Security Basics mailing list archives

Re: network architecture related to db security - needed


From: Saqib Ali <docbook.xml () gmail com>
Date: Fri, 9 Dec 2005 09:40:39 -0800

actually you can place the reverse proxy in the DMZ. and same thing
for citrix solution as well.

  Do you mean a network topology like:

  internet --> firewall --> reverse proxy --> application --> db


--
In Peace,
Saqib Ali
http://www.xml-dev.com/blog/
"If you stop telling lies about me, I will stop telling the truth about you"


Current thread: