Solved

Tunneling and Proxy support for Apache shops

Posted on 2014-03-27
4
225 Views
Last Modified: 2014-03-27
For Apache software behind a DMZ, what products would be a good choice for proxy or tunneling services.

Does Apache itself provide this.  I was reading about Apache Common Proxy, but it seemed like more of an interface, rather than an executable agent
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 

Author Comment

by:Anthony Lucia
ID: 39959382
I edited the title, meant to say 'shops'
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 39959422
depends on what you want to do. I have a solution on hand where a tunnel is set up from a linux host to another linux host, and the mod_proxy module used to alias http://server/otherserver/ to http://localhost:tunnel/ so that requests are forward on to another server (that is out-of-the-box apache, with a bit of scripting to restart the tunnel if it drops)
0
 

Author Comment

by:Anthony Lucia
ID: 39959480
What apache app performs that.   Is it the apacher server itself, or a separate module altogether.  How would I invoke this.  Could it be used by ActiveMQ or other apache products.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39959566
it is the apache module mod_proxy and hence part of the httpd.
0

Featured Post

Are You Ransomware's Next Victim?

Worried about ransomware attacks hitting your organization?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with WatchGuard Total Security!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question