Application Gateway Network Integration GuideChapter 2 Security PlanningGeneral Security Issues9• Supports digital certificates in Privacy Enhanced Mail (PEM) formatthat include a private key. You should install on the ApplicationGateway a digital X.509 certificate that belongs to your company. Thiswill ensure that all SSL transactions will pass with no error warningsto device users.• Limits user access to requests for transformed/transcoded data fromIP telephones. For IP phone applications which require userauthentication for use, the Application Gateway uses theauthentication mechanism of the phone system. The ApplicationGateway passes authentication requests to the configuredauthentication server and returns authentication replies to therequesting IP phone. The Application Gateway does not manage orretain user credentials.• Can be configured to allow only previously identified application dataor specified URLs to pass through it, or to prevent any access to theInternet.• Implements a unique and superior cookie management technique thatensures that cookies never leave the Application Gateway and arealways maintained within the enterprise firewall. The ApplicationGateway provides virtual cookies for devices that do not nativelysupport cookies.• Supports proxy servers—firewalls that reside on hardware other thana router.• Has been tested to ensure that it has no high- or medium-risk securityvulnerabilities and no UNIX, Web server, URL, or port vulnerabilities.White box testing includes verification of memory checking, bufferoverflow, and open port utilization.General Security IssuesInformation traveling openly across a public network is exposed topotential risks and vulnerabilities such as theft or alteration of thetransmitted data, invasion by destructive programs, and access byunauthorized users.Companies must identify the vulnerabilities they deem most important toaddress, and then select countermeasures to protect data as it travels toand from their site. The benefits of easy data transfer must be balanced