I think in this case iptables is more suited for this task.

I did create an ansible role to set iptables rules but I don't think I
added this feature, but it shouldn't be hard to add a variable that let
specify the allowed address range to port 443.

The ansible role is here:
https://github.com/nemesisdesign/ansible-openwisp2-iptables

We will need to implement something similar for ipv6 too though.

Federico

Il gio 29 giu 2017, 15:22 henriqsc <[email protected]> ha scritto:

> Has anyone successfully applied access restriction to the management part
> of the controller (*/admin) via nginx openwisp sites-enabled file?
>
> I've been trying to block the magement page to non-private IPs but without
> much of a success. I tryed the standard location /admin {deny all; allow
> private_ips;} and some variations.
>
> Ps.: I'm aware we must use ansible role variables to do that task. It
> might be an interesting role variable for the next releases.
>
> Regards.
>
>
>
>
>
> --
> You received this message because you are subscribed to the Google Groups
> "OpenWISP" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"OpenWISP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to