Forward Proxy Server VS Reverse Proxy Server

Forward Proxy Server VS Reverse Proxy Server

Hello everyone and welcome,

In this article, we'll unravel the concepts of forward and reverse proxies – two essential tools that amplify security, performance, and accessibility on the web. Let's dive in.


What is a proxy Server?

A forward proxy (aka proxy server), is a server located between the clients and the internet.

It plays the role of a middle man, meaning if a client X send a request to a server Y:

  1. The proxy intercepts it.
  2. It evaluates this request.
  3. It sends it to the destination server with the proxy's IP address as the source.
  4. The server treats the request, and then sendes the responce to the proxy server.
  5. The proxy receives this response and forwards it to the client.

Aucun texte alternatif pour cette image

Here is a use case for the proxy:

Certain governments, educational institutions, and organizations implement browsing limitations through firewalls, restricting users' access to a curated portion of the Internet.

By employing a forward proxy, individuals can bypass these constraints. Forward proxies enable users to connect to the proxy server instead of directly accessing the desired websites, offering a workaround to navigate such restrictions effectively.


What is a reverse proxy Server?

Unlike forward proxys, reverse proxy servers are positioned in between the internet and the web servers.

In this case when a client X send a request to Server Y, the request is intercepted at the servers' edge and not at the client side.

Aucun texte alternatif pour cette image

Here is a use case for the reverse proxy server:

Implementing a reverse proxy shields a website or service from exposing its origin server's IP address. This makes it harder for attackers aiming to launch direct assaults like DDoS attacks. Instead, they confront the reverse proxy, often a fortified entity like Cloudflare's CDN, armed with enhanced security and resources to repel cyber threats effectively.


So What is the difference between the two servers?

As you can see the difference between a forward and reverse proxy might seem a bit subtle, but it's quite important. To explain it simply, think of a forward proxy as a guard in front of a user, making sure the user never talks directly to a main server. On the flip side, a reverse proxy acts like a guard for a main server, ensuring that no user talks directly to that server.


By: Karim Belhadj

To view or add a comment, sign in

More articles by Karim Belhadj

  • How Do We Keep Our WI-FI Networks Secured?

    Home WIFI networks are in a constant threat of being hacked. Think about how many machines are connect to you WIFI from…

  • Discovering Zero-Day Attacks

    What are Zero-Day Attacks? A Zero-Day attack occurs when threat actors exploit new and unaddressed vulnerabilities in a…

  • What Are Endpoint Detection and Response (EDR) Tools?

    Endpoint Detection and Response (EDR), also known as Endpoint Threat Detection and Response (ETDR), is a tool that…

  • What Are Password Managers and How Do They Work?

    In most cases, people have two types of passwords: One complex password that they use for all their needs. Multiple…

    2 Comments
  • What Zero Trust Security?

    Conventional security models operate on an outdated assumption that everything within an organization’s network is…

    2 Comments
  • IDS and IPS explained

    IDS : Intrusion Detection Systems. An Intrusion Detection System (IDS) is a system that passively monitors the traffic…

    2 Comments
  • Sandbox in cybersecurity

    In the ever-evolving landscape of cybersecurity, staying ahead of malicious threats is crucial. One valuable tool that…

  • What Is A Web Application Firewall (WAF)

    In the world of cybersecurity, Web Application Firewalls (WAFs) are like strong shields that protect websites from…

  • Monitoring the Active Directory | ADS EP10 (Last Episode)

    In this post we will talk about monitoring and auditing your active directory, and I will use the Domain Admin Group as…

  • NTLM vs KERBEROS (Forcing NTLMv2) | ADS EP9

    KERBEROS and NTLM are both authentication protocols used in Windows Active Directory (AD) environments to verify user…

Others also viewed

Explore content categories