Explain TLS Termination vs Passthrough.

TLS termination vs passthrough describes whether encrypted TLS traffic is decrypted at a proxy/load balancer (termination) or forwarded still encrypted directly to backend servers (passthrough).

When to Use

Use TLS termination when you want the proxy to inspect, route, or log traffic, or to offload CPU-intensive decryption from backend servers. Use TLS passthrough when you require true end-to-end encryption and don’t need the proxy to read traffic.

Example

If a load balancer sits before your app servers, with termination it decrypts traffic and forwards plain HTTP internally; with passthrough, it simply forwards encrypted traffic, and each server decrypts on its own.

Want to master these concepts for interviews?

Explore Grokking System Design Fundamentals, Grokking the System Design Interview, Grokking Database Fundamentals for Tech Interviews, or practice Mock Interviews with ex-FAANG engineers.

Why Is It Important

The choice impacts security and performance: termination simplifies operations but breaks pure end-to-end encryption, while passthrough ensures stronger security but limits proxy features.

Interview Tips

In interviews, clearly define both terms, highlight when to use each, and explain the trade-off between control vs. end-to-end security. Use simple diagrams in whiteboard rounds if asked.

Trade-offs

Termination offers central control and reduces server load but sacrifices full encryption. Passthrough preserves strict encryption but prevents advanced routing, caching, or inspection at the proxy.

Pitfalls

Common mistakes include assuming a passthrough proxy can inspect packets (it cannot), or forgetting that termination exposes plaintext internally — so internal network security is critical.

TAGS
System Design Interview
System Design Fundamentals
CONTRIBUTOR
Design Gurus Team
-

GET YOUR FREE

Coding Questions Catalog

Design Gurus Newsletter - Latest from our Blog
Boost your coding skills with our essential coding questions catalog.
Take a step towards a better tech career now!
Explore Answers
What is a job that no longer exists?
How to understand CAP theorem for system design interviews?
Does Google hire C++ developers?
What are the 5 types of portfolio?
What are some tips for system design interviews in healthcare tech?
Explain Snowflake IDs vs ULIDs vs UUIDs.
Learn the differences between Snowflake IDs, ULIDs, and UUIDs. Compare use cases, trade-offs, examples, and interview tips for system design prep.
Related Courses
Course image
Grokking the Coding Interview: Patterns for Coding Questions
Grokking the Coding Interview Patterns in Java, Python, JS, C++, C#, and Go. The most comprehensive course with 476 Lessons.
4.6
Discounted price for Your Region

$197

Course image
Grokking Modern AI Fundamentals
Master the fundamentals of AI today to lead the tech revolution of tomorrow.
3.9
Discounted price for Your Region

$78

Course image
Grokking Data Structures & Algorithms for Coding Interviews
Unlock Coding Interview Success: Dive Deep into Data Structures and Algorithms.
4
Discounted price for Your Region

$78

Image
One-Stop Portal For Tech Interviews.
Copyright © 2026 Design Gurus, LLC. All rights reserved.