- A website doesn't go down from an attack. Even if thousands of requests are sent to it, the traffic cleaning server will take the hit.
- The real IP of your server remains hidden. This protects against direct attacks.
- Content opens quickly. Requests are served by the servers closest to the user (this works like a CDN).
- Less load on your server. The proxy server itself distributes the cache and handles part of the requests.
At the application level (L7 OSI), each request goes through a series of filters. Here are the main ones:
- Redirect to HTTPS. All requests redirect to secure connection, if option is enabled.
- Block list. If an IP is on the list, the request is blocked.
- Tor ban. You can block access from Tor networks.
- Allow list. IPs you trust are bypass filters.
- Bot mitigation. The system distinguishes real users from automated scripts.
- Requests are evaluated for attack patterns. Suspicious ones are checked: JS-challenge, CAPTCHA, etc.
How to order site protection read in the next article.