Worked on different proxies (half/full) for many years. Your presentation makes me seeing the forest while working on a branch in one of the tree in the forest. Thanks to you and F5!!!
Awesome topic here I find while fellowshipping with God when I was in 2nd grade the prophetic description of "psychologist for the "in the zone" that's prophetic for "proxy for the intimacy". The teaching during then was about the differ from psychologist and psychiatrist. Terrill TC!
Great video, thank you! I have a question about the half proxy example at 2:35 (the streaming protocol example): So after the initial setup, where the proxy makes the initial request to the server, the stream is setup from the server directly back to the client, skipping the proxy entirely. If this is the case, what is the point of the proxy server in the first place? Why even use one initially if the destination IP address for packets in the stream are going to be the client's IP anyway?
Hi Evan~ thanks for the note! Orgs might want to have the proxy do things like L3/4 port switching, routing, NAT’ing or some protocol checks. Any networking layer type functions or inspections. It also might be better to terminate on the proxy rather than having folks initially hit it direct. The return is a straight shoot tho. Appreciate the comment!
I was thinking the same, I assumed it might benefit a user if the server, say in this case (Netflix) responded by directly communicating with the client and bypassing the proxy server because it would establish a faster connection(I'm not sure if this is where bandwidth also comes into play). Like you, I thought that was pointless aswell because it defeats the purpose of the proxy server. However, there could be a scenario, say like steaming, where requests by a client are blocked but not responses by a server.
On your camera, the shutter speed should be double the amount of the frame rate. On this video your shutter is too low 1/5 or something. It should be 1/50
Thanks for the note! Yes, we were having some frame rate challenges back when this was produced but we've since matched the camera speed with the additional elements for a smoother look. Great catch and appreciate the comment!
Thanks for the question. In the context of this video, a client would be a PC, tablet, mobile device , browser, etc that is requesting the content...and the application is in the data center/cloud delivering the requested info. Does that help?
The way you explain it here I don't see any difference between a reverse proxy and a forward proxy apart from how the proxy is being used on the network. It seems like you're describing a retailer and a customer. Everyone is a customer somewhere and everyone can also be a retailer some other place. Or, did I miss something? Can you use your forward proxy as a reverse proxy and vice versa?
Depending on the configuration and capabilities of the controller, sure. In fact, a single proxy can run both FP/RP for different clients. FP allows multiple clients to route traffic to an external network and a RP routes traffic for multiple servers. Full proxies have separate TCP connections on either end, you just have to tell it what to do and which way to go. :-) Thanks for the comment!!
Hi Peter! I was wondering if this reverse proxy could be implemented to filter client requests from outside network to get license in virtual servers. Is it possible in terms of security or I have to create a DMZ to increase security? Thanks a Lot. Alexandre
Thanks for the comment! You'd really need to discuss with whatever vendor you're looking at. One sign would be needing to configure a client side TCP connection and a separate config for the server side.
I am very Grateful to you....Thanks for explaining Peter I need your complete course on BIG-IP:ASM,LTM,GTM,PROXY where I can get it..please reply ....udemy???
hey thanks for the note! I got a What is BIG-IP: ruclips.net/video/D6J_j7HdkV8/видео.html and a What is APM: ruclips.net/video/5_KfM01wMPQ/видео.html What is MQTT: ruclips.net/video/eS4nx6tLSLs/видео.html What is DDoS: ruclips.net/video/jXbpRhP8ztw/видео.html and some others on the DevCentral Channel. No, nothing on Udemy - sorry.
I'm late to the party, but still... I have one question. Suppose I use a layer 7 proxy and this one can do all the nice stuff these kind of proxy's are able to, in contrary to the layer 4- I'm just passing on- proxy. And now I connect to my bank and I negotiate my TLS handshake with them to establish the secure E2EE connection. But since the full proxy is in the middle, able to terminate TLS, inspect the data, change headers, and so on.. How do I know that my 'secure' connection with my bank isn't tamper with? And is a socks5 proxy than the better (security) solution, since I doesn't rewrite data packets?
@@TopTechTalent thanks for your answer, I appreciate that.. I'm indeed awere that you can send/make the tunnel request via HTTP(s) CONNECT and when the proxy established TCP, it will send the HTTP(s) 200 OK back to the client and the proxy will mearly function as a relay, while full E2EE is in place. But since this process is outside the hands of the consumer... I wonder, can't get my head around it😁, when you can trust the proxy /load balancer to behave in this manner.
@@tubbalcain you can configure a socks profile on BIG-IP: clouddocs.f5.com/cli/tmsh-reference/v13/modules/ltm/ltm_profile_socks.html As for trusting your financial institution to do the right thing? One can only hope. :-)
I have a project on proxy but i don't really know much about it. I just wanna ask is there any software that i could develop a proxy on it or test it (if that makes sense)
Any HTTP client, server, or proxy can close a TCP transport connection at any time. Often it is the server side due to timeout. A full-proxy terminating SSL would have the control over connections.
Before publishing his video, he flipped it horizontally. Basically, when he filmed himself writing on glass, he was actually in the right hand side of the screen, writing with his right hand and all of his writings were on the left side of the screen which would have appeared backwards to us. So when editing his video, he "flipped it horizontally" or "mirrored" the whole video.
it sounds liked a good advantages to me on DSR , i guess we wont be able to get that as in full proxy the C to S connection are broken into half between proxy to client and proxy to server separately
Couple links that might help. For BIG-IP: support.f5.com/csp/article/K13074 And from MS: technet.microsoft.com/en-us/library/aa997252.aspx?f=255&MSPPError=-2147217396
its for different applications. F is used for clients to connect to the internet while H is used for clients connecting to your DMZ or web servers, apps, etc
Nice but youve said a couple of times "Layer 4 routing". ???? Layer 3 is actually routing unless your trying to trip up novice CCNA testers to fail that question. Hehe
Indeed packet routing is a layer 3 function. The concept here is taking requests and choosing a destination, thus "routing" that request to a specific back end resource. That said, traditional routing still occurs on the wire between networked devices at layer 3. No confusion intended!
May be dude, look at his t-shirt print. if t-shirt is printed from horizontal flip, you are right. But i think he has the talent to write from backward.
May be not!. What if he is writing as usual but video is flipped (right to left) after recording so it shows up normal? This of course would have required logos to be printed on shirt as a mirror image and him to write with his right hand (may be he is already right handed). Hint: Men's shirt usually have buttons on shirt's right go into strip on left side but here it seems to be the other way. Seems it is easy to get mirrored logos printed on a ready-made shirt but to flip over the buttons to other side is difficult.
Worked on different proxies (half/full) for many years. Your presentation makes me seeing the forest while working on a branch in one of the tree in the forest. Thanks to you and F5!!!
Thanks for the comment and glad it helped!
You know it's gonna be good when in 16s starts explaining the basic foundation of what is to come! Awesome! Imediately subscribed!!!!
glad you enjoyed it!
Dude can write from the other side. Awesome!
Donato Fallaci he’s a lefty that’s why 😂
He must be a right-hander. They simply did a horizontal flip of Video.
@@jithinpavithran6793 then his shirt logo would be backwards
@@jithinpavithran6793 yes
maybe they mirrored it and then released it.
The author of the channel thank you for such a useful and informative video.Now I have learned what a proxy is and a lot of new things about it!
Awesome topic here I find while fellowshipping with God when I was in 2nd grade the prophetic description of "psychologist for the "in the zone" that's prophetic for "proxy for the intimacy". The teaching during then was about the differ from psychologist and psychiatrist. Terrill TC!
Thanks for a simple and splendid explanation, Peter.
Awesome! Really appreciate the comment!
I really enjoyed this thanks. You explain tech concepts in an easy to digest way, that really sticks in my brain.
Great video, thank you! I have a question about the half proxy example at 2:35 (the streaming protocol example):
So after the initial setup, where the proxy makes the initial request to the server, the stream is setup from the server directly back to the client, skipping the proxy entirely.
If this is the case, what is the point of the proxy server in the first place? Why even use one initially if the destination IP address for packets in the stream are going to be the client's IP anyway?
Hi Evan~ thanks for the note! Orgs might want to have the proxy do things like L3/4 port switching, routing, NAT’ing or some protocol checks. Any networking layer type functions or inspections. It also might be better to terminate on the proxy rather than having folks initially hit it direct. The return is a straight shoot tho. Appreciate the comment!
I was thinking the same, I assumed it might benefit a user if the server, say in this case (Netflix) responded by directly communicating with the client and bypassing the proxy server because it would establish a faster connection(I'm not sure if this is where bandwidth also comes into play). Like you, I thought that was pointless aswell because it defeats the purpose of the proxy server. However, there could be a scenario, say like steaming, where requests by a client are blocked but not responses by a server.
What a excellent video!! Thanks Peter I enjoyed your video!
Thanks much and we appreciate the comment! (this is Peter replying!)
Peter thank you for your explanation. I understand it more then before.
The quality of the video is great.
Appreciate the comment!!
On your camera, the shutter speed should be double the amount of the frame rate. On this video your shutter is too low 1/5 or something. It should be 1/50
Thanks for the note! Yes, we were having some frame rate challenges back when this was produced but we've since matched the camera speed with the additional elements for a smoother look. Great catch and appreciate the comment!
Its just need to move a pixel to another
Mr. Silva. Thank you for the tutorial. Now I know.
Nice! Thanks for the note and glad you enjoyed it!
Nice video, the etymology part made so much easy the understanding, thanks!
Thanks a lot and appreciate the comment!
What is the difference between a client and an application? I thought a client was an application?
Thanks for the question. In the context of this video, a client would be a PC, tablet, mobile device , browser, etc that is requesting the content...and the application is in the data center/cloud delivering the requested info. Does that help?
The way you explain it here I don't see any difference between a reverse proxy and a forward proxy apart from how the proxy is being used on the network. It seems like you're describing a retailer and a customer. Everyone is a customer somewhere and everyone can also be a retailer some other place. Or, did I miss something? Can you use your forward proxy as a reverse proxy and vice versa?
Depending on the configuration and capabilities of the controller, sure. In fact, a single proxy can run both FP/RP for different clients. FP allows multiple clients to route traffic to an external network and a RP routes traffic for multiple servers. Full proxies have separate TCP connections on either end, you just have to tell it what to do and which way to go. :-) Thanks for the comment!!
@@devcentral Oh okay. Thank you very much.
Hi Peter! I was wondering if this reverse proxy could be implemented to filter client requests from outside network to get license in virtual servers. Is it possible in terms of security or I have to create a DMZ to increase security? Thanks a Lot.
Alexandre
Wow... Loving the way you are writing on the camera lens... ♥
It's on a glass sheet. Camera is placed opposite from him
OK, but he must be writing backwards right?
@@NdmGjr Yeah, he is writing the normal way is from behind the glass. The video is flipped while editing so that it becomes legible to us.
@@shekharsingh8735 Wow how cool!
Thank you Peter!
Thank you, this is going to be very useful in my computer science class!
glad you enjoyed it!
how do you know if your purchasing a full or half proxy?
Thanks for the comment! You'd really need to discuss with whatever vendor you're looking at. One sign would be needing to configure a client side TCP connection and a separate config for the server side.
F5 DevCentral thank you!⚡️💕
So Nginx reverse proxy is full proxy?
Example software of half proxy is?
Uhh what am i gonna do with proxies if i won them in a roblox exploit giveaway?
Excellent presentation and tech skill sets. Thanks.,,,
glad you enjoyed it!
Awesome! thank for the great explanation!
glad you enjoyed it!
You have answered my question of life
Same feeling here like healing
Thanks for the note!!
I am very Grateful to you....Thanks for explaining Peter I need your complete course on BIG-IP:ASM,LTM,GTM,PROXY where I can get it..please reply ....udemy???
hey thanks for the note! I got a What is BIG-IP: ruclips.net/video/D6J_j7HdkV8/видео.html and a What is APM: ruclips.net/video/5_KfM01wMPQ/видео.html What is MQTT: ruclips.net/video/eS4nx6tLSLs/видео.html What is DDoS: ruclips.net/video/jXbpRhP8ztw/видео.html and some others on the DevCentral Channel. No, nothing on Udemy - sorry.
I'm late to the party, but still... I have one question.
Suppose I use a layer 7 proxy and this one can do all the nice stuff these kind of proxy's are able to, in contrary to the layer 4- I'm just passing on- proxy. And now I connect to my bank and I negotiate my TLS handshake with them to establish the secure E2EE connection. But since the full proxy is in the middle, able to terminate TLS, inspect the data, change headers, and so on.. How do I know that my 'secure' connection with my bank isn't tamper with?
And is a socks5 proxy than the better (security) solution, since I doesn't rewrite data packets?
For certain connections (like financial or compliance related) BIG-IP can be configured to allow/pass that encrypted traffic unaltered.
@@TopTechTalent thanks for your answer, I appreciate that.. I'm indeed awere that you can send/make the tunnel request via HTTP(s) CONNECT and when the proxy established TCP, it will send the HTTP(s) 200 OK back to the client and the proxy will mearly function as a relay, while full E2EE is in place.
But since this process is outside the hands of the consumer... I wonder, can't get my head around it😁, when you can trust the proxy /load balancer to behave in this manner.
@@tubbalcain you can configure a socks profile on BIG-IP: clouddocs.f5.com/cli/tmsh-reference/v13/modules/ltm/ltm_profile_socks.html As for trusting your financial institution to do the right thing? One can only hope. :-)
@@TopTechTalent thanks, I will look into it 👍👍
nice video, well explained!
Glad you liked it! Appreciate the comment!!
I have a project on proxy but i don't really know much about it. I just wanna ask is there any software that i could develop a proxy on it or test it (if that makes sense)
@@SJ-ol5oc you're asking the wrong person 😂 I don't even remember what proxy is
@@hebaibrahim3010 lol 😂🖒
great video! i understood everything
Glad you liked it and thanks for the comment!!
this is really amazing. have understood perfectly..!!
glad you enjoyed it!
Great explanation my head is going to explode though now.
Thanks for the explanation friend
Glad you liked it!
Apart from the slow frame rate, the content is excellent !
ho
Thanks Peter! Wonderful video
thank you Peter
...and thanks for the comment! Glad you enjoyed it.
does the client close connections to the proxy or directly to the application via half proxy
Any HTTP client, server, or proxy can close a TCP transport connection at any time. Often it is the server side due to timeout. A full-proxy terminating SSL would have the control over connections.
Very good video help me a lot
Your a good teacher thank you
well explained
Thanks and we appreciate the comment!!
Is performance Layer 4 in F5 LTMs a half proxy? and standard type VS is full-Proxy ?
love the explanation thanks sir
Thanks a lot and appreciate the comment!!
How is this big-ip different from nginx?
here's an article that might help: www.nginx.com/blog/when-how-to-migrate-your-f5-big-ip-load-balancer/
Is he actually writing with his left hand and backwards that’s insane! 😂
Here is how we do the Lightboard Lessons: ruclips.net/video/U7E_L4wCPTc/видео.html
Thanks peter it is crisp and clear
Can't concentrate. Mind continually blown by his handwriting.
What kind of hardware can be a Proxy?
Thanks peter. Great way of explaination
like how you are behind the blackboard
this is how we do it: ruclips.net/video/U7E_L4wCPTc/видео.html
I wonder how this video was made, he is writing on glass and still appearing in correct order, confused :P
ruclips.net/video/eVOPDQ5KYso/видео.html
how we create: ruclips.net/video/U7E_L4wCPTc/видео.html
Before publishing his video, he flipped it horizontally. Basically, when he filmed himself writing on glass, he was actually in the right hand side of the screen, writing with his right hand and all of his writings were on the left side of the screen which would have appeared backwards to us. So when editing his video, he "flipped it horizontally" or "mirrored" the whole video.
i was wondering the same thing, I thought maybe .... useful dyslexia??
@@AlbanianFix But what about his shirt logo?
very impressive
glad you enjoyed it!
you like my smudge lol
how will Direct Server Push works in Full proxy mode ?
it sounds liked a good advantages to me on DSR , i guess we wont be able to get that as in full proxy the C to S connection are broken into half between proxy to client and proxy to server separately
Couple links that might help.
For BIG-IP: support.f5.com/csp/article/K13074
And from MS: technet.microsoft.com/en-us/library/aa997252.aspx?f=255&MSPPError=-2147217396
Very useful.. thank you for sharing!
Pretty sure this guys spray painted my local over pass bridge.
Thanks for such a nice video about proxy.
nice and clean :)
Thank you sir
Tuco!! :D Great video thanks!
ha
thank you Peter very much
Half proxy is not a Reverse Proxy ?
It can be in some instances depending on how it handles connections.
@@devcentral Okey, Thank so much
what about http socks etc?
Didn't know Tuco Salamanca made videos for RUclips
I want to be your honest sharing proxy 😍...Thanks deep understanding with each video
Great explanation
which is Better. F Proxy or H Proxy
I guess it depends on what you are trying to accomplish. One (F) is typically used for outbound traffic and H is usually for inbound.
its for different applications. F is used for clients to connect to the internet while H is used for clients connecting to your DMZ or web servers, apps, etc
How did you make this video writing on your screen. Can you make the tutorial?
you can see how we do it at: ruclips.net/video/U7E_L4wCPTc/видео.html
check out this video: twitter.com/i/status/1113495222502088704
I think it is more likely that he's wearing an inverted image on his shirt
true
A proxy is when slender makes a human pass out then draw an X and an O on its forehead. bye yeet
Thank you.
What about creepypasta and proxy's?
okay so who else just realized he's either writing the text backwards as it faces us or this entire video is inverted?
check out: www.linkedin.com/feed/update/urn:li:activity:6519254612405428224
Good video but the squeaky noise on the board 🙉
Thank you . . . .
very good!!!
good one ;)
Awesome !
WTHAT ? how u typing backwards LOLL AMAZING VIDEO
Eric Bridge oh
Nice but youve said a couple of times "Layer 4 routing". ???? Layer 3 is actually routing unless your trying to trip up novice CCNA testers to fail that question. Hehe
Indeed packet routing is a layer 3 function. The concept here is taking requests and choosing a destination, thus "routing" that request to a specific back end resource. That said, traditional routing still occurs on the wire between networked devices at layer 3. No confusion intended!
thx :D
i came here to see him writing backward!!!!!!
increase your camera fps
Thanks
ffs he flips the screen in post edit, it's not that hard
May be dude, look at his t-shirt print. if t-shirt is printed from horizontal flip, you are right. But i think he has the talent to write from backward.
Thumbs up for writing backwards
kroW taerG
!uoY knahT
That squeaky marker...
:-)
Answer: A Grenade from Goldeneye
clever!
A guy getting tortured, writing in this "mirrored" fashion.
May be not!. What if he is writing as usual but video is flipped (right to left) after recording so it shows up normal? This of course would have required logos to be printed on shirt as a mirror image and him to write with his right hand (may be he is already right handed). Hint: Men's shirt usually have buttons on shirt's right go into strip on left side but here it seems to be the other way. Seems it is easy to get mirrored logos printed on a ready-made shirt but to flip over the buttons to other side is difficult.
OK
proxy life
I no slederman proxy
o CIPA
Hello assalamualaikum
Thanks for the comment and peace back to you!
proxy war
I rike anar!
THANKS