Loadbalancer
  • Solutions
  • Products
  • Pricing
  • Resources
  • Company
  • Contact us
Portal login
Talk to us Get started

Enhanced security

Security that never sleeps

Peak performance

Performance that scales with you

Zero downtime

Because that’s what matters

Multi-site resilience

True high-availability and failover, made easy

Industry solutions

Expertise in healthcare, object storage, and mission critical industries

Application solutions

Every application, documented with care

Partner solutions

Professional services

The ADC Portal

Any load balancer, anywhere, one simple platform

The Enterprise ADC

Smart, flexible, unbreakable — and trusted

Flexible licensing

No hidden costs,  no end of life — just great value

Get a quote

Get technical support

Reviews

based on 1,500+ reviews

Customer stories

Blog

Events

Not your average Load balancer company

Learn why we are different

How to connect and manage a Citrix NetScaler in the Loadbalancer ADC Portal

As a NetScaler specialist, they asked me to test the product and share my honest thoughts.
  • Solutions
  • ADC Enterprise
  • ADC Portal
  • Pricing
  • Company
  • Resources
  • Blog
  • Contact us
Collection of 90 posts

Security

No laughing matter

Back to all posts
How to configure HAProxy's Proxy Protocol with Squid
Latest

How to configure HAProxy's Proxy Protocol with Squid

A customer asked me the other day how to set up Squid Proxy Protocol on their Loadbalancer appliance.

Recent blogs

All posts
  • Healthcare
  • Storage
  • Print
  • Security
  • Microsoft
More Categories
    • F5 / Citrix / Kemp
    • HAProxy
    • Direct Server Return
    • Global Server Load Balancing
    • Web Application Firewall
    • AWS / Azure / GCP
    • Comparisons
    • Load Balancing How-tos
How to configure HAProxy's Proxy Protocol with Squid
HAProxy

How to configure HAProxy's Proxy Protocol with Squid

A customer asked me the other day how to set up Squid Proxy Protocol on their Loadbalancer appliance...
Neil Stone
• 4 mins
A comprehensive guide to log monitoring with ModSecurity and HAProxy
How-tos

A comprehensive guide to log monitoring with ModSecurity and HAProxy

With numerous options available, choosing and configuring the right tool can be daunting...
Kevin-Lucas Stroe
• 18 mins
How to limit connections with HAProxy, iptables or nftables
HAProxy

How to limit connections with HAProxy, iptables or nftables

Recently I was asked to develop a method to rate limit connections passing through our load balancer to just one!   Why? One of our customers had a critical piece of proprietary software in their ar..
Andrei Grigoras
• 6 mins
How to add SAML to your ADC Portal account

How to add SAML to your ADC Portal account

Note, SAML can only be added by the ADC Portal Admin for your Organization...
Greg Ashwell
• 3 mins
Why load balance Security Information and Event Management (SIEM) solutions?
Security

Why load balance Security Information and Event Management (SIEM) solutions?

SIEM is an organizational octopus, if you will, of log collection, with a tentacle in every corner...
Nicholas Turnbull
• 6 mins
Effortlessly monitor load balancer SSL certificates with the ADC Portal
Security

Effortlessly monitor load balancer SSL certificates with the ADC Portal

If you use HTTPS (SSL or TLS) for your frontend, you must deploy an SSL/TLS certificate on your load balancer to ensure your data remains encrypted...
Kyle Clinton
• 4 mins
SSH stands for SECURE SHell, not regreSShion Hell...
Security

SSH stands for SECURE SHell, not regreSShion Hell...

Security is important, but you shouldn’t be losing sleep over every single newly announced CVE...
Damian Pacuszka
• 3 mins
10 things to try during your ADC Portal free trial: Centralized management made easy

10 things to try during your ADC Portal free trial: Centralized management made easy

During the 90-day free trial you can connect multiple ADCs, manage your connected appliances, and get real-time security alerts...
Kyle Clinton
• 8 mins
How to automate SSL/TLS certificate renewal with Let's Encrypt
Security

How to automate SSL/TLS certificate renewal with Let's Encrypt

How many engineers does it take to renew an SSL/TLS certificate? Several, you might joke. But you may not be far wrong!..
Damian Pacuszka
• 9 mins
How to (proactively) manage Citrix NetScaler vulnerabilities

How to (proactively) manage Citrix NetScaler vulnerabilities

How to stay on top of any NetScaler vulnerabilities to galvanize your network security...
Mick Hilhorst
• 5 mins
Loadbalancer proud to announce ISO 27001:2022 compliance with NQA certification
Security

Loadbalancer proud to announce ISO 27001:2022 compliance with NQA certification

Loadbalancer is proud to announce that it is now formally ISO 27001 compliant, cementing our position as a market-leader in Application Delivery solutions...
Ash Jenvey
• 3 mins
The futility of vulnerability scans: Why they're not worth your time and energy!
Security

The futility of vulnerability scans: Why they're not worth your time and energy!

We all want to protect ourselves from cyberattacks, and any tool that can help us proactively monitor our networks and systems has got to be a good thing, right?..
Damian Pacuszka
• 5 mins
What is Stunnel and how do you configure it?
Open source

What is Stunnel and how do you configure it?

Here is another example of a more “exotic” Stunnel configuration. Most people, and rightly so, will ask “but why?”. Well, because we can!..
Damian Pacuszka
• 4 mins
How does the Loadbalancer ADC Portal securely connect to your network?

How does the Loadbalancer ADC Portal securely connect to your network?

With mTLS, the client is required to present its certificate to the server (and visa versa). Hence mutual certificate authentication occurs. This double layer of authentication provides an additional layer of protection against impersonation attacks...
Andrew Zak
• 3 mins
What does HTTPS mean? A beginner's guide
Security

What does HTTPS mean? A beginner's guide

TLS/SSL encryption of your HTTPS data brings a number of significant benefits, leading to a trusted user experience...
Greg Ashwell
• 5 mins
Why you don't need to worry about the novel HTTP/2 ‘Rapid Reset’ DDoS attack (CVE-2023-44487)
Security

Why you don't need to worry about the novel HTTP/2 ‘Rapid Reset’ DDoS attack (CVE-2023-44487)

We've had a few concerned customers asking about the Google disclosure of the recent huge DDoS attack, and the potential underlying vulnerability in some HTTP/2 servers...
Malcolm Turnbull
• 2 mins
How to master SSL termination in HAProxy: considerations and configurations
How-tos

How to master SSL termination in HAProxy: considerations and configurations

SSL/TLS termination is the most regularly implemented kind of SSL/TLS offload...
Joe Robinson
• 7 mins
A Loadbalancer, object storage, and Veeam partner alliance for superior data protection

A Loadbalancer, object storage, and Veeam partner alliance for superior data protection

Data protection is focused on making sure that data remains available and immutable — even after a cybersecurity attack, or system failure. This prevents data loss and facilitates data recovery...
Joshua Turnbull
• 4 mins
Bolster your network with mTLS functionality from Loadbalancer.org
Security

Bolster your network with mTLS functionality from Loadbalancer.org

For Enterprise 8.9, Loadbalancer.org added a new SSL Terminator for HAProxy, allowing for mutual Transport Layer Security (mTLS) configurations...
Neil Hosking
• 6 mins
Employee configuring mTLS on a Loadbalancer.org appliance
How-tos

How to configure mTLS on a Loadbalancer.org appliance

If you're thinking about giving mTLS a go, why not try it for yourself by following the steps below...
Neil Hosking
• 3 mins
How Loadbalancer.org helped this medical imaging vendor centrally manage their load balancing estate
Use Case

How Loadbalancer.org helped this medical imaging vendor centrally manage their load balancing estate

Enhanced visibility for more efficient and secure ADC management...
Liam Canavan
• 3 mins
Cybersecurity series: Five security attacks WAFs can help you with...
Security

Cybersecurity series: Five security attacks WAFs can help you with...

There seems to be a lot of confusion about the role of a Web Application Firewall (WAF) in application security, and what types of threat a WAF can help mitigate in your deployment...
Nicholas Turnbull
• 5 mins
man typing on laptop working
Security

The pros and cons of offloading TLS/SSL encryption and decryption to your ADC

TLS encryption (formerly known as SSL encryption) is used to improve the safety of data exchanged over a network. But where should it sit in your network architecture?..
Neil Stone
• 6 mins
man with glasses thinking
WAF

When and how should you use a Web Application Firewall?

Some network engineers think that Web Application Firewalls (WAFs) are so complicated, they've been known to run away and hide for days when they've encountered one...
Nicholas Turnbull
• 8 mins

Get Started Today, for Free

Try us out—no strings, no stress, just seriously good load balancing and top-notch support. Let's make your apps unstoppable!

Try for free Book a meeting
  • Load balancer
    • Zero Downtime
    • Enhanced Security
    • Peak Performance
    • Industry Solutions
    • ADC Comparison
    • Citrix NetScaler Migration
  • Product
    • Enterprise ADC
    • ADC Portal
    • Pricing
    • ADC Free Trial
    • Portal Free Trial
  • Features
    • Layer 4 & Layer 7
    • WAF
    • GSLB
    • Reverse Proxy
    • Feedback Agent
  • Company
    • It’s About You
    • Solutions
    • Load Balancer
    • HPE Partnership
  • Resources
    • Applications
    • Blog
    • Case Studies
    • Documentation
    • Quick Start
  • Support
    • Open Support Ticket
    • Security News
    • Reviews

Connect

Contact

  • Tel: +1 833 274 2566
  • Email: [email protected]

2025 Loadbalancer.org, Inc.

  • Contact
  • Privacy
  • Terms
  • Legal
Navigate
Close