{"id":4186,"date":"2022-11-03T18:27:29","date_gmt":"2022-11-03T09:27:29","guid":{"rendered":"https:\/\/tech.akat.info\/?p=4186"},"modified":"2022-11-03T18:27:29","modified_gmt":"2022-11-03T09:27:29","slug":"forward-proxy%e3%81%ae%e3%83%a1%e3%83%aa%e3%83%83%e3%83%88%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6","status":"publish","type":"post","link":"https:\/\/tech.akat.info\/?p=4186","title":{"rendered":"Forward Proxy\u306e\u30e1\u30ea\u30c3\u30c8\u306b\u3064\u3044\u3066"},"content":{"rendered":"<p><a href=\"https:\/\/www.youtube.com\/watch?v=4NB0NDtOwIQ\">Proxy vs Reverse Proxy (Real-world Examples)<\/a>\u3092\u95b2\u89a7\u3057\u305f\u3002\u305d\u306e\u6642\u306e\u30e1\u30e2\u3002<\/p>\n<h2>protects the client&#8217;s online identity<\/h2>\n<p>\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306eIP\u30a2\u30c9\u30ec\u30b9\u304c\u96a0\u308c\u3066\u3044\u308b\u305f\u3081\u30c8\u30e9\u30c3\u30ad\u30f3\u30b0\u3057\u3065\u3089\u3044\u3002<\/p>\n<h2>bypasses browsing restrictions<\/h2>\n<p>\u30d5\u30a1\u30a4\u30e4\u30fc\u30a6\u30a9\u30fc\u30eb\u3067\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u5236\u9650\u3057\u3066\u3044\u308b\u5834\u5408\u3001\u30d7\u30ed\u30ad\u30b7\u3092\u4f7f\u3046\u3053\u3068\u3067\u5236\u9650\u304b\u3089\u9003\u308c\u3089\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002<\/p>\n<h2>blocks access to certain content<\/h2>\n<p>\u3059\u3079\u3066\u306e\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u304c\u30d7\u30ed\u30ad\u30b7\u3092\u5229\u7528\u3059\u308b\u3088\u3046\u306b\u69cb\u6210\u3057\u3001\u30bd\u30fc\u30b7\u30e3\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306a\u3069\u306e\u30b5\u30a4\u30c8\u3092\u8a31\u53ef\u3057\u306a\u3044\u3088\u3046\u306b\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u30eb\u30fc\u30eb\u3092\u9069\u7528\u3059\u308b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Proxy vs Reverse Proxy (Real-world Examples)\u3092\u95b2\u89a7\u3057\u305f\u3002\u305d\u306e\u6642\u306e\u30e1\u30e2\u3002 protects the client&#8217;s online identity \u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306eI [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/4186"}],"collection":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4186"}],"version-history":[{"count":1,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/4186\/revisions"}],"predecessor-version":[{"id":4187,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/4186\/revisions\/4187"}],"wp:attachment":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}