Summary


In this chapter, we have examined the various ways that proxy technology can be used to secure your perimeter. We described how proxies work as well as some of their advantages and disadvantages. We also discussed proxy caching, how it can be used to accelerate network performance, provide secure remote access, and offer anonymity services.

Proxies can provide unparalleled network protection. They are considered by many to be the most secure type of firewall, providing better application layer protection than other techniques, including excellent protection against attacker network-discovery methods. The commercial firewall market, though, seems to be moving away from pure proxy solutions. Their perceived inflexibility and performance limitations have relegated them to smaller roles within many networks. That being said, keep in mind that many security techniques and services can be employed together to complement and enhance each other's capabilities. When used where they make the most sense, proxies can still provide tremendous value.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net