Skip to content
  • Features

    Protect

    FiveM Server DDoS Protection

    Let us drive your revenue forward

    Minecraft Server DDoS Protection

    Make your Game Servers load faster

    Anycast Proxy

    Performance and beyond

    Page Rules

    Advanced page rule system

    Load Balancing

    Scale websites reliability

    Edge Compute

    Vietnam

    Unleash Vietnam's Potential, deploy like local

    Web Application Firewall​

    Corporate-level WAF system

    DDoS Protection

    Prevent and detect all attacks

    SSL/TLS

    SSL certificates for all platforms

    Build Your Own Software

    With protected, integrated suite

    Make Money

    Multi-level Affiliate Program

    Become a Lectron Associate and get true profit sharing. It's FREE to sign up!

  • Locations
  • Pricing
  • Merchandise
  • Documentation
  • Blog
Dashboard

Getting Started

  • How to Configure SRV Record Correctly
  • What is Lectron?
  • Getting started
  • Why is this called Armor?
  • How to use the Dashboard
  • Locations
  • Features
  • FAQ
  • Billings
  • how to report high ping to lectron?

Troubleshooting

  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)

Beginner's Guide

  • Proxy Protocol
  • What is UDP Protocol ?
  • What is TCP Protocol?
  • How to Configure SRV Record Correctly
  • What is the internet?
  • What is a Firewall?
  • TCP vs. UDP Comparison
  • Protected: What is a port?
  • What is a DDoS attack?
  • What is a server?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works

Start Crafting

  • Minecraft
  • Basic Commands
  • Craft Rules
  • How to play Minecraft – The Basic
  • How to Start
  • Understanding Hyperthreading in a Minecraft server

Brand

  • Mission
  • Personality
  • Promise
  • Values

Foundations

  • Accessibility
  • Color
  • Grid
  • Iconography
  • Illustrations
  • Logos
  • Typography
  • Images & Videos

Content

  • Inclusive language
  • Language and grammar
  • Messaging guidelines
  • Vocabulary
  • Voice and tone principles
  • Writing style

Components

  • Avatar
  • Avatar group
  • Badge
  • Banner
  • Breadcrumbs
  • Button
  • Checkbox
  • Code
  • Dropdown menu
  • Flag
  • Inline dialog
  • Inline message
  • Logo
  • Lozenge
  • Modal dialog
  • Pagination
  • Progress indicator
  • Progress tracker
  • Radio
  • Section message
  • Select
  • Spinner
  • Tabs
  • Tag
  • Text field
  • Toggle
  • Tooltip

Patterns

  • Benefits modal
  • First impressions
  • Forms
  • Inline edit
  • Messages
  • Page header
  • Spotlight

Resources

  • Color palettes
  • Design principles
  • Figma library
  • Fonts
  • Illustration library
  • Logo library
  • Protected: Presentation kit
  • Sketch library
  • Templates

Attack Types

  • Common Security Threats
  • DDoS through DNS Requests
  • Denial of Service explained
  • SYN Flood
  • TCP Half-Open
  • UDP Flood
  • DNS Reflection Attack
  • Ping of Death ICMP Attack
  • Slowloris Attack
  • Vulnerability Attack
  • Phishing Attacks

To Vietnam

  • OVH Singapore to FPT Vietnam
  • Vultr Singapore to FPT Vietnam
  • Hivelocity Hong Kong to Vietnam

Traceroute To India

  • FPT Hanoi to Tata India
  • Hivelocity New York City to Tata India
  • FPT Hanoi to Digital Ocean India

To Hong Kong

  • VNPT Ho Chi Minh City to Lectron Hong Kong
  • VNPT Hanoi to Leaseweb Hong Kong
  • Viettel Ho Chi Minh City to Lectron Hong Kong
  • Viettel Hanoi to Leaseweb Hong Kong
  • FPT Hanoi to Leaseweb Hong Kong

To Singapore

  • FPT Hanoi to Vultr Singapore
  • Hivelocity New York City to Vultr Singapore

To Lectron

  • Leaseweb Hong Kong to Lectron

FiveM Protection Setup

  • How to add Lectron proxy in server.cfg?
  • How to config FiveM Proxy in Lectron Dashboard?
  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)
  • Whitelist Lectron IP addresses to your FiveM server firewall
  • Use Lectron Dashboard to remote proxy your FiveM server
  • Protecting a Windows Server using a GRE Tunnel
  • Setup GRE Tunnel on Ubuntu 20 Linux Server

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Tunnel Setup

  • Tunnel Setup for Windows Server with 1 public IP (beta)
  • Tunnel Setup for Ubuntu 20.04 or higher
  • Tunnel Setup on Ubuntu with interfaces file

SRV Load Balancing

  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)

Setup DNS for Minecraft Proxy

  • How to Configure SRV Record Correctly

Firewall

  • what is Firewall?

About Load Balancer

  • What is Load Balancer?
  • Load Balancer algorithm
  • Load Balancer components

About FiveM

  • Console commands
  • Installation
  • What is FiveM?

Teamspeak 3 Protection Setup

  • HOW TO PROTECT YOUR TEAMSPEAK 3?

SA-MP

  • How to connect your samp ip to domain?

Minecraft Proxy Setup

  • How to setup Bungeecord Minecraft Proxy?
  • How to setup Spigot Minecraft in Lectron Dashboard?

Proxy Server

  • What is proxy Server?
  • Types of Proxy Server

FiveM DNS config

  • Cloudflare DNS config for FiveM
  • Godaddy DNS config for FiveM
  • Google Domain DNS config for FiveM
  • Porkbun DNS config for FiveM

Minecraft DNS config

  • Cloudflare DNS config for Minecraft
  • Godaddy DNS config for Minecraft
  • Google domains DNS config for Minecraft
  • Porkbun DNS config for Minecraft

Basics of HTTP

  • What is HTTP?
  • What is the purpose of HTTP?
  • How does HTTP work?

Basics of HTTPS

  • What is HTTPS?
  • What is the purpose of HTTPS?
  • How does HTTPS work?
  • Home
  • Docs
  • Proxy Server
  • Types of Proxy Server

Types of Proxy Server

  • Forward Proxy

A forward proxy sits before customers and is utilized to get information to gatherings of clients inside an internal organization. When a solicitation is sent, the proxy server inspects it to conclude whether it ought to continue. Companies and schools regularly utilize these proxy with a ton of representatives. In this situation, the proxy server will analyze the solicitation, and assuming the client has consented, they’ll have the option to associate with

A forward proxy is an ideal decision for interior organizations that need greater security. It allows you to secure your organization and keep things coordinated. Notwithstanding, utilizing a sending proxy will restrict an association’s capacity to give individualized substance.

  • Transparent Proxy

Transparent Proxies are used to unblock websites that are blocked by ISPs, for example, IT University has blocked all the social media. As a business owner, you may have certain sites you need to access for work purposes but are being blocked by your internet service provider. This is where a transparent proxy can help by allowing you to connect through their servers, so that you can still have access to these blocked sites. In addition, they’ll do this without revealing your IP address, so all of your browsing data remains private.

  • Anonymous Proxy

A proxy server is when a computer acts as an intermediary for requests from clients seeking resources from other servers. A proxy server, also known as a gateway or sometimes a firewall, is a computer or system of machines that sits between an organization and the internet. A client will connect to the proxy server and request a service from another server, such as a file, connection, site, or other available resources. The proxy server then evaluates the request according to its filtering rules before passing it on to the designated service provider.

  • High Anonymity Proxy

A high anonymity proxy is a type of proxy server that allows internet users to surf the web anonymously. This means that it will protect the user from anyone trying to track what they’re doing on the internet and see what they’re up to. In some cases, malware can be used to protect someone from hackers who might want to steal their personal information, private data, or other sensitive information.

  • Data Center Proxy

A data center proxy server is a specialized type of network equipment that enables content providers to distribute the workload of serving internet content among their servers. This means that every time someone visits a website, they will be sent to one of many servers in the data center for faster web surfing and reduced load on the site’s servers.

The use of the term ‘load balancing’ refers to the process of distributing incoming requests across a number of servers in order to evenly distribute the load. This increases performance by caching data on hard drives, which are more cost-effective than cloud storage, thus saving time and money.

  • Residential Proxy

“Many people don’t know what a residential proxy is. It can be difficult to find a proxy server that will allow the use of a residential IP address.”

Proxy servers typically allow for more anonymity and faster web browsing, but some proxies restrict what activities they will let you do. When you are using a residential proxy, it is typically not possible to access services that require an anonymous or commercial IP address.

There are many reasons why someone might want to use a residential proxy server, such as bypassing censorship or geolocation restrictions.

  • Public Proxy

A proxy server is a computer that handles requests to other servers on behalf of the original requester. Proxies are often used to reduce network traffic, reduce load on certain servers, prevent access to certain content, or enable caching. They are commonly used in web browsing when a user can’t access a particular website for any reason.

Public proxies are essentially open proxy servers that can be accessed by anyone with an internet connection. They are generally used for anonymity purposes because they can help users bypass firewalls.

  • Shared Proxy

Shared proxy is a method of sharing a single proxy among multiple computers. When using this setup, each computer can specify their own set of rules as to which resources they are allowed to access.

It is sometimes referred to as proxy share and can take two different forms, full-proxy and partial-proxy. A full-proxy shares everything, while a partial-proxy shares only some of the content such as images or scripts.

  • SSL Proxy

SSL proxy is a type of proxy server that helps to encrypt the connection between a client and a target server. SSL proxy can be used to access resources on the internet in a secure manner, so it is widely used in accessing banks and other financial institutions. SSL proxy offers an extra layer of security by encrypting HTTP requests and responses between clients and servers.

An SSL proxy server offers an extra layer of security by encrypting HTTP requests and responses between clients and servers.

  • Rotating Proxy

As the name suggests, a rotating proxy is a type of proxy server which rotates it’s IP address periodically to maintain its anonymity.

Proxy servers are used to mask the IP address of your device and allow you to access content on the internet that might be restricted in your region.

A rotating proxy is just another way to mask the IP address of your device and allow you to access content on the internet that might be restricted in your region.

  • Reverse Proxy

A Reverse Proxy is a type of web server that retrieves resources from a web server on behalf of a client. In this way, the Reverse Proxy may be used to increase the security and speed of internet connections.

A reverse proxy sits between an origin web site and all of its clients, acting as an intermediary for requests from the clients and forwarding responses back to them.

Reverse proxies offer many benefits: they allow you to cache content close to users; they provide an extra layer of security for your origin servers, and they can help optimize traffic usage by limiting how much bandwidth your origin servers need.

How do you feel about this documentation?
Share This Article :
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on December 21, 2021
What is proxy Server?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Metaverse Anti DDoS

Get ready to launch your metaverse to the cosmic guard with Lectron!

Start now →
Discord
Follow Lectron
Facebook Twitter Instagram Linkedin Youtube
Follow Viet York, founder of Lectron
Facebook Twitter Instagram Linkedin Medium Github Twitch
Features
  • Data Center Locations
  • Anycast Proxy
  • DDoS Protection
  • Load Balancing
  • Game Protection
  • Game Acceleration
  • Vietnam
  • Free SSL/TLS
Comparisons
  • Full Comparison Chart
Developers
  • Documentation
Community
  • Facebook
  • Twitter
  • Instagram
  • Discord
  • Facebook Group
Articles
  • Proxy DDoS Protection
Company
  • About Us
  • Careers
  • Our People
  • Success Stories
  • Enterprise
  • Contact Us
Legal
  • Terms
  • Privacy
  • DMCA
Trustpilot
Copyright © 2019-2021 Lectron, Inc. All Rights Reserved