Results 1 to 6 of 6

Thread: How to use of reverse proxy technology to protect Web servers

  1. #1
    Join Date
    Feb 2010
    Posts
    178

    How to use of reverse proxy technology to protect Web servers

    With the Internet's development, many institutions have their own internal network will be connected to the Internet, and therefore network security issues become increasingly important. So I need to know the existing firewall technology and its limitations. What is reverse proxy mode and how to use of reverse proxy technology to protect Web servers?

  2. #2
    Join Date
    May 2008
    Posts
    2,792

    Increase network security

    In order to increase network security and the protection of important data on the internal network needs to be isolated from the internal network and Internet, the current primarily through firewall technology to accomplish this purpose. However, in order to protect the internal host, the firewall software will have to limit the external network access to hosts on the internal network. Therefore, common firewall software settings, the external network cannot access the internal hosts. However, in order outward publish their own information; you need to allow external network access to Web servers. The simplest approach is to put Web server outside the firewall, so that Web servers and internal network will be separate, Web server exposed to the network externalities, it may move paralyzed by the attack which led to a server or web page was changed and so the potential.

  3. #3
    Join Date
    Apr 2008
    Posts
    2,572

    Re: How to use of reverse proxy technology to protect Web servers

    According to me the current, Web server, the above information has become increasingly diverse and important, Web server, the importance is also obvious. Therefore, the need to use a firewall to protect it, if you want to put Web server inside the firewall, you need a firewall support. There are two main types of the current firewalls, one for packet filtering type firewall, the firewall for each IP packet identify whether it meets the filtering rules set by the administrator, to meet certain requirements was only the correct forwarding. You can use the filtering rules, including the source and destination host name and IP address, port address, using the web interface, as well as IP packet type.

  4. #4
    Join Date
    Oct 2005
    Posts
    2,358

    Re: How to use of reverse proxy technology to protect Web servers

    Another type of firewall for the application proxy type of firewall, the firewall for each application protocol to provide the corresponding agency services, from the proxy server to access the network, and the results returned to the client. The standard http protocol proxy service, the client's browser must be configured proxy server IP address, cannot require other external hosts to access the internal hosts on the network re-set the proxy server's address.
    I'm the Proud Owner of the most dangerous weapon
    known to man kind: Human Brain

  5. #5
    Join Date
    May 2008
    Posts
    2,134

    Proxy server does not distinguish between the external network and internal network

    The proxy server does not distinguish between the external network and internal network. But the proxy server using the Internet on a Web server, name resolution to determine the location of, and are usually used within the firewall internal address, which also determines the general Proxy Firewall does not support the external network to the internal Web the server's http request for a visit. Therefore, a simple shielding to common proxy server to access the external address, so the simplest of the external release of information to protect Web servers is to use packet filtering type firewall.

  6. #6
    Join Date
    Apr 2008
    Posts
    2,277

    Re: How to use of reverse proxy technology to protect Web servers

    Once the host allows external network to the internal network can initiate connection requests, an attacker could try to connect outside the network, which increases the attack attacked the way the internal network, reducing the safety factor of the entire network. If you do not allow the external host to initiate the internal network connection request. An attacker can only attack in the external use of technologies such as Trojan horses, or IP spoof, these methods take the initiative launched in connection with the attack. There are no ready-made tools for use, so makes the significant increase in the complexity of the attack, so the network has been greatly reduced the likelihood of attacks is almost impossible.

Similar Threads

  1. How to trace proxy servers?
    By Mellen!camp in forum Networking & Security
    Replies: 1
    Last Post: 20-11-2011, 08:44 PM
  2. Reverse proxy issue with two web servers
    By Talish in forum Operating Systems
    Replies: 6
    Last Post: 27-01-2011, 07:46 PM
  3. Different types of Proxy Servers
    By Inigo in forum Networking & Security
    Replies: 4
    Last Post: 08-01-2011, 07:07 PM
  4. Reverse proxy for internal requests ?
    By dlaperle in forum Networking & Security
    Replies: 4
    Last Post: 07-10-2010, 06:23 PM
  5. Replies: 3
    Last Post: 24-10-2009, 12:24 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,133,074.88045 seconds with 16 queries