Let us drive your revenue forward
Make your Game Servers load faster
Performance and beyond
Advanced page rule system
Scale websites reliability
Unleash Vietnam's Potential, deploy like local
Corporate-level WAF system
Prevent and detect all attacks
SSL certificates for all platforms
With protected, integrated suite
Become a Lectron Associate and get true profit sharing. It's FREE to sign up!
The Proxy Protocol was designed to chain proxies / reverse-proxies without losing the client information.
A proxy will use its own IP stack to get connected to remote servers. Because of this, we lose the initial TCP connection information like source and destination IP and port when a proxy is involved in architecture.
That said, a few workarounds exist, like:
The problem with these workarounds is that they are either protocol-related or require architecture changes, preventing scalability.
That’s where the proxy protocol comes in:
The is only one condition: both endpoints of the connection MUST be compatible with the proxy protocol. This could be either proxy, reverse-proxies, load-balancers, WAF, application servers, etc….
The description of the protocol by Willy, HAProxy developer: proxy protocol.
And a few articles speaking about the subject:
The list below summarizes which software have already implemented the proxy protocol:
But it would be good they do it:
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
Get ready to launch your metaverse to the cosmic guard with Lectron!