High Performance Security

The world’s most demanding web sites trust HAProxy Enterprise as their frontline defense to a myriad of attacks. HAProxy Enterprise delivers peace of mind by immobilizing threats at the edge without sacrificing the best-in-class performance that it’s known for.

HAProxy Enterprise detects and stops DDoS attacks, brute force and credential stuffing attempts, web scraping, and vulnerability scanning. With advanced logging, it identifies intrusion attempts and assures protocol compliance.

Learn how leading companies implement HAProxy Enterprise security solutions

Our customers use HAProxy Enterprise to achieve the utmost performance, observability, and security. HAProxy Enterprise security solutions are deployed to protect some of the most popular websites in the world.

DDoS Attack and Bot Protection with HAProxy Enterprise

We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, watch this on-demand webinar to see how you can use HAProxy Enterprise to create an effective, high performance threat protection solution.

haproxy_multilayer_security_illustration

Multilayered Security

Identifying and stopping threats in today’s ever-changing security landscape requires a multilayered approach. HAProxy delivers peace of mind by immobilizing threats at the edge without sacrificing the best-in-class performance that it’s known for.

 

haproxy_multilayer_security_illustration

LAYER 1 – Access Control Lists (ACLs)

The first layer is our flexible Access Control Lists (ACLs). They match on custom-defined criteria, allowing you to make routing decisions and implement protection mechanisms based on anything found within the request/response headers or metadata. You can easily create policies that match clients and requests by IP range, SSL data, headers or paths, geolocation, and device type.

ACL, Map files, and TLS ticket keys can be updated from a central location at a defined interval using the dynamic update module included in HAProxy Enterprise.

LAYER 2 – Client Fingerprinting

The second layer provides the ability to identify a client regardless of user-agent or IP address. HAProxy Enterprise generates a fingerprint for clients allowing for identification from the very first request.

Client fingerprinting is very useful for identifying bots and vulnerability scanners.

LAYER 3 – Realtime Cluster-wide Tracking

The third layer of defense deploys behavior-analysis across your entire cluster of proxies. HAProxy Enterprise performs real-time tracking of client requests and stores that data to form big-picture insights about what a client may be trying to do.

Track behavior based on IP address, User-Agent string, session ID, and request path, and much more. Generated metrics include requests/sec, total number of requests made, errors/sec, total number of errors, byte rates, and more.

LAYER 4 – Web Application Firewall (WAF)

HAProxy Enterprise provides a fourth layer of defense: an integrated triple-mode Web Application Firewall (WAF). The WAF detects and stops Layer 7 attacks including SQL injection and cross-site scripting.

The HAProxy Enterprise WAF comes with support for ModSecurity rulesets, zero-trust mode, and an optional, simplified, set-and-forget SQLi / XSS WAF mode. Learn more about the HAProxy Enterprise WAF.

HAProxy Enterprise Security Features Include

Reverse Proxy

Proxy all traffic from the Internet to your application servers through HAProxy Enterprise, exposing only intended services and logging requests.

HTTP Validation

Validate that requests comply with the protocol specifications before sending them on to application servers.

WAF Module

Enable the high performance Web Application Firewall, which supports multiple modes including custom signature-based support, zero-trust mode, and ModSecurity ruleset support.

Anomalous Behavior Protection

Combine multiple metrics about a client’s behavior for smarter routing and access decisions.

Dynamic ACL Updates

Update ACL, Map, or TLS ticket key files in memory normally loaded from disk during HAProxy Enterprise startup during runtime.

Advanced Application-Based DDoS Protection

Block requests from clients based on multiple metrics and criteria over a configurable time window.

Antibot Module

Send a Javascript challenge to requests selected by ACL rules.

reCAPTCHA v2

Present a Google reCAPTCHA v2 or v3 challenge to clients that exhibit anomalous traffic patterns.

Sanitize Module

Filter and verify that HTTP header names and contents comply with the HTTP specification.

Fingerprint Module

Generate a unique identifier based on a client request.

Traffic Filtering

Use ACLs to detect any condition in HTTP(S) traffic and route or block the request as desired.

Search Engine Verification

Check the authenticity of any client that claims to be a search engine crawler and enforce response policies against those it categorizes as phony. The verification is performed in the background in real-time so that legitimate web crawlers are not blocked.

Contact the authoritative experts on HAProxy who will assist you in finding the solution that best fits your needs for deployment, scale, and security.

Featured Resources

Visit our knowledge base to explore more topics