?
Solved

Proxy architecture

Posted on 2014-03-26
1
Medium Priority
?
246 Views
Last Modified: 2014-03-26
I am assuming in most cases that there is an app within the firewall, and a proxy agent that is in the DMZ.  The app sends datat to the proxy agent, the proxy agent then sends the data to another proxy agent accross the pond.

Therefore apps usually require a separate proxy agent (third party or other) to actually provide proxy support

Is this correct
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 2000 total points
ID: 39957035
pretty much. a proxy is a specific piece of software, albeit one that can be a "feature" of another package (for instance, almost all ssh servers are also socks 4a proxies and sftp file servers) which must be explicitly connected to by the app, and requested to forward the connection to its final destination.

however, many apps have inherent proxy support - web browsers being the most obvious. you can also "proxy enable" a non-proxy app by using a separate client, which acts as a wrapper to the main app (usually overriding the standard winsock.dll); this is most usual with a socks proxy, and the app is then said to be "socksified"
0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses
Course of the Month14 days, 14 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question