LatestFEATUREDNVA-COREProduct & ServicesTechnologyTOP STORIESUser Guides & Tutorials

NVA-CORE

nva-core

Docker Image

NVA-CORE a composable security and control fabric (not just a reverse proxy)

Footprint < 2MB.


🧠 The Architecture of NVA-CORE

Not Just a Proxy — a Modular Security Fabric

At its core, NVA-CORE isn’t built just to forward requests — it’s built to govern digital movement.
Every request, every endpoint, every token exchange passes through a composable, event-aware layer that you control — piece by piece, like digital Lego.

Instead of being a fixed-function proxy, NVA-CORE acts as a programmable control layer.
You can deploy it as a standalone gateway, a chained security node, or even an inline policy enforcer between microservices.
The system’s behavior changes based on how you assemble it — from a lightweight HTTP/HTTPS shield to a multi-node defense grid.


⚙️ Modular by Design — The “Lego” Principle

Every component of NVA-CORE is designed to snap together cleanly:

  • Auth Control Blocks: JWT, API Key, or Signature-based verification, configured per endpoint or per path.
  • Network Policy Modules: IP whitelist, behavior-based blocking, concurrent connection throttling, or adaptive trust scoring.
  • Session Chain Handlers: Optional OTP, token forwarding, or secondary signature validation.
  • Runtime Interfaces: Expose internal metrics, accept external policy updates, or integrate directly with higher-level orchestrators.

You can run a single NVA for a small-scale edge or a cluster of NVAs forming a custom mesh:

  • Load Balancer Fabric — distribute requests based on JWT claims, tokens.
  • Corporate Security Gate — restrict access per department or IP range with endpoint-based isolation.
  • Data Isolation Nodes — separate public and internal traffic automatically using endpoint behavior rules.
  • Multi-Zone Access Map — where each NVA instance enforces its own trust perimeter while syncing rules globally. It’s security as topology — a modular construct you can scale, stack, or reconfigure without re-writing core code.

🧩 Endpoint-Driven Governance

NVA-CORE operates through the principle of Endpoint Control — where every path defines its own security posture. You can add any number of endpoints.

Endpoint exampleSecurity LayerBehavior
/adminJWT / OTPauthentication, failure triggers block.
/public/..None or API KeyPublic access or token-based filter.
/internal/..JWT / IP WhitelistRestricted to trusted origin IPs only.
/relay/...Signature-based (X-Signature / HMAC)Used for API bridges, automation, or data tunnels.

JWT Authentication supports multiple schemes — Basic, Bearer, APIKey, X-API-Key, HMAC, X-Signature, Opaque Tokens —
with RSA, ECDSA, and Ed25519 (EdDSA) support for asymmetric verification.
All verification occurs per-endpoint, per-context, and per-session — no global blind trust.

Behavioral Intelligence:
When a user fails authentication or behaves abnormally, NVA-CORE tracks the event, adjusts trust metrics, and enforces bans.
Even whitelisted IPs remain under observation — ensuring no trusted node can abuse its access silently.


🧠 Concurrency & Adaptive Limits

NVA-CORE isn’t static — it adapts to your infrastructure.
While the theoretical concurrency cap scales past 1 million connections, it’s safety-capped at 5,000 by default — protecting your server from accidental floods while keeping latency near zero.

This means:

  • You can stress-test without collapsing the system.
  • The cap can be lifted or distributed across multiple NVAs in a mesh.
  • Internal modules can scale horizontally without reconfiguration.

🔧 Control Surface Overview

Operators have full runtime control over key layers — including authentication, SSL, and request handling.
Advanced users can toggle or disable specific protections for staging, internal networks, or automation workflows.

LayerControlDefaultScope
NetworkHTTP(S) / Proxy ModeProxyGlobal
SSLAuto / Manual / NoneAutoGlobal
SecurityGlobal ChecksEnabledGlobal
JWTVerification / optionalOnPer-Path
OTPValidation /optionalOnPer-User
ConcurrencyConnection Cap5KGlobal
IP WhitelistFile + TrackingOnGlobal
Behavior TrackingAdaptive /optionalOnGlobal

🧩 Deployment Flexibility

You can run NVA-CORE as:

  • Primary Proxy Gateway — the entry point to your infrastructure. HTTP(S)
  • Sub-Proxy Layer — under another reverse proxy, handling JWT or OTP validation. watching with ip ban and ip white list.
  • Internal Service Node — between microservices to validate tokens and signatures inline.
  • Edge Mesh Node — where multiple NVAs communicate, forming a sustaining stable and secure, distributed perimeter.

Each instance can act independently or join a synchronized cluster — scaling from one binary to a full-fledged fabric.


🧠 The Big Idea

NVA-CORE turns the proxy model upside-down.
It’s not just a “traffic forwarder” — it’s a behavioral firewall, API governor, and runtime guardian.
Everything from authentication, concurrency, and adaptive bans to endpoint isolation is algorithmic.
You don’t just configure NVA-CORE — you compose it.

That’s why it’s called Agis
because once deployed, it doesn’t just guard your app — it thinks with it.


Note : we will soon post How to configure and use settings at trendsuggest.com