Hi - I have a suggestion.
Could you configure the server to have a list of IP addresses that it should not allow to establish connections (or close immediately).
Reason I ask is because we are hosting a secure socket server in the cloud and using port 443. The Azure heartbeat tries to establish a connection every minute and logs on an error each time which is flooding our logs. REason is because we don't have a unsecured
endpoint for the azure service to call as we load the certificate at runtime form the local store. This is required because you can't specify a SSL cert for a tcp endpoint in azure.
If we were able to configure a list of ignored IP addresses based on an ip range using wildcarding 127.0.* for example, then we could deny those ranges for the operational heartbeat.
Although we have a specific requirement for this - I wondered if it served any wider purpose across the user base?