Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
hầu như tất cả mọi thứ mà hiện thực khác làm. Ví dụ, SSH cung cấp mã hóa mạnh mẽ với 3DES, truy cập (PPP) Point-to-Point, và khả năng cung cấp nhiều đường hầm giữa hai mạng khác nhau. Hơn nữa, không giống như các giải pháp VPN khác, | 300 Chapter 8 than to support several tools utilities across multiple systems. Furthermore the use of SSH as a backup solution a file server or for terminal access make it easier for users to learn adopt and optimize on a single solution. Lastly despite the fact that SSH has been so widely adopted by former RSH and Rlogin users not only for its added security but also primarily because it is easy to use it still has not carried over to other uses such as SFTP chat or backups. This chapter not only demonstrates what many users already know that SSH is a strong alternative for RSH Rlogin but also that SSH is just as easy to use and deploy for other protocols such as FTP chat and backups. The use of SSH as a file server and backup solution is just as easy if not easier than its use as a secure terminal session. Either through default installations which install the SFTP subsystem or additional features such as Rsync SSH can be a strong solution across multiple disciplines not just for secure terminal access. In the next chapter I will shift the focus from SSH flexibility to SSH proxies and how to use an SSH proxy server to access several SSH servers whether they are SSH terminal sessions or SFTP servers. Also I will cover the uses of other tools such as SOCKS and HTTP in conjunction with SSH. CHAPTER 9 Proxy Technologies in a Secure Web Environment The use of proxy servers in any network environment can simplify the operating environment for end-users. A proxy server is an application that places a request on behalf of another entity. Most proxy servers in use today are Web proxies where a client machine attempts to access a certain Web server but sends its request to the Web proxy server. The Web proxy server then sends the request to the real Web server on behalf of the client. Once the response is received from the Web server the proxy server returns the request to the client. The use of proxy technology can also be adapted to the SSH architecture. This chapter .