What Is A Proxy Server?
A Proxy server is an intermediary machine, between a client and the actual server, which is used to filter or cache requests made by the client.
Normal (Regular/Caching) Proxy :
A regular caching proxy server is a server which listens on a separate port and receives the request from client fetches the content and stores a copy for future use. So next time when another client requests for the same webpage the proxy server just replies to the request with the content in its cache thus improving the overall request-reply speed.
Forward Proxy
When an internal user requests a Web page, the request goes through the proxy server so that it appears to the Internet to be coming from the server from its IP address (or one of them) - and not the user's device. This anonymity provides an important measure of security by reducing the amount of information about a network and its users easily accessible to hackers on the Internet.
Reverse Proxy
A reverse proxy server is a type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server. A reverse proxy provides an additional level of abstraction and control to ensure the smooth flow of network traffic between clients and servers.
Caching
If your users frequently need to access certain pages on the Internet, the server can download and store copies on its hard drive, in cache and also continuously monitor the page for changes and download them when they appear, so the cached page is always up to date. Caching also reduces bandwidth requirements and congestion that can degrade overall performance.
Controlling Web Surfing
In organizations that allow employees unrestricted access to the Internet but publish policies limiting personal use no gambling, porn or hate literature sites, for example, or only during lunch and breaks network administrators can monitor proxy server logs to spot users habitually breaching policies.
If employees are allowed to use the Web for personal surfing, too-close monitoring could result in privacy and labor law infringements by the company.
Load Balancing – A reverse proxy server can act as a “traffic cop,” sitting in front of your backend servers and distributing client requests across a group of servers in a manner that maximizes speed and capacity utilization while ensuring no one server is overloaded, which can degrade performance. If a server goes down, the load balancer redirects traffic to the remaining online servers.
Web Acceleration – Reverse proxies can compress inbound and outbound data, as well as cache commonly requested content, both of which speed up the flow of traffic between clients and servers. They can also perform additional tasks such as SSL encryption to take load off of your web servers, thereby boosting their performance.
Security And Anonymity – By intercepting requests headed for your backend servers, a reverse proxy server protects their identities and acts as an additional defense against security attacks. It also ensures that multiple servers can be accessed from a single record locator or URL regardless of the structure of your local area network.
Types Of Proxy Server
- Normal (Regular/Caching) Proxy
- Farward Proxy
- Reverse Proxy
Normal (Regular/Caching) Proxy :
A regular caching proxy server is a server which listens on a separate port and receives the request from client fetches the content and stores a copy for future use. So next time when another client requests for the same webpage the proxy server just replies to the request with the content in its cache thus improving the overall request-reply speed.
Forward Proxy
When an internal user requests a Web page, the request goes through the proxy server so that it appears to the Internet to be coming from the server from its IP address (or one of them) - and not the user's device. This anonymity provides an important measure of security by reducing the amount of information about a network and its users easily accessible to hackers on the Internet.
Reverse Proxy
A reverse proxy server is a type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server. A reverse proxy provides an additional level of abstraction and control to ensure the smooth flow of network traffic between clients and servers.
Use Of Proxy Server
Caching
If your users frequently need to access certain pages on the Internet, the server can download and store copies on its hard drive, in cache and also continuously monitor the page for changes and download them when they appear, so the cached page is always up to date. Caching also reduces bandwidth requirements and congestion that can degrade overall performance.
Controlling Web Surfing
In organizations that allow employees unrestricted access to the Internet but publish policies limiting personal use no gambling, porn or hate literature sites, for example, or only during lunch and breaks network administrators can monitor proxy server logs to spot users habitually breaching policies.
If employees are allowed to use the Web for personal surfing, too-close monitoring could result in privacy and labor law infringements by the company.
Use Of Reverse Proxy Server :
Load Balancing – A reverse proxy server can act as a “traffic cop,” sitting in front of your backend servers and distributing client requests across a group of servers in a manner that maximizes speed and capacity utilization while ensuring no one server is overloaded, which can degrade performance. If a server goes down, the load balancer redirects traffic to the remaining online servers.
Web Acceleration – Reverse proxies can compress inbound and outbound data, as well as cache commonly requested content, both of which speed up the flow of traffic between clients and servers. They can also perform additional tasks such as SSL encryption to take load off of your web servers, thereby boosting their performance.
Security And Anonymity – By intercepting requests headed for your backend servers, a reverse proxy server protects their identities and acts as an additional defense against security attacks. It also ensures that multiple servers can be accessed from a single record locator or URL regardless of the structure of your local area network.
No comments:
Post a Comment