Difference between revisions of "Reverse proxy"

From wikieduonline
Jump to navigation Jump to search
 
(5 intermediate revisions by the same user not shown)
Line 18: Line 18:
 
== Related terms ==
 
== Related terms ==
 
* <code>[[Upstream (Nginx)|Upstream]]</code> [[Nginx]] directive
 
* <code>[[Upstream (Nginx)|Upstream]]</code> [[Nginx]] directive
* <code>[[proxy_pass]]</code>
+
* <code>[[proxy_pass]]</code> directive in used in [[Nginx]] for Reverse Proxy configurations.
 +
* [[HAProxy]]
 +
* [[ssh tunnel]]
  
 
== See also ==
 
== See also ==
* [[Network address translation]]
+
* {{NAT}}
 
* {{nginx}}
 
* {{nginx}}
 
* {{Proxy}}
 
* {{Proxy}}
 
* [[Load Balancer]]
 
* [[Load Balancer]]
 
* [[Traefik]]
 
* [[Traefik]]
* [[HAProxy]]
 
  
 +
[[Category:Reverse proxy]]
  
[[Category:Reverse proxy]]
 
[[Category:Computer networks]]
 
[[Category:Internet architecture]]
 
  
 
{{CC license}}
 
{{CC license}}
 
Source: https://en.wikipedia.org/wiki/Reverse_proxy
 
Source: https://en.wikipedia.org/wiki/Reverse_proxy

Latest revision as of 10:11, 20 September 2023

In IT, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client, appearing as if they originated from the proxy server itself.[1] Unlike a forward proxy, which is an intermediary for its associated clients to contact any server, a reverse proxy is an intermediary for its associated servers to be contacted by any client. In other words, a proxy acts on behalf of the client(s), while a reverse proxy acts on behalf of the server(s).

Quite often, popular web servers use reverse-proxying functionality, shielding application frameworks of weaker HTTP capabilities. In this context, "weaker" means limitations in ability to handle excessive load, and limitation in handling the entire variety of request formats that can adhere to HTTP(S) 1.x, HTTP(S) 2.x, or requests which may be hard to detect. A reverse proxy in such cases could transform HTTPS requests into HTTP requests, buffer incoming requests based on the load of the "shielded" server(s), handle cookies/session data, or transform one request into multiple requests and then synthesize the responses, among other possibilities.

Uses of reverse proxies[edit]

  • Reverse proxies can hide the existence and characteristics of an origin server or servers.
  • Application firewall features can protect against common web-based attacks, like a denial-of-service attack (DoS) or distributed denial-of-service attacks (DDoS). Without a reverse proxy, removing malware or initiating takedowns, for example, can become difficult.
  • In the case of secure websites, a web server may not perform TLS encryption itself, but instead offloads the task to a reverse proxy that may be equipped with TLS acceleration hardware. (See TLS termination proxy.)
  • A reverse proxy can distribute the load from incoming requests to several servers, with each server serving its own application area. In the case of reverse proxying in the neighbourhood of web servers, the reverse proxy may have to rewrite the URL in each incoming request in order to match the relevant internal location of the requested resource.
  • A reverse proxy can reduce load on its origin servers by caching static content, as well as dynamic content - synonym: web acceleration. Proxy caches of this sort can often satisfy a considerable number of website requests, greatly reducing the load on the origin server(s).
  • A reverse proxy can optimize content by compressing it in order to speed up loading times.
  • In a technique named "spoon-feed"[2] a dynamically generated page can be produced all at once and served to the reverse proxy, which can then return it to the client a little bit at a time. The program that generates the page need not remain open, thus releasing server resources during the possibly extended time the client requires to complete the transfer.
  • Reverse proxies can operate wherever multiple web-servers must be accessible via a single public IP address. The web servers listen on different ports in the same machine, with the same local IP address or, possibly, on different machines and different local IP addresses altogether. The reverse proxy analyzes each incoming request and delivers it to the right server within the local area network.
  • Reverse proxies can perform A/B testing and multivariate testing without placing JavaScript tags or code into pages.
  • A reverse proxy can add basic HTTP access authentication to a web server that does not have any authentication.[3]


Related terms[edit]

See also[edit]


Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.

Source: https://en.wikipedia.org/wiki/Reverse_proxy

  1. "Forward and reverse proxies". The Apache Software Foundation. Retrieved 26 August 2018.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  2. "squid-cache wiki entry on "SpoonFeeding"". Francesco Chemolli. Retrieved 9 February 2011.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  3. "Possible to add basic HTTP access authentication via HAProxy?". serverfault.com.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>

Advertising: