?
Solved

Reverse Proxy - How would the basics work in this scenerio and what software tools would be needed

Posted on 2014-08-26
2
Medium Priority
?
250 Views
Last Modified: 2014-10-16
I am working on a project that would require a website hosted on a windows 2003 server to look to users as coming from a different website hosted some where else. Example, the source "real" hosted page is at  www.realpages.com/dir/page.aspx. On a completely different webserver on a completely different network, there is a domain called www.theotherdomain.com. If a user visits www.theotherdomain.com/dir/page.aspx, they are really seeing a page hosted at www.realpages.com/dir/page.aspx, but the url in their browser shows www.theotherdomain.com.

www.realpages.com are hosted on windows 2003 IIS currently with plans to host on windows 2012. www.theotherdomain.com is most likely linux.

I manage the www.realpages.com windows 2003 web server.

If this is a reverse proxy, is the configuration of the reverse proxy entirely up to the linux web master at www.theotherdomain.com? Would there be any issues with aspx pages in a reverse proxey of this nature?

Thanks for any basic information.
0
Comment
Question by:Mark B
2 Comments
 
LVL 62

Accepted Solution

by:
gheist earned 2000 total points
ID: 40287463
apaches mod_proxy_http can work in many ways
1) It sends requests to backend like http://backend/application
2) It sends requests to named virtual host on backend like www.company.com/...
SSL
3) It can also proxy SSL based on SNI
4) Or it can handle SSL encryption while backend is (1) or (2)

It can also cache static content (mod_cache_disk) or add cache hints (mod_expires) or compress files (mod_deflate) in all abovementioned cases. It really is up to you to weight benefits of offloading ssl and compression (both performance and regulatory compliance ways)
0
 

Author Closing Comment

by:Mark B
ID: 40385260
Thanks, this was helpful direction.
0

Featured Post

Upgrade your Question Security!

Add Premium security features to your question to ensure its privacy or anonymity. Learn more about your ability to control Question Security today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses
Course of the Month14 days, 18 hours left to enroll

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question