29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> Proxy<br />

The <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> Proxy is a proxy server you configure in a<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> Network Deployment cell. This proxy runs inside<br />

the secure zone of the network as an application server and has access to cell<br />

information and the current state of all servers and applications inside the cell.<br />

5.2.3 Domain and protocol firewall<br />

A firewall is a hardware and software system that manages the flow of<br />

information between networking zones like the Internet and an organization's<br />

private network. Firewalls can prevent unauthorized Internet users from<br />

accessing services on private networks that are connected to the Internet,<br />

especially intranets. In addition, firewalls can block some virus attacks, if those<br />

viruses attacks have to cross the network boundaries protected by the firewall.<br />

Another typical usage of firewalls is to prevent denial of service attacks against<br />

services.<br />

A firewall can separate two or more parts of a local network to control data<br />

exchange between departments, network zones, and security domains.<br />

Components of firewalls include filters or screens, each of which controls<br />

transmission of certain classes of traffic. Firewalls provide the first line of defense<br />

for protecting private information. Comprehensive security systems combine<br />

firewalls with encryption and other complementary services, such as content<br />

filtering and intrusion detection.<br />

Firewalls control access from a less trusted network to a more trusted network.<br />

Traditional firewall services include the following implementations:<br />

► Screening routers (the protocol firewall)<br />

Prevents unauthorized access from the Internet to the DMZ. The role of this<br />

node is to provide the Internet traffic access only on certain ports and to block<br />

other IP ports.<br />

► <strong>Application</strong> gateways (the domain firewall)<br />

Prevents unauthorized access from the DMZ to an internal network. The role<br />

of a firewall allows the network traffic originating from the DMZ and not from<br />

the Internet. It also provides some filtering from the intranet to the DMZ. A pair<br />

of firewall nodes provides increasing levels of protection at the expense of<br />

increasing computing resource requirements. The protocol firewall is typically<br />

implemented as an IP router.<br />

136 <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong>: <strong>Concepts</strong>, Planning, and Design

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!