?
Solved

Tunneling and Proxy support for Apache shops

Posted on 2014-03-27
4
Medium Priority
?
231 Views
Last Modified: 2014-03-27
For Apache software behind a DMZ, what products would be a good choice for proxy or tunneling services.

Does Apache itself provide this.  I was reading about Apache Common Proxy, but it seemed like more of an interface, rather than an executable agent
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 

Author Comment

by:Anthony Lucia
ID: 39959382
I edited the title, meant to say 'shops'
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39959422
depends on what you want to do. I have a solution on hand where a tunnel is set up from a linux host to another linux host, and the mod_proxy module used to alias http://server/otherserver/ to http://localhost:tunnel/ so that requests are forward on to another server (that is out-of-the-box apache, with a bit of scripting to restart the tunnel if it drops)
0
 

Author Comment

by:Anthony Lucia
ID: 39959480
What apache app performs that.   Is it the apacher server itself, or a separate module altogether.  How would I invoke this.  Could it be used by ActiveMQ or other apache products.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 2000 total points
ID: 39959566
it is the apache module mod_proxy and hence part of the httpd.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month14 days, 2 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question