Proxy and Reverse Proxy Servers
Proxy and Reverse Proxy Servers
Proxy servers
The basic operating principle of a proxy server is quite simple: It is server which acts
as a "proxy" for an application by making a request on the Internet in its stead. This
way, whenever a user connects to the Internet using a client application configured to
use a proxy server, the application will first connect to the proxy server and give it its
request. The proxy server then connects to the server which the client application
wants to connect to and sends that server the request. Next, the server gives its reply
to the proxy, which then finally sends it to the application client
Features of a proxy server
Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
server plays is handled directly by gateways and routers. However, proxy servers are
still being used, as they have some other features.
Caching
Most proxies have a cache, the ability to keep pages commonly visited by users in
memory (or "in cache"), so they can provide them as quickly as possible. Indeed, the
term "cache" is used often in computer science to refer to a temporary data storage
space (also sometimes called a "buffer.")
A proxy server with the ability to cache information is generally called a "proxy-
cache server".
The feature, implemented on some proxy servers, is used both to reduce Internet
bandwidth use and to reduce document loading time for users.
Nevertheless, to achieve this, the proxy must compare the data it stores in cached
memory with the remote data on a regular basis, in order to ensure that the cached
data is still valid.
Filtering
What's more, by using a proxy server, connections can be tracked by creatinglogs for
systematically recording user queries when they request connections to the Internet
Because of this, Internet connections can be filtered, by analysing both client requests
and server replies. When filtering is done by comparing a client's request to a list of
authorized requests, this is called whitelisting, and when it's done with a list of
forbidden sites, it's called blacklisting. Finally, analysing server replies that comply
with a list of criteria (such as keywords) is called content filtering.
Authentication
As a proxy is an indispensable intermediary tool for internal network users who want
to access external resources, it can sometimes be used to authenticate users, meaning
to ask them to identify themselves, such as with a username and password. It is also
easy to grant access to external resources only to individuals authorized to do so, and
to record each use of external resources in log files.
This type of mechanism, when implemented, obviously raises many issues related to
individual liberties and personal rights.
Reverse-proxy servers
The most widely used proxy, without a doubt, is Squid, a free software program
available for several platforms, including Windows and Linux.
In Windows, there are several programs for setting up a local area network proxy
server at a low cost: