Latest How to configure HAProxy's Proxy Protocol with Squid A customer asked me the other day how to set up Squid Proxy Protocol on their Loadbalancer appliance.
HAProxy How to configure HAProxy's Proxy Protocol with Squid A customer asked me the other day how to set up Squid Proxy Protocol on their Loadbalancer appliance...
How-tos A comprehensive guide to log monitoring with ModSecurity and HAProxy With numerous options available, choosing and configuring the right tool can be daunting...
HAProxy How to limit connections with HAProxy, iptables or nftables Recently I was asked to develop a method to rate limit connections passing through our load balancer to just one! Why? One of our customers had a critical piece of proprietary software in their ar..
How to add SAML to your ADC Portal account Note, SAML can only be added by the ADC Portal Admin for your Organization...
Security Why load balance Security Information and Event Management (SIEM) solutions? SIEM is an organizational octopus, if you will, of log collection, with a tentacle in every corner...
Security Effortlessly monitor load balancer SSL certificates with the ADC Portal If you use HTTPS (SSL or TLS) for your frontend, you must deploy an SSL/TLS certificate on your load balancer to ensure your data remains encrypted...
Security SSH stands for SECURE SHell, not regreSShion Hell... Security is important, but you shouldn’t be losing sleep over every single newly announced CVE...
10 things to try during your ADC Portal free trial During the 90-day free trial you can connect multiple ADCs, manage your connected appliances, and get real-time security alerts...
Security How to automate SSL/TLS certificate renewal with Let's Encrypt How many engineers does it take to renew an SSL/TLS certificate? Several, you might joke. But you may not be far wrong!..
How to (proactively) manage Citrix NetScaler vulnerabilities How to stay on top of any NetScaler vulnerabilities to galvanize your network security...
Security Loadbalancer proud to announce ISO 27001:2022 compliance with NQA certification Loadbalancer is proud to announce that it is now formally ISO 27001 compliant, cementing our position as a market-leader in Application Delivery solutions...
Security The futility of vulnerability scans: Why they're not worth your time and energy! We all want to protect ourselves from cyberattacks, and any tool that can help us proactively monitor our networks and systems has got to be a good thing, right?..
Open source What is Stunnel and how do you configure it? Here is another example of a more “exotic” Stunnel configuration. Most people, and rightly so, will ask “but why?”. Well, because we can!..
How does the Loadbalancer ADC Portal securely connect to your network? With mTLS, the client is required to present its certificate to the server (and visa versa). Hence mutual certificate authentication occurs. This double layer of authentication provides an additional layer of protection against impersonation attacks...
Security What does HTTPS mean? A beginner's guide TLS/SSL encryption of your HTTPS data brings a number of significant benefits, leading to a trusted user experience...
Security Why you don't need to worry about the novel HTTP/2 ‘Rapid Reset’ DDoS attack (CVE-2023-44487) We've had a few concerned customers asking about the Google disclosure of the recent huge DDoS attack, and the potential underlying vulnerability in some HTTP/2 servers...
How-tos How to master SSL termination in HAProxy: considerations and configurations SSL/TLS termination is the most regularly implemented kind of SSL/TLS offload...
A Loadbalancer, object storage, and Veeam partner alliance for superior data protection Data protection is focused on making sure that data remains available and immutable — even after a cybersecurity attack, or system failure. This prevents data loss and facilitates data recovery...
Security Bolster your network with mTLS functionality from Loadbalancer.org For Enterprise 8.9, Loadbalancer.org added a new SSL Terminator for HAProxy, allowing for mutual Transport Layer Security (mTLS) configurations...
How-tos How to configure mTLS on a Loadbalancer.org appliance If you're thinking about giving mTLS a go, why not try it for yourself by following the steps below...
Use Case How Loadbalancer.org helped this medical imaging vendor centrally manage their load balancing estate Enhanced visibility for more efficient and secure ADC management...
Security Five security attacks WAFs can help you with... There seems to be a lot of confusion about the role of a Web Application Firewall (WAF) in application security, and what types of threat a WAF can help mitigate in your deployment...
Security The pros and cons of offloading TLS/SSL encryption and decryption to your ADC TLS encryption (formerly known as SSL encryption) is used to improve the safety of data exchanged over a network. But where should it sit in your network architecture?..
WAF When and how should you use a Web Application Firewall? Some network engineers think that Web Application Firewalls (WAFs) are so complicated, they've been known to run away and hide for days when they've encountered one...