Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HAproxy can only connect to "Default Backend"

    Scheduled Pinned Locked Moved pfSense Packages
    1 Posts 1 Posters 854 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 4
      4evernoob
      last edited by

      I can successfully connect to either server as long as it is selected as the default backend in the frontend configuration. If it's not there seems to be only a partial connection. These servers are RDP servers.

      Below is config:

      # Automaticaly generated, dont edit manually.
      # Generated on: 2022-07-15 17:55
      global
      	maxconn			1000
      	stats socket /tmp/haproxy.socket level admin  expose-fd listeners
      	uid			80
      	gid			80
      	nbproc			1
      	nbthread			1
      	hard-stop-after		15m
      	chroot				/tmp/haproxy_chroot
      	daemon
      	server-state-file /tmp/haproxy_server_state
      
      listen HAProxyLocalStats
      	bind 127.0.0.1:2200 name localstats
      	mode http
      	stats enable
      	stats admin if TRUE
      	stats show-legends
      	stats uri /haproxy/haproxy_stats.php?haproxystats=1
      	timeout client 5000
      	timeout connect 5000
      	timeout server 5000
      
      frontend TSSRDP
      	bind			47.191.161.96:443 name 47.191.161.96:443   ssl crt-list /var/etc/haproxy/TSSRDP.crt_list  
      	mode			tcp
      	log			global
      	timeout client		30000
      	tcp-request inspect-delay	5s
      	acl			TSSRDP1	req.ssl_ver gt 0
      	acl			TSSRDP2	req.ssl_ver gt 0
      	tcp-request content accept if { req.ssl_ver gt 0 }
      	use_backend TSSRDP1_ipvANY  if  TSSRDP1 
      	use_backend TSSRDP2_ipvANY  if  TSSRDP2 
      	default_backend TSSRDP1_ipvANY
      
      backend TSSRDP1_ipvANY
      	mode			tcp
      	id			100
      	log			global
      	option			log-health-checks
      	http-check		send meth OPTIONS
      	timeout connect		30000
      	timeout server		30000
      	retries			3
      	load-server-state-from-file	global
      	option			httpchk
      	server			TSSRDP1 10.1.1.11:443 id 102 ssl check inter 1000  verify none crt /var/etc/haproxy/server_clientcert_6233cdbfd2ca5.pem 
      
      backend TSSRDP2_ipvANY
      	mode			tcp
      	id			101
      	log			global
      	option			log-health-checks
      	http-check		send meth OPTIONS
      	timeout connect		30000
      	timeout server		30000
      	retries			3
      	load-server-state-from-file	global
      	option			httpchk
      	server			TSSRDP2 10.1.1.12:443 id 102 ssl check inter 1000  verify none crt /var/etc/haproxy/server_clientcert_6233cdbfd2ca5.pem 
      
      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.