br />

proxy function that will indicate what products or instruments to use and how to<br />

configure them.<br />

© Copyright <strong>IBM</strong> Corp. 2004. All rights reserved. 165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!