The Inverted Ingress Model Explained

The Inverted Ingress Model Explained

March 6, 2026·
Henrik Falck
Pilot access: Mezusphere is live in pilot today and launches publicly in October 2026. Request pilot access →

The core technical innovation behind Mezusphere is the inverted ingress model: an architecture where workloads connect outward to the edge instead of accepting inbound traffic. This post explains what it is, how it works, and why it changes the security and operational profile of internet-facing services.

Traditional ingress: the inbound model

Every major cloud provider and CDN uses the same fundamental pattern for internet-facing services. Traffic flows inward:

End Users → CDN → Load Balancer → API Gateway → Reverse Proxy → Your Workload

To make this work, you need to:

  1. Open inbound ports on your infrastructure (typically 80 and 443)
  2. Configure DNS to point to your load balancer or CDN
  3. Provision TLS certificates and configure termination
  4. Set up a reverse proxy (NGINX, HAProxy, Traefik) to route traffic
  5. Deploy an API gateway (Kong, AWS API Gateway) for API management
  6. Integrate an auth provider (Auth0, Cognito, Keycloak) for authentication
  7. Enable DDoS protection (Cloudflare, AWS Shield) upstream

Each layer is a separate service, often from a separate vendor, with its own configuration, monitoring, and billing. The integration between layers is your responsibility. When something breaks at the boundary between Cloudflare and your API gateway, neither support team owns the issue.

This model has worked for 25 years. But it creates inherent problems that are structural, not incidental.

Structural problems with inbound ingress

1. Public attack surface

Your workload has a publicly reachable IP address. Ports are open. DNS points directly (or indirectly) to your origin. Attackers can probe, scan, and fingerprint your infrastructure. Origin IP leaks are a persistent security risk even behind CDNs.

2. Configuration complexity

Every layer needs its own configuration. TLS settings, routing rules, CORS policies, auth middleware, all defined in different places, in different formats, with different update mechanisms. A single misconfiguration in any layer can expose your service.

3. Integration fragility

Auth tokens are validated in your application code, not at the traffic layer. Rate limiting at the API gateway, DDoS protection at the CDN, WAF rules somewhere else. Policies are scattered across systems with no single source of truth.

4. Operational overhead

Six services means six things to monitor, six things to update, six things that can fail independently. Incident response requires understanding the interaction between layers that were never designed to work together.

Inverted ingress: the outward model

Mezusphere inverts the traffic flow. Instead of configuring inbound traffic through layers of proxies, your workload connects outward to Mezusphere’s global edge.

Your Workload + Warpgate → (outbound TLS 1.3) → Mezusphere Global Edge ← End Users

Here’s how it works:

Step 1: Warpgate connects outward

A lightweight sidecar called Warpgate runs alongside your workload. On startup, Warpgate initiates an outbound TLS 1.3 connection to Mezusphere’s global edge, authenticated with a service account API key.

This is the only network operation required. No inbound ports. No firewall rules. No DNS configuration. No TLS certificate management.

Step 2: Edge handles everything

Mezusphere’s global edge handles all end-user traffic:

  • TLS termination: certificates are provisioned and renewed automatically
  • DNS: hostnames are assigned and managed automatically
  • DDoS protection: traffic is filtered at the edge before reaching your Warpgate
  • Authentication: if enabled, every request is authenticated before forwarding
  • Authorization: access controls are enforced at the edge
  • Routing: requests are directed to the correct Warpgate based on path rules

Step 3: Traffic flows to Warpgate

Authenticated, authorized, and filtered traffic is forwarded through the established tunnel to your Warpgate, which passes it to your workload on localhost. Your application receives clean, pre-authenticated requests.

Why this matters

Zero public attack surface

Your workload has no open ports, no public IP address, and no DNS records pointing to it. There is nothing to scan, probe, or attack directly. The only publicly reachable surface is Mezusphere’s global edge, which is purpose-built to handle adversarial traffic.

One configuration surface

Routes, auth rules, rate limits, CORS policies, and DDoS settings are all configured in one place: the Mezusphere Console. No scattered config files across six different services. No YAML.

Auth at the edge, not in your code

Authentication happens before traffic reaches your Warpgate. Your application doesn’t validate tokens, manage sessions, or handle login flows. It receives requests that are already authenticated, with identity information in the headers.

Cloud-agnostic by architecture

Because Warpgate connects outward, it doesn’t matter where your workload runs. AWS, GCP, Azure, on-prem, a Raspberry Pi in your closet; the pattern is identical. Move your workload between clouds without changing anything about how traffic reaches it.

Simpler deployment

Adding a new service to Mezusphere takes three steps:

  1. Deploy your workload
  2. Run Warpgate alongside it
  3. Configure routes in the Console

No load balancer to provision. No DNS to update. No TLS certificates to manage. No API gateway to configure. No auth integration to build.

Comparison with traditional approaches

AspectTraditional (inbound)Mezusphere (outward)
Network directionInbound to workloadOutbound from workload
Open portsRequired (80, 443+)None
TLS certificatesManual or semi-automatedFully automatic
DNS configurationRequiredAutomatic
Auth integrationSeparate system, app-levelEdge-level, config toggle
DDoS protectionSeparate serviceBuilt in
ConfigurationScattered across 6+ servicesSingle Console
Cloud dependencyVendor-specificCloud-agnostic

What about ngrok?

ngrok is the closest architectural parallel; it also uses outward-connecting tunnels. ngrok has built an established developer community, excellent documentation, and a fast onboarding experience that Mezusphere respects and learns from. The key differences:

  • Auth depth: ngrok provides OAuth/SAML pass-through but no user directory, no signup/login flows, and no authorization system. Mezusphere provides full-stack authentication with user management.
  • Production positioning: ngrok originated as a developer tunneling tool. Mezusphere is designed as a production infrastructure platform.
  • Included services: Mezusphere includes DDoS protection, WAF (add-on), caching, and a management console beyond what ngrok offers.

Try it

The inverted ingress model is not theoretical. Mezusphere is live in pilot today and launches publicly in October 2026. Deploy your workload, add a Warpgate, and experience what it feels like when infrastructure boilerplate disappears.

Request pilot access →