A proxy server acts just like a traffic conductor. Proxy servers have evolved over the years, and offer features and functions well beyond standard web trafficking. Many proxy servers used today will act as a major line of defense for internet users, address key use cases and compliance concerns such as network security and privacy policies, and help regulate internet traffic and usage. Below is a breakdown of a few common types:. Forward Proxy: When end user web requests are forwarded to a proxy before going out to the internet, and responses go back through the proxy and then back to the user for privacy, greater visibility, content control, and threat protection. Reverse Proxy: Typically a control point that is closer to the web resources, which helps with safe and efficient content distribution from the website back to the requestor. Primarily used by popular web sites and a few CASB solutions. Secure Web Gateway SWG : A more advanced form of web proxy that typically provides more granular control and a broader set of security functions to protect against online threats. Proxy servers are a key tool used by both organizations and individuals to help route, monitor, and secure web browsing.
What Is a Proxy Server?
What the Cloud SQL Auth proxy provides
Contact Us Take the Cybersecurity Quiz. A proxy server provides a gateway between users and the internet. When a computer connects to the internet, it uses an IP address.
This page provides a basic introduction to the Cloud SQL Auth proxy, and describes the proxy options. For step-by-step instructions on using the Cloud SQL Auth proxy, follow the link for your environment:. Your application communicates with the Cloud SQL Auth proxy with the standard database protocol used by your database. The Cloud SQL Auth proxy uses a secure tunnel to communicate with its companion process running on the server. If your client machine has an outbound firewall policy, make sure it allows outgoing connections to port on your Cloud SQL instance's IP. The instance must either have a public IPv4 address, or be configured to use private IP.