1Understanding SSLRegardless of where you access the Internet from, the connection between your Web browser and any other point can be routed through
10Securing Outsourced Applications ExampleMore and more critical services are being provided by partners, often over the Internet and secured by SSL.
11and signed logs off to a secure server to ensure audit-ability. Without these robust policy features, combined with automatic website categorization
12InternetSSLSSLSSLSSLWeb ApplicationsCorporate HeadquartersData CenterWAN Optimization “Concentrator” SSL Proxy• Application Acceleration• Malware Pr
13Securing and Optimizing WAN Traffic ExampleA Blue Coat ProxySG used for SSL WAN optimization acts as the SSL proxy allowing branch office workers secu
14When used in WAN optimization, the ProxySG is used similarly to a regular proxy, and works as follows:The client makes a request for a service, whic
15Figure 12 illustrates the Blue Coat ProxySG Reverse HTTPS Solution.InternetSSLSSLUsersCorporate HeadquartersReverse HTTPS Proxy• Web Server Accelera
16Web Server Acceleration ExampleInternetUsersWeb ServersBlue CoatServer AcceleratorWith SSL100s of HTTPSConnections TerminateAt AcceleratorIntranetFi
17Dedicated CDN Application ExampleCoreBackboneUsersWeb ServersBlue CoatServer AcceleratorWith SSLCacheable ObjectsRetrieved fromNearest ServersIntran
18How Secure is the ProxySG Itself?The Blue Coat ProxySG has its own, patented, operating system known as SGOS (secure gateway operating system). SGOS
19IT can once again gain control over their WAN links, accelerating the good and denying the bad, regardless of SSL encryption. No matter how your use
2How It WorksWhen a client and server communicate, SSL ensures that the connection is private and secure by providing authentication, encryption, and
20EncryptThe translation of data, a secret code. Encryption is the most effective way to achieve data security. Unencrypted data is called plain text,
21ISPShort for Internet Service Provider. A company that provides connection and services on the Internet, such as remote dial-in access, DSL connecti
Web Server AcceleratorsA system that services Web servers by offloading TCP/IP connections, responding to Web Client requests, replicating the Web cont
3Figure 2 illustrates an SSL transaction:The handshake begins when a client connects to an SSL-enabled server, requests a secure connection, and prese
4For instance the cipher suite “RSA-RC4-MD5” means that RSA certificates are used for both authentication and key exchange, while RC4 is used as the bu
5InternalUsersSpywarePhishingVirusesIntellectual Property Rogue AppsWormsBusiness AppsCorporateNetworkExternalAppsActive Server PagesInternetSSLSSL SS
6InternetSSLSSLSSLSSLSSLSSLSSLSSLUsersWeb ApplicationsCorporate HeadquartersWeb ServerData CenterWAN Optimization “Concentrator” SSL Proxy• Applicatio
7Blue Coat ProxySGs are the industry’s only solutions designed specifically for securing, accelerating and scaling SSL traffic to internal as well as ex
8When the SSL forward proxy is used to intercept HTTPS traffic, it can also:Optionally cache HTTPS content.>-Apply HTTP-based authentication mechani
9Perhaps surprisingly, remote application performance actually improves as a result of the acceleration techniques of compression, caching, and HTTP o
Comentários a estes Manuais