<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>external-proxy on Cisco Techblog</title><link>https://techblog.cisco.com/tags/external-proxy/</link><description>Recent posts on the Banzai Cloud Blog</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 01 Jul 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://techblog.cisco.com/tags/external-proxy/index.xml" rel="self" type="application/rss+xml"/><item><title>Pod level external HTTP(S) proxy configuration with Istio</title><link>https://techblog.cisco.com/blog/istio-external-proxy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 01 Jul 2020 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/istio-external-proxy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Companies frequently use proxies to act as a link between an internal network and the Internet. This is often frustrating for employees, even non-IT ones, when they can&amp;rsquo;t access a specific site from the company network. For engineers it&amp;rsquo;s even more obnoxious, since they have to configure all kinds of compute infrastructure to connect to external networks via these proxies.
It&amp;rsquo;s debatable if this is the best way to harden corporate network security, but it&amp;rsquo;s still the most widely spread method to restrict outgoing traffic.</description></item></channel></rss>