amazon ec2 - Can HAProxy front both Web servers and SSL VPN on one IP and port? -


While sitting on an IP / server, I have a reverse proxy in front of both the original web server and SSL VPN Edoto (SSL Explorer Fork). Required i port Failed to get it with Nginx Failed to use Adito as a normal reverse HTTP proxy.

Does HAPRCC not understand an HTTP TCP proxy? In other words, this layer may fall back to 4 if its layer 7 inspection determines that it is not HTTP traffic?

This is my setup

  • EC2 machine with a public IP (elastic IP).
  • Only one port is open - 443.
  • The station is sitting at 443 and traffic is going on for proxy (I do not like it using the stanel, but unlike the NGX in the HaProxy, there is no full support for SSL).
  • HAProxy has some HTTP traffic to a server (Apache server which is the front of the SVN server) and the rest of the HTTP traffic to our Lablz Web / App server.
  • All non-HTT traffic should be forwarded to Adobe VPN
    • This traffic is:
      • VNC, NX, SMB
      • .. And all other protocols that support Adito.

I split the traffic on the source IP address or port Can not trust HTTP and non-HTTP

So, can HAProxy be done in such a configuration? Can any other reverse proxy be used for this? I know I'm not right about Haproxy and an alternative approach is possible.

BTW, Adola SSL VPN is amazing and if this setup works then we will click Lablez developers to access one-click cloud-accessible VNC-over-HTTPS access to your boxes.

There is no solution for this but through Adito - please prove me wrong but please do not say that VNC is better at SSH. Yes, VNC-over-SSH is faster, more secure, but also to setup (our goal is for the user base) is very difficult and believes that the user is behind the firewall, which allows outbound traffic at port 22 (Not always the case). In addition, Adito is much more than the remote gateway - it has full blown browser VPN in browser, a software distribution platform and more. I'm not affiliated with Adito people - see me.

OK, firstly, I have a simple firewall to split all the HTTPs from non-HTTP traffic . What is the need for packet inspection to find out what you need, which is coming in.

Neither hyperoxic or enzymes can do this. They are both for the the web traffic and I do not know they can estimate traffic what they are doing.

Update: It may be seen with a little more iptables in that you can probably use devide string matching for traffic . However, it is all difficult, especially with encrypted nature. A friend of mine has been discovered and looks like what you want. I know that it helps.


Comments

Popular posts from this blog

python - Overriding the save method in Django ModelForm -

html - CSS autoheight, but fit content to height of div -

qt - How to prevent QAudioInput from automatically boosting the master volume to 100%? -