Title: Classical versus Transparent IP Proxies
Author(s): M. Chatel.
Status: INFORMATIONAL
Date: Mar 1996
Length: 87374
Many modern IP security systems (also called "firewalls" in the trade) make use of proxy technology to achieve access control. This document explains "classical" and "transparent" proxy techniques and attempts to provide rules to help determine when each proxy system may be used without causing problems.
|
|
|