Chapter 6. Configuring a cluster-wide proxy