Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Reverse Proxies is a specific type of proxy that provides a specific type of security access control and service. You'll learn what its primary function is, why it has a singular security focus and when it's deployed as a security strategy. [toggle_content title="Transcript"] Another type of proxy is a reverse proxy. In this scenario we have, we could have a user over here. We have a web server over there. When we go online to web servers, we don't know the infrastructure in place. A PC user over here is making a request to the web server but unknowing to the PC user there could be another device here which is the proxy. In this case, this proxy is called a reverse proxy, why? Because this proxy is set up to protect that server, this is what happens when we use a reverse proxy. If a user sends a request to the server, the request gets to the proxy first. If that request is legitimate, the proxy would allow the request get to the server. If that request is malicious, the proxy will block the traffic from going through, this way protecting the server. If the request is legitimate, it will allow the request to go through, if the request is malicious, the proxy knows to block that traffic. It would also inspect all out coming traffic from the service, if the request is legitimate, the proxy knows to let it back, however, if the request is malicious, the proxy knows to deny that traffic. This is how we implement reverse proxy. Reverse proxies are set up to defend the web servers. [/toggle_content]
CISSP CISM CISA CHFI CSXF CEH, Cyber Security Specialist & Trainer
Subscribe to become an Insider Pro and get access to premium content such as: