Skip to content
  • Features

    Protect

    FiveM Server DDoS Protection

    Let us drive your revenue forward

    Minecraft Server DDoS Protection

    Make your Game Servers load faster

    Anycast Proxy

    Performance and beyond

    Page Rules

    Advanced page rule system

    Load Balancing

    Scale websites reliability

    Edge Compute

    Vietnam

    Unleash Vietnam's Potential, deploy like local

    Web Application Firewall​

    Corporate-level WAF system

    DDoS Protection

    Prevent and detect all attacks

    SSL/TLS

    SSL certificates for all platforms

    Build Your Own Software

    With protected, integrated suite

    Make Money

    Multi-level Affiliate Program

    Become a Lectron Associate and get true profit sharing. It's FREE to sign up!

  • Locations
  • Pricing
  • Merchandise
  • Documentation
  • Blog
Dashboard

Getting Started

  • How to Configure SRV Record Correctly
  • What is Lectron?
  • Getting started
  • Why is this called Armor?
  • How to use the Dashboard
  • Locations
  • Features
  • FAQ
  • Billings
  • how to report high ping to lectron?

Troubleshooting

  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)

Beginner's Guide

  • Proxy Protocol
  • What is UDP Protocol ?
  • What is TCP Protocol?
  • How to Configure SRV Record Correctly
  • What is the internet?
  • What is a Firewall?
  • TCP vs. UDP Comparison
  • Protected: What is a port?
  • What is a DDoS attack?
  • What is a server?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works

Start Crafting

  • Minecraft
  • Basic Commands
  • Craft Rules
  • How to play Minecraft – The Basic
  • How to Start
  • Understanding Hyperthreading in a Minecraft server

Brand

  • Mission
  • Personality
  • Promise
  • Values

Foundations

  • Accessibility
  • Color
  • Grid
  • Iconography
  • Illustrations
  • Logos
  • Typography
  • Images & Videos

Content

  • Inclusive language
  • Language and grammar
  • Messaging guidelines
  • Vocabulary
  • Voice and tone principles
  • Writing style

Components

  • Avatar
  • Avatar group
  • Badge
  • Banner
  • Breadcrumbs
  • Button
  • Checkbox
  • Code
  • Dropdown menu
  • Flag
  • Inline dialog
  • Inline message
  • Logo
  • Lozenge
  • Modal dialog
  • Pagination
  • Progress indicator
  • Progress tracker
  • Radio
  • Section message
  • Select
  • Spinner
  • Tabs
  • Tag
  • Text field
  • Toggle
  • Tooltip

Patterns

  • Benefits modal
  • First impressions
  • Forms
  • Inline edit
  • Messages
  • Page header
  • Spotlight

Resources

  • Color palettes
  • Design principles
  • Figma library
  • Fonts
  • Illustration library
  • Logo library
  • Protected: Presentation kit
  • Sketch library
  • Templates

Attack Types

  • Common Security Threats
  • DDoS through DNS Requests
  • Denial of Service explained
  • SYN Flood
  • TCP Half-Open
  • UDP Flood
  • DNS Reflection Attack
  • Ping of Death ICMP Attack
  • Slowloris Attack
  • Vulnerability Attack
  • Phishing Attacks

To Vietnam

  • OVH Singapore to FPT Vietnam
  • Vultr Singapore to FPT Vietnam
  • Hivelocity Hong Kong to Vietnam

Traceroute To India

  • FPT Hanoi to Tata India
  • Hivelocity New York City to Tata India
  • FPT Hanoi to Digital Ocean India

To Hong Kong

  • VNPT Ho Chi Minh City to Lectron Hong Kong
  • VNPT Hanoi to Leaseweb Hong Kong
  • Viettel Ho Chi Minh City to Lectron Hong Kong
  • Viettel Hanoi to Leaseweb Hong Kong
  • FPT Hanoi to Leaseweb Hong Kong

To Singapore

  • FPT Hanoi to Vultr Singapore
  • Hivelocity New York City to Vultr Singapore

To Lectron

  • Leaseweb Hong Kong to Lectron

FiveM Protection Setup

  • How to add Lectron proxy in server.cfg?
  • How to config FiveM Proxy in Lectron Dashboard?
  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)
  • Whitelist Lectron IP addresses to your FiveM server firewall
  • Use Lectron Dashboard to remote proxy your FiveM server
  • Protecting a Windows Server using a GRE Tunnel
  • Setup GRE Tunnel on Ubuntu 20 Linux Server

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Tunnel Setup

  • Tunnel Setup for Windows Server with 1 public IP (beta)
  • Tunnel Setup for Ubuntu 20.04 or higher
  • Tunnel Setup on Ubuntu with interfaces file

SRV Load Balancing

  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)

Setup DNS for Minecraft Proxy

  • How to Configure SRV Record Correctly

Firewall

  • what is Firewall?

About Load Balancer

  • What is Load Balancer?
  • Load Balancer algorithm
  • Load Balancer components

About FiveM

  • Console commands
  • Installation
  • What is FiveM?

Teamspeak 3 Protection Setup

  • HOW TO PROTECT YOUR TEAMSPEAK 3?

SA-MP

  • How to connect your samp ip to domain?

Minecraft Proxy Setup

  • How to setup Bungeecord Minecraft Proxy?
  • How to setup Spigot Minecraft in Lectron Dashboard?

Proxy Server

  • What is proxy Server?
  • Types of Proxy Server

FiveM DNS config

  • Cloudflare DNS config for FiveM
  • Godaddy DNS config for FiveM
  • Google Domain DNS config for FiveM
  • Porkbun DNS config for FiveM

Minecraft DNS config

  • Cloudflare DNS config for Minecraft
  • Godaddy DNS config for Minecraft
  • Google domains DNS config for Minecraft
  • Porkbun DNS config for Minecraft

Basics of HTTP

  • What is HTTP?
  • What is the purpose of HTTP?
  • How does HTTP work?

Basics of HTTPS

  • What is HTTPS?
  • What is the purpose of HTTPS?
  • How does HTTPS work?
  • Home
  • Docs
  • About Load Balancer
  • Load Balancer components

Load Balancer components

Load Balancer includes a few key features. These sections can be customized for your subscription with:

  • portal
  • CLI
  • PowerShell
  • Resource Manager Templates

Frontend IP configuration
The IP address of your Load Balancer. It is a point of contact for customers. These IP addresses can be:

  • Public IP Address
  • Private IP Address

The IP address type determines the type of load balancer created. The choice of private IP addresses makes an internal balancer load. The option of public IP addresses creates a balance of public responsibility.

Public load balancer
Internal load balancer
Frontend IP configurationPublic IP addressPrivate IP address
DescriptionThe public load balancer maps the public IP and the incoming traffic port to the private IP and the VM port. Upload balancer maps traffic alternately around response traffic from VM. You can distribute certain types of traffic across multiple VMs or services by using load balancing rules. For example, you can distribute web application load across multiple web servers.Internal Upload Balancer delivers traffic to in-app resources. Restricts access to the forwarded IP addresses of the virtual network. Previous IP addresses and actual networks were never displayed directly on the Internet repository. Internal business applications that run on and are available within or from local resources.
SKUs supportedBasic, StandardBasic, Standard

Backend pool

A group of visual equipment or conditions in a set of machine scales that indicate an incoming application. Computer guides generally recommend adding multiple scenarios to the back pool to measure cost-effectiveness to meet the maximum volume of incoming traffic.

Load balancer immediately rebuilds with automatic reset when you measure conditions up or down. Adding or removing VMs in the back pool also prepares the load balancer without additional operation. The width of the rear pool of any machine is visible on a single visual network.

When you think about how to build your backyard pool, build a small number of backend pool resources to do with the length of the management tasks. There is no difference in the performance of the data plane or the scale.

Health probes

Health research is used to determine the condition of the conditions in the back pool. When creating a balancer load, prepare a health check for the load balancer to be used. This health check will determine if the condition is healthy and can get traffic.

You can define an unhealthy limit on your health probes. When the investigation fails to respond, the upload balancer stops sending new connections in adverse conditions. Investigation failure does not interfere with existing communication. The connection continues until the request:

Ends the flow
The end of the idle period took place
VM shuts down
The loading balancer offers a variety of health screening endpoints: TCP, HTTP, and HTTPS. Learn more about Load Balancer Health projects.

The basic load balancer does not support HTTPS methods. The Basic load balancer shuts down all TCP connections (including established connections).

Load-balancing rules

The balancer load rule defines how incoming traffic is distributed in all conditions within the rear pool. The load balancing principle measures the configuration of the front IP and the hole in most backend IP addresses and ports.

For example, use the Route 80 measurement law to move traffic from your front IP to port 80 of your background.

High Availability Ports

Balancer load rule provided with ‘protocol – all and port – 0’.

This rule empowers one law to load-balance all TCP and UDP flows that reach all internal Standard Load Balancer ports.

The decision to measure the load is made for each flow. This action is subject to the connection of the following five Vehicles:

  1. source IP address
  2. source port
  3. destination IP address
  4. destination port
  5. protocol

The rules of HA in the port of measurement load help you with critical situations, such as high availability and scale of network material (NVAs) within virtual networks. The feature can be helpful when a large number of ports should be limited to the load

Inbound NAT rules
Incoming NAT rule forwards incoming traffic sent to the previous IP address and port integration. Traffic is sent to a specific virtual machine, for example, in a back pool. The port transfer is done with the same hash-based distribution as load balancing.

Outbound rules
Outgoing rule corrects network outage (NAT) output on all visible devices or situations identified in the back pool. This rule enables the conditions behind the connection (outgoing) to the Internet or other endpoints.

Limitations

  • Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
  • Outbound flow from a backend VM to a frontend of an internal Load Balancer will fail.
  • A load balancer rule cannot span two virtual networks. All load balancer frontends and their backend instances must be in a single virtual network.
  • Forwarding IP fragments isn’t supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn’t supported on load-balancing rules. HA ports load-balancing rules can be used to forward existing IP fragments. For more information, see High availability ports overview.
  • You can only have 1 Public Load Balancer and 1 internal Load Balancer per availability set
How do you feel about this documentation?
Share This Article :
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on August 26, 2021
Load Balancer algorithm

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Metaverse Anti DDoS

Get ready to launch your metaverse to the cosmic guard with Lectron!

Start now →
Discord
Follow Lectron
Facebook Twitter Instagram Linkedin Youtube
Follow Viet York, founder of Lectron
Facebook Twitter Instagram Linkedin Medium Github Twitch
Features
  • Data Center Locations
  • Anycast Proxy
  • DDoS Protection
  • Load Balancing
  • Game Protection
  • Game Acceleration
  • Vietnam
  • Free SSL/TLS
Comparisons
  • Full Comparison Chart
Developers
  • Documentation
Community
  • Facebook
  • Twitter
  • Instagram
  • Discord
  • Facebook Group
Articles
  • Proxy DDoS Protection
Company
  • About Us
  • Careers
  • Our People
  • Success Stories
  • Enterprise
  • Contact Us
Legal
  • Terms
  • Privacy
  • DMCA
Trustpilot
Copyright © 2019-2021 Lectron, Inc. All Rights Reserved