Security Basics mailing list archives
Re: network architecture related to db security - needed
From: Saqib Ali <docbook.xml () gmail com>
Date: Fri, 9 Dec 2005 09:40:39 -0800
actually you can place the reverse proxy in the DMZ. and same thing for citrix solution as well.
Do you mean a network topology like: internet --> firewall --> reverse proxy --> application --> db
-- In Peace, Saqib Ali http://www.xml-dev.com/blog/ "If you stop telling lies about me, I will stop telling the truth about you"
Current thread:
- RE: network architecture related to db security - needed avishver (Dec 12)
- Re: network architecture related to db security - needed Saqib Ali (Dec 12)
- RE: network architecture related to db security - needed avishver (Dec 12)
- Re: network architecture related to db security - needed Saqib Ali (Dec 12)
- Re: network architecture related to db security - needed Kevin Wetzel - ISP Toolz (Dec 13)
- RE: network architecture related to db security - needed avishver (Dec 12)
- Re: network architecture related to db security - needed Saqib Ali (Dec 12)