HP Cache Server Appliance Administrator Guide
80
Traffic Server provides a number of security features.
This chapter discusses the following topics:
• Controlling client access to the Traffic Server proxy cache‚ on page 81
• Controlling host access to the Traffic Server machine (ARM security)‚ on page 81
• Controlling access to Traffic Manager‚ on page 83
• Configuring SOCKS firewall integration‚ on page 89
• Configuring DNS server selection (split DNS)‚ on page 91
• Configuring LDAP-based proxy authentication‚ on page 92
• Using SSL Termination‚ on page 93
Traffic Server security options
Traffic Server provides numerous options that enable you to establish secure communication between the
Traffic Server system and other computers on the network. Using the security options, you can:
• Control which clients are allowed to access the Traffic Server proxy cache. Refer to Controlling client
access to the Traffic Server proxy cache‚ on page 81.
• Control which hosts are allowed to access the Traffic Server machine. Refer to Controlling host access to
the Traffic Server machine (ARM security)‚ on page 81.
• Control and secure access to Traffic Manager using:
o Administrator accounts (refer to Setting the administrator ID and password‚ on page 83 and Creating
a list of administrator accounts‚ on page 85)
o An access control list that defines which hosts are allowed to access Traffic Manager (refer to
Controlling host access to Traffic Manager‚ on page 86)
o SSL (Secure Sockets Layer) protection for encrypted, authenticated access (refer to Using SSL for
secure administration‚ on page 87)
• Configure Traffic Server integration into your firewall and control traffic through the SOCKS server.
Refer to Configuring SOCKS firewall integration‚ on page 89.
• Configure Traffic Server to use multiple DNS servers to match your site’s security configuration. Refer to
Configuring DNS server selection (split DNS)‚ on page 91.
• Configure Traffic Server to use LDAP-based proxy authentication. Refer to Configuring LDAP-based
proxy authentication‚ on page 92.
• Secure reverse proxy connections between a client and Traffic Server and Traffic Server and an origin
server, using the SSL termination option. Refer to Using SSL Termination‚ on page 93.
11 Security Options