22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

When looking at it in this simple manner, proxies really exists in many different<br />

products. For example, most portal technologies that are readily available today<br />

request content on behalf of the user and assemble the content into a single<br />

“portal view.” The Notes “passthru” that has existed in Lotus Notes for a number<br />

of years and that allowed remote access into Notes environments during the<br />

early Internet years is another example of a proxy. Nevertheless, we will focus on<br />

standalone proxy products for the rest of this section because the most generally<br />

accepted best practice today is to use standalone proxy services.<br />

5.3 Types of proxies<br />

5.3.1 Forward proxies<br />

This section defines the various types of proxies that exist in the marketplace,<br />

and in the average infrastructure. As stated earlier, it is common that a given<br />

proxy product will actually implement or support multiple types of proxy services.<br />

For example, a proxy server may provide caching and authentication capabilities<br />

in addition to the basic application proxying. However, we will treat these key<br />

capabilities of proxies as separate proxy types to simplify this discussion.<br />

The key proxy types that we define and discuss in this section are:<br />

► Forward proxies<br />

► Transparent proxies<br />

► Caching proxies<br />

► Security proxies<br />

► Reverse proxies<br />

A forward proxy is a proxy that serves users from one security zone by fulfilling<br />

requests for content from the “next” zone, following a direction that is typically,<br />

but not necessarily, outbound (that is, the client is inside and the server is<br />

somewhere in the open Internet).<br />

From a security point of view, a simple proxy has the security goal of hiding the<br />

identity (in internal network topology terms) of the requester user workstation or<br />

process. It can also be used to mask out some other attributes of the user<br />

session.<br />

A typical example of the type is the corporate proxies that serve internal users,<br />

allowing them to access external sites for Web browsing or any other kind of<br />

Internet connectivity.<br />

Chapter 5. Proxies 167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!