20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Proxy Access Through A Firewall<br />

exterior<br />

Bastion host<br />

interior<br />

Internet<br />

Proxy Server<br />

manually enabled bypass<br />

Intranet<br />

Figure 6: Firewall and internet gateway<br />

Often you need application level proxies (i.e., they undertand details of the<br />

application protocol) -- an example is to proxy RealAudio’s streaming audio.<br />

Maguire Proxy Access Through A Firewall 12: 15 of 30<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!