Replies: 1 comment 3 replies
-
Hi @axelere - can you elaborate more - what do you mean by ,proxy'? It's unclear if it's our proxy component or a reverse proxy (particularly I do not understand the /admin/ path - we have no such context - we have defguard core which should be in the intranet and our proxy for enrollment and onboarding services and keeping our desktop/mobile clients uptodate with configs). Whatever the scenario is you can always use our ACLs which are firewall rules to define for example that Admin group has access to IPs/submets/etc (or doesn't have) - see our ACLs documentation. They should be exactly what you are looking for. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
I've installed DefGuard on three Ubuntu servers. In my proxy setup, I have two network interfaces: DMZ (for public access) and MGT (for SSH access).
I'd like to restrict admin access the MGT interface only, and so completely block admin access from internet.
After some research, I couldn't find any documentation or discussion about this topic.
I've tried several proxy configurations to block the /admin/ path on DMZ interface while allowing it on MGT side, but without real success.
Is there any supported way to separate user and admin access across different interfaces or domains?
If not, is this feature planned or considered?
Thanks in advance for your help!
Axel
Beta Was this translation helpful? Give feedback.
All reactions