Microweb PRO Series Guia de Instalação Página 59

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 58
Deployment Primer
2-31
Note: Administrators should be aware of the following:
- The URL-filtering feature makes no sense in this configuration; only antivirus
scanning and URL-blocking are useful.
- In the reverse proxy mode, the Web server's access log is useless. To analyze the
connections for the Web site, you must use the IWSVA access log.
- Ideally, the reverse proxy server should be placed behind a firewall, but in many
cases, the proxy is connected directly to the Internet, where it is more vulnerable to
direct attacks. When a reverse proxy is configured without a firewall, administrators
should take all appropriate precautions in securing the operating system hosting
IWSVA.
IWSVA configured in Reverse Proxy Mode processes Web page requests in the
following sequence:
1. Clients initiate the Web request.
2. The request is received by Trend Micro™ InterScan™ Web Security Virtual
Appliance, and configured to listen on port 80.
3. Trend Micro™ InterScan™ Web Security Virtual Appliance scans the content, then
forwards it to an actual Web server.
4. The Web server delivers the requested page back to IWSVA.
5. Trend Micro™ InterScan™ Web Security Virtual Appliance rewrites the page
headers, and sends on the request.
Vista de página 58
1 2 ... 54 55 56 57 58 59 60 61 62 63 64 ... 177 178

Comentários a estes Manuais

Sem comentários