?
Solved

Alternative for blue coats in the funtion about Proxy chain.

Posted on 2016-09-08
2
Medium Priority
?
39 Views
Last Modified: 2016-09-28
I need put an appliance in order to have a connection Proxy to proxy type proxy-chain(proxy instances IN and OUT) this connection will be with a bluecoat apliance, but bluecoat solution is very expense, so I am finding another appliance.
0
Comment
Question by:Walter Seballos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points (awarded by participants)
ID: 41792199
Probably some candidate include

F5 Network LTM which can do below
•An HTTP forward proxy using it iRule and iApp or SSL Forward Proxy
https://support.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-secure-web-gateway-implementations-11-5-0/5.html

Or via ZScalar services
https://support.zscaler.com/hc/en-us/articles/204943649-Configuring-Proxy-Chaining

But we need to take a balance approach as proxy chaining via multiple proxies add latency and also not most proxy servers may be deploy to support manual failover support  and resiliency level is lowered as each "chain" form the weakest link.
0
 
LVL 64

Expert Comment

by:btan
ID: 41819427
As proposed.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question