Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Have haproxy pass a variety of request types

    Scheduled Pinned Locked Moved Cache/Proxy
    4 Posts 2 Posters 432 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pfdog
      last edited by pfdog

      This back-end action currently works to present https://subdom.dom.org

      http-request header set
      name: Host, fmt: sub.dom.org	
      

      Now, to additionally accommodate requests such as https://dom.org:8443, which additional action parameters are best? Any source of haproxy recipes (in a pfsense context) would be greatly appreciated.

      P 1 Reply Last reply Reply Quote 0
      • P
        pfdog @pfdog
        last edited by pfdog

        So, I generated an additional certificate using the "standalone HTTP server" method, which allows HTTP port specification. Maybe this is not the most efficient approach, but it works for my current purpose. (A drawback of this approach is that the acme cert has to be manually renewed since a NAT port rule is used to validate the cert, and disabled otherwise.)

        1 Reply Last reply Reply Quote 0
        • dragoangelD
          dragoangel
          last edited by

          em you waiting for man who will take you by hand for configuring your haproxy from scratch? Go to google\youtube and check(read\watch) manuals. In short way you issue letsencrypt isn't correct. It must be implemented in HAproxy by LUA script or via DNS validation but then you need provide API access to your DNS provider and this provider need to be supported by ACME plugin - otherwise as you already understand you will have to manually trigger cert renew which isn't OK at all. For work with HTTPS offloading you need create new shared https fronend on HAproxy and configure it same way as you done for HTTP, and HTTP create rule to 301 all traffic to HTTP location.

          Latest stable pfSense on 2x XG-7100 and 1x Intel Xeon Server, running mutiWAN, he.net IPv6, pfBlockerNG-devel, HAProxy-devel, Syslog-ng, Zabbix-agent, OpenVPN, IPsec site-to-site, DNS-over-TLS...
          Unifi AP-AC-LR with EAP RADIUS, US-24

          P 1 Reply Last reply Reply Quote 0
          • P
            pfdog @dragoangel
            last edited by

            @dragoangel Thank you, you are correct. I am my way to becoming versed with HAProxy.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.