What is a reverse proxy?

A reverse proxy is a proxy server that forwards requests to one or more servers on behalf of a client and sends the received responses back to the client. Unlike a traditional proxy, which forwards requests to external resources on behalf of the client, a reverse proxy takes on the role of an intermediary between the client and internal servers or services.

Reverse proxies are often used in networks to perform various tasks:

  1. SSL/TLS termination: The reverse proxy can decrypt the encryption of incoming SSL/TLS connections (HTTPS) and then forward the data traffic unencrypted to the internal servers. This allows the servers to focus on processing the requests while the reverse proxy handles the encryption.
  2. Authentication and Authorization: The reverse proxy can authenticate and authorize user requests before forwarding them to the internal servers. This makes it possible to implement access restrictions and ensure that only authorized users can access certain resources.
  3. Load Balancing: A reverse proxy can distribute incoming traffic across multiple internal servers to distribute the load evenly and optimize server utilization. This improves the scalability and availability of the application.
  4. Caching: A reverse proxy can cache frequently requested content to improve response times and reduce load on internal servers. This can increase the overall performance of the application, especially for busy websites or web applications.
  5. Security features: Reverse proxies can also provide security features such as content filtering, protection against distributed denial of service (DDoS) attacks, and protection against web application attacks such as SQL injection and cross-site scripting.

Overall, the use of a reverse proxy enables improved security, performance and scalability of web applications by acting as an interface between the client and the internal servers and providing various functions to optimize and secure data traffic.

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge