Hitachi

Hitachi Application Server V10 User's Guide (For Windows® Systems)


2.3.3 Configurations that ensure security

This subsection explains system configurations that use Application Server to ensure security. As typical examples of such system configurations, this subsection describes the characteristics of a configuration that uses reverse proxies and a configuration that does not use reverse proxies.

Configuration that uses reverse proxies

This type of configuration places reverse proxy servers inside the DMZ, and web servers and Java EE servers in the internal network in order to ensure security. This type prevents illegal accesses, eavesdropping, and DoS attacks. Multiple Java EE servers ensure availability.

[Figure]

Configuration that does not use reverse proxies

This type of configuration places web servers inside the DMZ, and Java EE servers in the internal network in order to ensure security. This type uses no reverse proxies in order to reduce communication overhead. This type prevents illegal accesses, eavesdropping, and DoS attacks. Multiple Java EE servers ensure availability.

[Figure]