Video Description

Reverse Proxies is a specific type of proxy that provides a specific type of security access control and service. You'll learn what its primary function is, why it has a singular security focus and when it's deployed as a security strategy. [toggle_content title="Transcript"] Another type of proxy is a reverse proxy. In this scenario we have, we could have a user over here. We have a web server over there. When we go online to web servers, we don't know the infrastructure in place. A PC user over here is making a request to the web server but unknowing to the PC user there could be another device here which is the proxy. In this case, this proxy is called a reverse proxy, why? Because this proxy is set up to protect that server, this is what happens when we use a reverse proxy. If a user sends a request to the server, the request gets to the proxy first. If that request is legitimate, the proxy would allow the request get to the server. If that request is malicious, the proxy will block the traffic from going through, this way protecting the server. If the request is legitimate, it will allow the request to go through, if the request is malicious, the proxy knows to block that traffic. It would also inspect all out coming traffic from the service, if the request is legitimate, the proxy knows to let it back, however, if the request is malicious, the proxy knows to deny that traffic. This is how we implement reverse proxy. Reverse proxies are set up to defend the web servers. [/toggle_content]

Course Modules

CompTIA Security+

Instructor Background

Instructed By

Instructor Profile Image

CISSP CISM CISA CHFI CSXF CEH, Cyber Security Specialist & Trainer



Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support