6
Chapter 1
Overview
•
Configure Traffic Server integration into your firewall and control traffic through a SOCKS server.
•
Configure Traffic Server to use multiple DNS servers to match your site’s security configuration. For
example, you might choose to have Traffic Server use different DNS servers depending on whether it
needs to resolve host names located inside or outside a firewall. This enables you to keep your internal
network configuration secure while continuing to provide transparent access to external sites on the
Internet.
•
Use LDAP-based proxy authentication that enables you to leverage existing directory services by
supporting asynchronous match and bind requests to LDAP servers. This enables you to maintain policies
that require users to log in and be authenticated by the proxy before going out onto the Internet. In addition,
you can enable Traffic Server clients to access specific sites on the Internet without being authenticated by
the LDAP server. Traffic Server uses a local database to improve the performance of LDAP authentication
and, upon completion, logs successfully authenticated users.
•
Secure connections in reverse proxy mode between a client and Traffic Server, and Traffic Server and the
origin server, using the SSL termination option.
•
Control access to Traffic Manager using:
o
SSL (Secure Sockets Layer) protection for encrypted, authenticated access
o
An access control list (ACL) that defines which hosts are allowed to access Traffic Manager
o
Administrator accounts that define which users can access Traffic Manager and which activities they
can perform (for example, view statistics only or view statistics and configure the Traffic Server)
•
Set NNTP specific security options that:
o
Control user access to news articles cached by Traffic Server by defining access privileges for a
particular group of clients
o
Enable external program-based NNTP authentication providing enterprise-wide control over news
access, posting behavior, and other related privileges
Traffic Server security options are described in more detail in
Chapter 11‚ Security Options
.