Documentation Index
Fetch the complete documentation index at: https://docs.traversal.com/llms.txt
Use this file to discover all available pages before exploring further.
Architecture
The Traversal Connector operates on a pull-based, outbound-only connection model. Rather than the Traversal platform connecting inbound to your environment, the Traversal Connector initiates a persistent, bidirectional, encrypted tunnel to the Edge Controller in Traversal’s SaaS control plane or in your Traversal BYOC deployment. The Traversal platform sends requests over this tunnel, and the Traversal Connector executes them against your internal services and returns the responses over the same tunnel. This design means:- No inbound firewall rules are required — the Traversal Connector only makes outbound connections
- Your network perimeter is preserved — no services are exposed or listening for external traffic
- You retain full control — the Traversal Connector runs in your environment, under your operational purview
| Component | Runs in | Role |
|---|---|---|
| Your internal services | Your environment |
|
| Traversal Connector | Your environment |
|
| Edge Controller | Traversal’s SaaS control plane or your BYOC deployment |
|
Security
Encryption
The Traversal Connector establishes a dedicated, private tunnel to the Edge Controller, encrypted end-to-end with mTLS. This tunnel can optionally be established through a PrivateLink service endpoint, ensuring traffic never traverses the public internet. The Traversal Connector authenticates itself to the controller using a client certificate, and verifies the controller’s identity using a trusted CA certificate.No inbound network access
The Traversal Connector initiates all connections outbound. It does not listen on any ports for external traffic, and does not require any inbound firewall rules or publicly reachable endpoints. The only listening port is an internal health-check endpoint used by your container orchestrator to monitor the service’s readiness.No data persistence
The Traversal Connector does not store, cache, or log any request or response data. It is a stateless, transient forwarding service — data flows through it and is not retained.Forward proxy support
For environments that require all outbound traffic to route through a corporate proxy, the Traversal Connector supports connecting to the Edge Controller through an HTTP CONNECT proxy.Telemetry
The only external connection the Traversal Connector makes — beyond the tunnel to the Edge Controller — is totelemetry.<deployment_name>.traversal.com to report its own operational telemetry (metrics, traces, and logs) using OpenTelemetry (OTLP).
No customer data is included in the telemetry. Only operational metrics such as tunnel connectivity status, request latency, and error rates are reported.