![http proxy vs reverse proxy http proxy vs reverse proxy](https://docs.microfocus.com/OMi/10.62/Content/OMi/AdminGuide/Hardening/Images/hardening_reverse_proxy_distributed.png)
Open nf file (If you are attempting it for the first time, take a backup) Questions like the above will drive a person to choose reverse proxy. What happens when my service endpoints have to be accessed via https but cannot pay for "N" number of ssl certificates?.What happens to my service when the dependant service is down?.What happens to consumers of my service when I want to change my service name from to.This could be related to hardware (or) OS patches?
#Http proxy vs reverse proxy update
What happens to my service when an infrastructure update is required.What happens to my service if an attacker/hacker gets access to the servers?.What happens to my service if it gets spammed with millions of requests?.The configuration of reverse proxies are inclined towards the architectural decisions on the following parameters (not limited to): However, that is totally abstracted from the end user. In this case, you know that the website has a domain name called and can be accessed via http protocol. You (or) your program wants to access an endpoint (Example: ) You would need to know what the proxy server is that will act on behalf of the website/endpoint that serves your request. Since this varies across the organization, let’s focus more on scenario 2. What is the bandwidth consumed when accessing the resources over the network?.What should be blocked to the user agents?.What can be forwarded to the websites/end-points?.The configuration of forward proxies are inclined towards how the organization’s infrastructure team decides on the following parameters (not limited to): It also denies serving the request if the resource does not meet the organization policy. The proxy server acting on your behalf will forward your request to the intended endpoint/website. Instead, what if such things are defined in a server and you are allowed to remember only the server name and port number. This would be difficult for an individual (or) a program to keep track of every resource on the internet that can be accessed within an organization. Let’s consider an example organization named QWERTY and that the infrastructure team has defined a policy like this:Īnyone who is accessing the internet will have to adhere to the policies defined in the organization.Īnyone who is accessing the service hosted in the infrastructure should not directly access the service endpoint.Īs an employee, how will you access the resources?Īre you allowed to access the internet? (Allow also implies your designation (or) your IP address (or) any other filter criteria) Services that are typically a website (or) an endpoint “Forward” and “Reverse” are seen in context to the client (User-agent) accessing the resource. There are a couple of proxies that most of us are familiar with: