Load Balancing RADIUS with HAProxy Enterprise UDP Module
HAProxy Enterprise now supports RADIUS load balancing with the new HAProxy Enterprise UDP Module. We'll outline the challenges with implementing RADIUS load balancing and how to solve them.
Daniel is a writer for HAProxy Technologies, crafting content about the latest solutions and developments. With deep experience across several industries, Daniel is experienced in generating content on load balancing, cybersecurity, consumer technology, professional graphics, and HPC/Hypercscale-class GPU computing.
HAProxy Enterprise now supports RADIUS load balancing with the new HAProxy Enterprise UDP Module. We'll outline the challenges with implementing RADIUS load balancing and how to solve them.
With HAProxy ALOHA 16 comes our next-generation WAF, new load balancing algorithms, upgraded Linux kernel to 6.1, and better isolation of admin services.
We show you how to implement rate limiting based on the ID of the Virtual Private Cloud in Amazon Web Services using HAProxy Enterprise.
Watch our Lightning Talk at AWS re:Invent 2023 on how HAProxy Fusion and HAProxy Enterprise enable simple and scalable load balancing and security on AWS.
To avoid overspending, businesses should reevaluate their security vendors and prioritize a more cost-effective approach.
When it comes to key technology purchases, businesses should look for two attributes: cost efficiency and flexibility.
HAProxy Technologies showcased its deep, targeted, and scalable security at Black Hat USA 2023.
Improvements in acme.sh integration allows you to manage TLS certificates with Let’s Encrypt without restarting HAProxy.
Spring marks a season of growth, and HAProxy was in full bloom in the Spring 2023 G2 reports. Our users continue to share their positive experiences .
KCD France 2023 was a pleasure for our team. It was great connecting with HAProxy users, especially from the Kubernetes and cloud-native community.
This blog post will discuss web threats and how to protect yourself against DDoS attacks, web scraping, brute-force attacks, and vulnerability scanning.
In this blog post, you will read how containers have become one of the most efficient ways of virtually deploying applications.
Showing 1 of 2 Pages