Tuesday, May 26, 2015

The Cloud Proxy server

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting a service, such as a file,
connection, web page, or other resource available on a different server and the proxy server evaluates the request as a way to simplify and control its complexity. The representation were invented to add structure and encapsulation for distributed systems.Currently, most Web proxies are proxy, providing access to content on the World Wide Web and provide anonymity.

Representation types


A proxy server can reside on the user's local computer or at various points between computer and destination servers of Internet users.
  • A proxy server that forwards requests and replies unmodified is usually called a proxy gateway or sometimes tunneling.
  • A proxy is a proxy oriented Internet to recover a wide range of sources (in most cases, anywhere on the Internet) to the front.
  • A reverse proxy is typically an Internet-facing proxy used as a front end to control and protect access to a server on a private network. A reverse proxy is alaso commonly performed tasks such as load balancing, authentication, decryption or caching.  

Reverse proxies

An Internet connection proxy server to an internal network.
A reverse proxy taking applications over the Internet and sent to the server on an internal network. These applications connect to the proxy and may be unaware of the internal network.
Main article: Reverse Proxy

A reverse proxy (or surrogate) is a proxy server appears to clients to be a common server. Applications are sent to one or more proxy servers that processed the request. The response from the proxy server returns as if it came directly from the proxy server, which allows the client does not know the origin servers. Reverse proxies are installed in the neighborhood of one or more web servers. All Internet traffic with a destination of one of the district's Web servers through the proxy server. The use of "reverse" his counterpart comes "forward proxy" reverse proxy is closer to the web server and is used only a limited set of sites. There are many reasons for installing reverse proxy servers:

    Acceleration / SSL Encryption: when certain websites are created, SSL encryption is often done by the Web server itself, but by a reverse proxy that is equipped with SSL acceleration hardware. See Secure Sockets Layer. In addition, a host can provide a unique "SSL proxy" to provide SSL encryption for an arbitrary number of hosts eliminating the need for an SSL certificate separately for each host server, with the disadvantage that all hosts behind the proxy SSL must share a common DNS name or IP address for SSL connections. This problem can be partially solved by using the function of SubjectAltName X.509 certificates.
    Load balancing: the reverse proxy can distribute the load across multiple Web servers, each Web server uses its own application domain. In such a case, the reverse proxy may have to rewrite the URLs for each site (translation externally known URLs for internal locations).
    Serve / cache static content: A reverse proxy can download static content web servers storing images and other content as static graphics.
    Compression: the proxy server can optimize and compress content for faster loading times.
    Spoon feeding: reduces resource usage caused by slow clients on Web servers storing the contents of the Web server sent and gradually "spoon feeding" for the customer. This benefits especially dynamically generated pages.
    Security: the proxy server is an additional layer of defense and can protect against certain specific OS and Web server attacks. However, it provides no protection against attacks on the web application or service itself, which is generally regarded as the greatest danger.
    Editorial Extranet: a reverse proxy server from the Internet can be used to communicate with a server internal security organization, providing extranet access to certain functions, keeping the servers behind the firewall. When used in this manner, security measures should be considered to protect the rest of your infrastructure if that server is compromised, your web application is vulnerable to attacks from the Internet.

  2 comments:

  1. but how config cloud proxy server ??

    ReplyDelete
  2. plz poste for me liste of proxys site web

    ReplyDelete

Popular Posts