Solved

Proxy architecture

Posted on 2014-03-26
1
234 Views
Last Modified: 2014-03-26
I am assuming in most cases that there is an app within the firewall, and a proxy agent that is in the DMZ.  The app sends datat to the proxy agent, the proxy agent then sends the data to another proxy agent accross the pond.

Therefore apps usually require a separate proxy agent (third party or other) to actually provide proxy support

Is this correct
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39957035
pretty much. a proxy is a specific piece of software, albeit one that can be a "feature" of another package (for instance, almost all ssh servers are also socks 4a proxies and sftp file servers) which must be explicitly connected to by the app, and requested to forward the connection to its final destination.

however, many apps have inherent proxy support - web browsers being the most obvious. you can also "proxy enable" a non-proxy app by using a separate client, which acts as a wrapper to the main app (usually overriding the standard winsock.dll); this is most usual with a socks proxy, and the app is then said to be "socksified"
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Ready for our next Course of the Month? Here's what's on tap for June.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question