Solved

Proxy architecture

Posted on 2014-03-26
1
225 Views
Last Modified: 2014-03-26
I am assuming in most cases that there is an app within the firewall, and a proxy agent that is in the DMZ.  The app sends datat to the proxy agent, the proxy agent then sends the data to another proxy agent accross the pond.

Therefore apps usually require a separate proxy agent (third party or other) to actually provide proxy support

Is this correct
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39957035
pretty much. a proxy is a specific piece of software, albeit one that can be a "feature" of another package (for instance, almost all ssh servers are also socks 4a proxies and sftp file servers) which must be explicitly connected to by the app, and requested to forward the connection to its final destination.

however, many apps have inherent proxy support - web browsers being the most obvious. you can also "proxy enable" a non-proxy app by using a separate client, which acts as a wrapper to the main app (usually overriding the standard winsock.dll); this is most usual with a socks proxy, and the app is then said to be "socksified"
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now