I'm looking for some best practices documentation for implementation of a reverse proxy.
We need to allow an internal database / web server incoming access to the outside world and are trying to determine the most efficient and secure method to accomplish this.
We already have a Red Hat 2 server running a mod proxy Apache configuration, but want to take a look at today's best practices (as this server is ancient).
I've googled quite a bit and have as of yet been unable to find anything less than extremely general advice related to commonplace security best practices.
I would greatly appreciate anything you could provide.
Thanks! Erik
 
    