{"id":45,"date":"2015-12-15T18:41:37","date_gmt":"2015-12-15T18:41:37","guid":{"rendered":"http:\/\/localhost\/kemp\/?p=45"},"modified":"2015-12-21T18:51:55","modified_gmt":"2015-12-21T18:51:55","slug":"reverse-proxy","status":"publish","type":"post","link":"https:\/\/logiciel.cl\/kemp\/reverse-proxy\/","title":{"rendered":"[:es]Reverse Proxy[:]"},"content":{"rendered":"<p>[:es]<\/p>\n<h2>Reverse Proxy<\/h2>\n<p>El t\u00e9rmino Reverse Proxy (RP) o proxy reverso se aplica normalmente a un servicio que reside en frente de uno o m\u00e1s servidores (como web servers por ejemplo), aceptando peticiones de los clientes para los recursos disponibles en los servidores. Desde el punto de vista del cliente, el reverse proxy aparece como si fuera el web server y as\u00ed es totalmente transparente al usuario remoto.<\/p>\n<p>&nbsp;<\/p>\n<p>KEMP\u2019s LoadMaster\u2122 proveen la plataforma perfecta para entregar servicios de reverse proxy en alta disponibilidad para un amplio rango de cargas de trabajo y para mejorar la entrega de los servicios con caracteristicas tales como balanceo de carga avanzado, SSL offloading (liberar de las tareas de encriptaci\u00f3n, desencriptaci\u00f3n a los servidores) y una aplicaci\u00f3n integrada de FireWall para servicios Web.<\/p>\n<p>&nbsp;<\/p>\n<p>Como todas las peticiones de clientes pasan a trav\u00e9s del RP, es el punto de la red perfecto para controlar el tr\u00e1fico mientras se aprovecha de optimizar el rendimiento en la entrega por medio de comprimir, alivianar el cifrado y almacenar en cach\u00e9 el contenido. Como un \u00fanico punto de conexi\u00f3n a los servicios, los proxies reversos normalmente son implementados en una configuraci\u00f3n de alta disponibilidad para maximizar el tiempo de servicio tanto de las aplicaciones como del servicio en s\u00ed.<\/p>\n<p>&nbsp;<\/p>\n<h2>Controlando el Tr\u00e1fico de Red<\/h2>\n<p>Una soluci\u00f3n de reverse proxy generalmente incluye la capacidad de dirigir el tr\u00e1fico a multiples servidores y balancear el tr\u00e1fico entre ellos. Al ser capaz de enviar el tr\u00e1fico a m\u00e1s de un servidor abre muchas opciones de mejorar el tiempo de servicio sin interrupciones, como poro ejemplo, aumentar la resciliencia de aplicaciones implementando m\u00e1s de un servidor. El reverse proxy entonces podr\u00eda balancear el tr\u00e1fico Web entre servidores usando un esquema b\u00e1sico de balanceo tal como round-robin o algo m\u00e1s avanzado tal como el chequeo de la salud y capacidad de los servidores. Es esta caracteristica de RP que permite a los servicios web escalar a una mayor (o menor) cantidad de servidores web dependiendo de en lso cambiso en la demanda de esos servicios, sin cambiar la cara visible de esos servicios sobre Internet. Los equipos KEMP LoadMaster pueden actuar como Proxy de cualquier aplicaci\u00f3n en capa 4 mientras algunos servicios proxy tales como el Microsoft Application Request Routing (ARR) solo soportan aplicaciones web usando protocolos http y https.<\/p>\n<p>&nbsp;<\/p>\n<h2>Asegurando la Infraestructura de Servidores Web<\/h2>\n<p>Siendo el punto de cierre para todo el tr\u00e1fico de Internet, un web Proxy es tambi\u00e9n el lugar perfecto para asegurar la infraestructura residente detr\u00e1s (backend).\u00a0 Al nivel m\u00e1s b\u00e1sico, el proxy reescribe las URLs de tal manera que la infraestructura subyacente no es expuesta al cliente. En un nivel m\u00e1s avanzado, el proxy puede<span id=\"ouHighlight__10_12TO9_13\" class=\"\"><\/span><span id=\"noHighlight_0.6609840434760619\"> <\/span><span id=\"ouHighlight__14_20TO15_20\">exigir<\/span><span id=\"noHighlight_0.26922614732580274\"> el <\/span><span id=\"ouHighlight__22_31TO25_31\" class=\"\">cifrado<\/span><span id=\"noHighlight_0.7789012853290491\"> <\/span><span id=\"ouHighlight__33_34TO33_34\" class=\"\">de<\/span><span id=\"noHighlight_0.19554788250469501\"> <\/span><span id=\"ouHighlight__36_38TO36_39\" class=\"\">todo<\/span><span id=\"noHighlight_0.8561802205384488\"> el <\/span><span id=\"ouHighlight__40_46TO44_50\">tr\u00e1fico<\/span><span id=\"noHighlight_0.7171283598377844\"> <\/span><span id=\"ouHighlight__48_50TO52_52\">y<\/span><span id=\"noHighlight_0.08699755003146581\"> <\/span><span id=\"ouHighlight__52_55TO54_60\">tambi\u00e9n<\/span><span id=\"noHighlight_0.16208710410076765\"> <\/span><span id=\"ouHighlight__57_63TO62_73\" class=\"\">inspeccionar<\/span><span id=\"noHighlight_0.6735745456267395\"> el <\/span><span id=\"ouHighlight__65_71TO78_84\" class=\"\">tr\u00e1fico<\/span><span id=\"noHighlight_0.5339917505200908\"> <\/span><span id=\"ouHighlight__73_75TO86_89\">para<\/span><span id=\"noHighlight_0.6776265945765044\"> <\/span><span id=\"ouHighlight__88_97TO91_101\">actividades<\/span><span id=\"noHighlight_0.8182683928201726\"> <\/span><span id=\"ouHighlight__77_86TO103_113\">sospechosas<\/span><span id=\"noHighlight_0.9070002041180993\"> <\/span><span id=\"ouHighlight__99_103TO115_117\">con<\/span><span id=\"noHighlight_0.6570436881446374\"> <\/span><span id=\"ouHighlight__105_105TO119_120\">un<\/span><span id=\"noHighlight_0.015911306106565104\"> <\/span><span id=\"ouHighlight__123_130TO122_132\" class=\"\">cortafuegos<\/span><span id=\"noHighlight_0.3647408033289893\"> de <\/span><span id=\"ouHighlight__111_121TO137_146\" class=\"\">aplicaci\u00f3n<\/span><span id=\"noHighlight_0.5587862669164049\"> <\/span><span id=\"ouHighlight__107_109TO148_150\" class=\"\">Web<\/span><span id=\"noHighlight_0.8895382225906694\"> <\/span><span id=\"ouHighlight__132_137TO152_157\" class=\"\">(WAF).<\/span><span id=\"noHighlight_0.11185760725619465\"> <\/span><span id=\"ouHighlight__139_141TO159_160\" class=\"\">El<\/span><span id=\"noHighlight_0.4337442328816379\"> <\/span><span id=\"ouHighlight__143_145TO162_164\" class=\"\">WAF<\/span><span id=\"noHighlight_0.24872678106603352\"> <\/span><span id=\"ouHighlight__147_160TO166_172\" class=\"\">permite<\/span><span id=\"noHighlight_0.4911571384592035\"> a<\/span><span id=\"ouHighlight__162_164TO174_175\" class=\"\">l<\/span><span id=\"noHighlight_0.12705890976021939\"> <\/span><span id=\"ouHighlight__166_170TO177_181\" class=\"\">proxy<\/span><span id=\"noHighlight_0.6441108020915901\"> <\/span><span id=\"ouHighlight__175_182TO183_193\" class=\"\">identificar<\/span><span id=\"noHighlight_0.48001510808940284\"> <\/span><span id=\"ouHighlight__184_186TO195_195\">y<\/span><span id=\"noHighlight_0.5803095056546999\"> <\/span><span id=\"ouHighlight__188_195TO197_203\">mitigar<\/span><span id=\"noHighlight_0.6901876574133535\"> <\/span><span id=\"ouHighlight__211_225TO205_220\">vulnerabilidades<\/span><span id=\"noHighlight_0.07352630152836359\"> <\/span><span id=\"ouHighlight__205_209TO222_230\">conocidas<\/span><span id=\"noHighlight_0.4035311787943797\">\u00a0<\/span><span id=\"noHighlight_0.37955611056708427\"><\/span><span id=\"ouHighlight__274_281TO242_251\" class=\"\">impidiendo<\/span><span id=\"noHighlight_0.9708361388523922\"> que <\/span><span id=\"ouHighlight__251_254TO253_255\" class=\"\">los<\/span><span id=\"noHighlight_0.30097123289279426\"> <\/span><span id=\"ouHighlight__256_262TO257_263\" class=\"\">ataques<\/span><span id=\"noHighlight_0.782104421501181\"> alcancen los servidores.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Alivio en el proceso de Cifrado en un Reverse Proxy<\/h2>\n<p>Un reverse proxy generalmente necesita mirar dentro del tr\u00e1fico web de modo de poder realizar operaciones tales como an\u00e1lisis de seguridad del contenido y el almacenamiento en el cach\u00e9.\u00a0 Esto significa que el proxy actuar\u00e1 como el punto final para una conexi\u00f3n encriptada SSL y no los sewrvidores web. Esta funcionalidad le saca la sobrecarga de establecer conexiones cifradas seguras a las CPUs de los servidores y tambi\u00e9n simplifica el manejo de las llaves de cifrado y certificados. El proxy puede tambi\u00e9n usar hardware especializado para procesar\u00a0 estas funciones relacionadas a la seguridad como tambi\u00e9n asegurar las llaves privadas de acuerdo a los est\u00e1ndares tales como el FIPS-140-2.<\/p>\n<p>&nbsp;<\/p>\n<h2>Mejorando el rendimiento con el Cach\u00e9 de Contenido<\/h2>\n<p>Un reverse proxy puede tambi\u00e9n almacenar localmente en el cach\u00e9 el contenido de modo de que nos todas las peticiones de cliente necesitan ser dirigidas a los servidores subyacentes.\u00a0 Esto puede reducir significativamente la carga en los servidores para aquellos items que son frecuentemente solicitados\u00a0 en las peticiones y que son entregados directamente por el cach\u00e9 del proxy. Esto tambi\u00e9n mejora la calidad de la experiencia de usuario al entregar directamente el contenido sin tener que conectarse a los recursos de los servidores de back-end.<\/p>\n<p>&nbsp;<\/p>\n<h2>M\u00e1s que s\u00f3lo Tr\u00e1fico Web<\/h2>\n<p>Los reverse proxies pueden ser utilizados para mucho m\u00e1s que aplicaciones Web. Servicios como Microsoft Lync (hoy Skype for Business) requieren un reverse proxy para permitir acceso a los servicios de los suscriptores externos. de nuevo, un proxy mejora la seguridad y rendimiento de tales aplicaciones al aliviar los servicios de procesamiento de seguridad y ocultar la topolog\u00eda interna desde Internet.[:en]<\/p>\n<h2>Reverse Proxy<\/h2>\n<p>The term reverse proxy is normally applied to a service that sits in front of one or more servers (such as a webserver), accepting requests from clients for resources located on the server(s). From the client point of view, the reverse proxy appears to be the web server and so is totally transparent to the remote user.<\/p>\n<p>KEMP\u2019s LoadMaster\u2122 provides a perfect platform to deliver highly available reverse proxy services for a wide range of workloads and to enhance service delivery with features such as advanced load balancing, SSL offloading and an integrated web application firewall.<\/p>\n<p>As all client requests pass through the proxy, it is a perfect point in a network to control traffic while also optimizing performance with compression, encryption offloading and caching. As a single point of connection to services, reverse proxies are normally deployed in a highly available configuration to maximize application and service uptime.<\/p>\n<h2>Controlling Network Traffic<\/h2>\n<p>A reverse proxy solution will usually include the capability to forward traffic to multiple servers and to balance the traffic between these servers (load balancing). Being able to forward traffic to more than one server opens up many ways to improve service uptime, as application resilience can be implemented by deploying more than one server. The reverse proxy would then balance web traffic between the servers using a basic scheme such as round-robin or something more advanced, such as server health and capacity checking. It is this feature of a reverse proxy that allows web services to scale as more web servers can be added (and removed) as demand changes without any change to the Internet-facing part of the service. KEMP LoadMaster can proxy any application at Layer 4 while some proxies such as the Microsoft Application Request Routing (ARR) service only support web based applications using the http and https protocols.<\/p>\n<h2>Securing the Web Server Infrastructure<\/h2>\n<p>Being the chokepoint for all traffic from the internet, a web proxy is also the perfect place in the network to secure the backend server infrastructure. At the most basic level, the proxy rewrites URLs so that the underlying infrastructure is not exposed to the client. At a more advanced level, the proxy may enforce encryption on all traffic and also inspect traffic for suspicious activities using a Web Application Firewall (WAF). The WAF feature allows the proxy to identify and mitigate against known vulnerabilities and exploits preventing such attacks from ever reaching the servers.<\/p>\n<h2>Encryption Offload in a Reverse Proxy<\/h2>\n<p>A reverse proxy will generally need to look inside web traffic so that it can perform operations such as caching and content security. This means that the proxy will act as the endpoint from SSL encrypted connections rather than the webservers. This approach removes the CPU overhead of establishing secure connections from the server and also simplifies the management of encryption keys and certificates. The proxy can also use specialized hardware to process this security workload and also to secure private keys in accordance with standards such as FIPS-140-2.<\/p>\n<h2>Improving Performance with Content Caching<\/h2>\n<p>A reverse proxy may also cache content locally so that not all client requests need to be forwarded to a server. This can significantly reduce the server workload as frequently requested items such as brand images are served directly from the proxy cache. This also improves the client quality of experience as cached content is delivered without having to access back-end resources.<\/p>\n<h2>More Than Just Web Traffic<\/h2>\n<p>Reverse proxies can be used for more than just web applications. Services such as Microsoft Lync require a reverse proxy to allow external subscribers access services. Again, a proxy enhances the security and performance of such applications by offloading security processing and hiding the internal infrastructure topology from the Internet.[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:es] Reverse Proxy El t\u00e9rmino Reverse Proxy (RP) o proxy reverso se aplica normalmente a un servicio que reside en frente de uno o m\u00e1s servidores (como web servers por ejemplo), aceptando peticiones de los clientes para los recursos disponibles en los servidores. Desde el punto de vista del cliente, el reverse proxy aparece como [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":38,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-45","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-caracteristicas"],"acf":[],"_links":{"self":[{"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/posts\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":21,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/posts\/45\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/posts\/45\/revisions\/110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/media\/38"}],"wp:attachment":[{"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logiciel.cl\/kemp\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}