ELI5 · · 5 min read

What are Reverse Proxies?

Discover how a reverse proxy acts like a helpful doorman for your servers by improving security, handling traffic, off‑loading encryption, and making your site more resilient.

featured image for the post "What are reverse proxies?".

Most people are familiar with the idea of a normal proxy: you send a request to an intermediary server and that server talks to the website on your behalf. This protects your identity, helps bypass restrictions and can cache responses.

A reverse proxy flips this relationship. Instead of hiding clients, it hides and protects your servers. The proxy sits at the edge of your network and receives all incoming web requests, decides which backend server should handle each one and then forwards the response to the client. The origin server never talks directly to the outside world.

Why You Might Need One

Direct Access is Inefficient and Risky

A basic web server sends pages directly to each visitor. This works when traffic is low but quickly becomes a bottleneck or a target.

Analogy: The Office Receptionist

Think of your server infrastructure like a busy office building. Visitors (web clients) arrive at reception. The receptionist (reverse proxy) greets them, checks if they’re legitimate, and directs them to the right office. They can hand out brochures (cached pages), without having to bother anyone. They also keep the directory private so no one knows exactly where each employee sits. Without a receptionist, every visitor would wander the hallways, interrupting staff, clogging elevators and risking security breaches.

How a reverse proxy works

Image displaying a typical reverse proxy flow, where cached documents can be served from the proxy itself, or if it is not stored, the document can be pulled from the origin servers.
Typical flow for a reverse proxy

At a high level, a reverse proxy performs the following steps:

  1. Listen for incoming connections.
    1. The proxy sits at the network edge and accepts HTTP(S) requests from clients. It may perform a TCP and SSL handshake if the connection is encrypted.
  2. Inspect and route.
    1. The proxy examines each request and uses a scheduler to decide which backend server should handle it. Factors include server load, session affinity and geographic proximity. It can also block malicious payloads.
  3. Optional caching and transformation.
    1. Before forwarding, the proxy may serve a cached copy of the requested resource or compress the data. It may also terminate SSL, decrypting the request and re‑encrypting the response.
  4. Forward to the origin server.
    1. The chosen backend processes the request and generates a response. The proxy receives the response and may cache it for future use.
  5. Return the response.
    1. The proxy sends the response back to the client. From the client’s perspective, it’s talking to a single server, even though the content might come from a different machine.

Benefits of Using a Reverse Proxy

Trade‑offs and challenges

Reverse proxies bring powerful capabilities but also introduce some drawbacks:

Where are Reverse Proxies Used?

Reverse proxies are common in many environments:

FAQ

Does a reverse proxy replace a load balancer?

Not exactly. Load balancing is one of the functions a reverse proxy can perform. Dedicated load balancers focus solely on distributing traffic, whereas reverse proxies also handle caching, security and protocol translation. Even a single server can benefit from the SSL offloading and protection offered by a proxy.

How is it different from a forward proxy?

A forward proxy sits in front of clients, hides their IP addresses and fetches content from the internet on their behalf. Reverse proxies sit in front of servers and ensure that no client communicates directly with the origin.

Do I need a reverse proxy for my personal website?

If you run a small static site with low traffic, a reverse proxy is optional. However, using one (often via a free CDN) can provide TLS termination, caching and basic DDoS protection with minimal effort. For self‑hosted services, tools like Nginx Proxy Manager or Traefik simplify exposing multiple internal services under a single domain.

Can a reverse proxy inspect encrypted traffic?

Yes. When configured for SSL termination, the proxy decrypts incoming traffic, allowing it to inspect content and enforce security policies. The proxy then re‑encrypts the response for the client. If end‑to‑end encryption is required, the proxy can be configured for SSL passthrough, where it simply forwards encrypted traffic to the origin server and does not see the content.

Read next

Image for our ELI5 series. This image states "ELI5 - What is MTPCP". MPTCP being Multipath TCP
ELI5 ·

What is Multipath TCP (MPTCP)?

Discover how Multipath TCP lets a single connection use multiple network paths at once, increasing speed and resilience for mobile devices, data‑centres and the future Internet.

What is SLAAC (IPv6)?
ELI5 ·

What is SLAAC (IPv6)?

Discover how SLAAC lets devices self‑assign global addresses, removes DHCP overhead, preserves end‑to‑end connectivity, and scales effortlessly for home, enterprise, and IoT networks.