Talk With an Expert

Perimeter Defense-in-Depth: Using Reverse Proxies and other tools to protect our internal assets

Perimeter Defense-in-Depth: Using Reverse Proxies and other tools to protect our internal assets (PDF, 1.64MB)Published: 18 Feb, 2002
Created by:
Lynda Morrison

The use of a reverse proxy server to provide defense-in-depth security will be discussed in this paper as a practical security solution for protecting our internal assets. There are several tools available that add obscurity to this process. We had a need to disguise our IBM mainframe yet allow access to personal resources. This paper includes a discussion of some of the methods that were successful and some that did not work. With limited resources, we can still provide additional security in our environments.