I think in this case iptables is more suited for this task. I did create an ansible role to set iptables rules but I don't think I added this feature, but it shouldn't be hard to add a variable that let specify the allowed address range to port 443.
The ansible role is here: https://github.com/nemesisdesign/ansible-openwisp2-iptables We will need to implement something similar for ipv6 too though. Federico Il gio 29 giu 2017, 15:22 henriqsc <[email protected]> ha scritto: > Has anyone successfully applied access restriction to the management part > of the controller (*/admin) via nginx openwisp sites-enabled file? > > I've been trying to block the magement page to non-private IPs but without > much of a success. I tryed the standard location /admin {deny all; allow > private_ips;} and some variations. > > Ps.: I'm aware we must use ansible role variables to do that task. It > might be an interesting role variable for the next releases. > > Regards. > > > > > > -- > You received this message because you are subscribed to the Google Groups > "OpenWISP" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "OpenWISP" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
