Proxies
Remember your attendance proxies in college

Proxies

In this article we are going to talk about #proxies


We will learn

  1. What is a Proxy
  2. Forward Proxy
  3. Reverse Proxy
  4. Differences
  5. Conclusion


What is a Proxy

Whenever you hear a word Proxy always think on behalf.

For example when you don't attend a class in your college and ask your friend to give attendance on your behalf. So your friend becomes proxy for you.

There are two types of proxies in a usual client server architecture - Forward Proxy & Reverse Proxy.

Forward Proxy

Forward Proxy sits at the client side and communicates to server on behalf of client.

In case of Forward Proxy client never talks to server rather its proxy talks to server on client's behalf.

No alt text provided for this image

Forward Proxy can be used -

No alt text provided for this image

  1. In cases where there are multiple clients of the same institutions and they all use the same proxy to communicate to server which is outside of institution. All the traffic is controlled and monitored by proxy.
  2. to avoid exposing client details like IP. Server will never know the client's IP but IP of proxy.
  3. To block access to certain domains/IPs
  4. To cache the responses sent by server

Reverse Proxy

In Reverse Proxy, the proxy server sits at server side and acts on behalf of server.

No alt text provided for this image

Reverse Proxy can be used -

  1. For load balancing
  2. For caching the server responses
  3. For reducing the DDoS attacks
  4. For SSL encryption
  5. To block access to domains/IPs

One downside of reverse proxy is, if it fails then it becomes the single point of failure for all servers.

Differences

  1. Forward proxy works for client while Reverse proxy works for server.
  2. Forward proxy sits at client side while Reverse proxy sits at server side.
  3. Forward proxy is used to hide client from outside world while reverse proxy hides the server from exposing to outside world.

Conclusion

Proxies are helpful in monitoring, filtering, anonymity, securing client/servers, handling traffic.

To view or add a comment, sign in

Others also viewed

Explore content categories