Reverse proxy
Reverse proxy:
Reverse proxy is used for proxing backend servers where the IP address and protocol used by the backend server will not be exposed to internet. Reverse proxy handles the request for transport medium like HTTP or TCP serves the request on behalf of the actual server. Here is IP address and protocol will be masked hence we can have a public IP configured for reverse proxy exposed to internet and serves the request on behalf of the actual Web server having private IPs. Protocol conversion will also be supported for example client browser can transport the data using HTTP which will hit the proxy and it will inturn convert to RPC or any properiatery protocol which backend server accepts.Uses of reverse proxy is huge it serves as the following layers before connecting to actual server.
Caching - Want to some of the data to be cached for example some webpages, js script or any frequently used data can be cached in Reverse proxy.
Authentication and authorization - It can be used to check the user name and password or any authentication mechanism used. It will check confirm the authenticity and permission of the user before accessing the backend server hence freeing up most of the workloads in backend server.
Data analysis - It can used to analyze the data for example if we need monitoring or need IDS or IPS or Firewall reverse proxy can terminate the connection analyze the data and create a new connection to backend if there is no malware. It can also just log the data for further asynchronous processing by monitoring and alerting systems like ePO or SIEM.
SSL termination - This is one of frequently used use case in networking products. It does SSL termination of the HTTPS connection hence offloading most of the decryption workloads for backend servers. Then it transmits only HTTP data to backend server. So all the TLS certificate, key generation, algorithms all the configurations are managed by proxy freeing by the backend servers.
Load balancing - Some of the reverse proxy supports loadbalancing like Ngnix which can distribute the load to multiple backend servers based on algorithms like least connection, least resource etc. It can also reroute the traffic to the users nearest geolocated backend servers. Reducing the latency.
Security - Since it maskes IP and protocol hacker can reach the servers directly preventing from any major attacks. Any DDOS attack or ping attacks or flood attacks can be mitigated at the reverse proxy leaving the backend servers serving useful traffic.
Comments
Post a Comment