TLS offloading
HAProxy
Before you start
6 min
verify your environment meets these requirements supported hardware {{vectera}} , 7 2 x x or later supported operating systems linux required access an account on the {{vectera}} with administrator permissions to create application partitions, identities, tls pki, and update system settings local administrator/root privileges on the computer where haproxy is installed network and firewall allow outbound tcp port 9100 (default excrypt port) from the computer running haproxy to the {{vectera}} , specified by fqdn (for example, hsm example com ) or cidr (for example, 10 0 0 0/24 ) tls inspection or ssl proxies can break mutual tls handshakes exempt the {{vectera}} fqdn(s) from inspection configure the vectera plus with a fqdn so the exemption applies other openssl 3 0 7+ python 3 curl pkcs11 provider ( github com/latchset/pkcs11 provider ) (must be built from source ( github com/latchset/pkcs11 provider/blob/main/build md )) haproxy ( www haproxy org http //www haproxy org ) (can install through the default package manager in most linux distributions)