650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/82/A4/wKioL1deFW-zAADKAADjEFpGZTA173.png "title=" capture. PNG "width=" 556 "height=" 218 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:556px;height:218px; "alt=" Wkiol1defw-zaadkaadjefpgzta173.png "/>
Just met a walk agent to visit the customer set up in the intranet 17.x.x.x site users, the DMZ request to go our agent, think about, probably network architecture diagram
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/82/A8/wKiom1deKCbwx0dLAABWs04f-xA811.png "title=" capture. PNG "alt=" Wkiom1dekcbwx0dlaabws04f-xa811.png "/>
At first puzzled why to go agent, go inside the network from the past do not have, think of the role of the agent, filter user Rights, user rights control
(architecture is purely imagination, next time to fill out the DMZ network architecture diagram)
General network architecture and work experience proxy problem architecture Imagine diagram