[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Alternative for blue coats in the funtion about Proxy chain.

Posted on 2016-09-08
2
Medium Priority
?
54 Views
Last Modified: 2016-09-28
I need put an appliance in order to have a connection Proxy to proxy type proxy-chain(proxy instances IN and OUT) this connection will be with a bluecoat apliance, but bluecoat solution is very expense, so I am finding another appliance.
0
Comment
Question by:Walter Seballos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points (awarded by participants)
ID: 41792199
Probably some candidate include

F5 Network LTM which can do below
•An HTTP forward proxy using it iRule and iApp or SSL Forward Proxy
https://support.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-secure-web-gateway-implementations-11-5-0/5.html

Or via ZScalar services
https://support.zscaler.com/hc/en-us/articles/204943649-Configuring-Proxy-Chaining

But we need to take a balance approach as proxy chaining via multiple proxies add latency and also not most proxy servers may be deploy to support manual failover support  and resiliency level is lowered as each "chain" form the weakest link.
0
 
LVL 65

Expert Comment

by:btan
ID: 41819427
As proposed.
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
How does someone stay on the right and legal side of the hacking world?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question