Jim Edison wrote:I am now thinking it might be better to handle the secure site certificate and SSL connection at Wingate and then proxy the connection on a non-ssl connection to my internal server and not require the server to run https, assuming first, this would be a workable solution and Wingate will handle the SSL connection properly with the users browser.
That is exactly what we do, and we are very happy with this setup. WinGate takes care of the SSL part for outside connections, and uses non-SSL connections to our internal servers. We use a wildcard certificate for the SSL, so we can present every internal server as a subdomain of our actual domain. (Which has the added benefit that you don't have to worry about things like url rewriting.)
If you bring the SSL wrapping to the proxy server, you can freely replace and switch your backend servers without breaking the SSL chain. Some reverse proxy solutions (and perhaps WinGate 2009 as well?) use this for load balancing and fail over.
The only problem with this setup, is that many webapps look at the incoming port or used protocol to decide how they will generate url's. Chances are, your webapp only sees a normal non-SSL connection and thus serves http links. You can solve this in the application itself (most php applications start with setting a parameter which tells the app whether to generate https or http links), with a Apache rewrite directive, or by telling WinGate to redirect every http request to the https url. Plain websites normally don't need anything special and just work like always.