URL: http://www.ietf.org/rfc/rfc1919.txt
Many
modern IP security systems (also called "firewalls" in the trade) make
use of proxy technology to achieve access control. This document explains
"classical" and "transparent" proxy techniques and attempts
to provide rules to help determine when each proxy system may be used without
causing problems.
Keywords:
|