O'Reilly logo

java.rmi: The Remote Method Invocation Guide by Kathleen McNiff, Esmond Pitt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. RMI through firewalls

  • Introduction—Firewalls—SOCKS—HTTP tunnelling—Firewalls and RMIGIOP Proxies—A note on callbacks—A note on firewalls

In this chapter

This chapter describes the implications of deploying RMI over the Internet, or over large intranets containing firewalls. [1] If you intend to develop applications which are to be deployed across such networks, you must read this chapter.

In our discussions of networks so far we have omitted the topic of firewalls. We have implicitly assumed only the existence of a TCP/IP local area network (LAN).

From one point of view, the Internet is nothing but an extremely large TCP/IP wide area network (WAN). However, making the jump from a LAN to the Internet is not a trivial exercise. There are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required