A Reverse Proxy is typically less visible than a “forward proxy”, and requires no configuration or special knowledge by the client, X. What is different this time compared to a “forward proxy,” is that this time the user X does not know he is accessing Y. So, as before, we have data being retrieved by Y –> Z on behalf of X, which chains as follows: X –> Y –> Z. However, in some scenarios, it is better for the administrator of Z to restrict or disallow direct access, and force visitors to go through Y first. Z blocks X.įor this example, I will list three computers connected to the internet. The administrator of Z has noticed hacking attempts coming from X, so the administrator has decided to block X’s ip address (and/or netrange). The Storm Worm virus is spreading by tricking people into visiting, so the system administrator has blocked access to the site to prevent users from inadvertently infecting themselves.Įmployees at a large company have been wasting too much time on, so management wants access blocked during business hours.Ī local elementary school disallows internet access to the web site.Ī government is unable to control the publishing of news, so it controls access to news instead, by blocking sites such as.
Here is a (very) partial list of uses of a forward proxy server.ġ) X is unable to access Z directly becauseĪ) Someone with administration authority over X’s internet connection has decided to block all access to site Z. Reasons why X would want to use a forward proxy server: However, in some scenarios, it is better for Y –> Z on behalf of X, which chains as follows: X –> Y –> Z. Normally, one would connect directly from X –> Z. X = your computer, or “client” computer on the internet The proxy event in this case is that the “forward proxy” retrieves data from another web site on behalf of the original requestee.įor an example, I will list three computers connected to the internet. Most discussion of web proxies refers to the type of proxy known as a “forward proxy.”