Openappsec WAF setup with Nginx Proxy Manager(SaaS Option)

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • The video introduces openappsec WAF and goes over installation and setup with Nginx Proxy Manager
    #openappsec #checkpoint
    Documentation:
    About openappsec:
    www.openappsec...
    NPM and openappsec Setup (saas option)
    docs.openappse...
    hub.geek2gethe...
    Learn more about openappsec by watching their video here:
    • Introduction to open-a...
  • НаукаНаука

Комментарии • 9

  • @PowerUsr1
    @PowerUsr1 2 месяца назад

    excellent work !!!

  • @verticalfrog1330
    @verticalfrog1330 2 месяца назад +2

    Hello, can you also make a video with X-Forwarded-For Header in HTTP Requests as the Source Identity? I am using Nginx Web Proxy Manager with Cloudflare. TIA!

    • @geek2gether469
      @geek2gether469  2 месяца назад +3

      If you are looking to get the real ip of the client it is a pretty simple change, however the change needs to be made in Nginx proxy manager. In the Nginx proxy manager , open a proxy host and go to advance configuration then paste the following:
      set_real_ip_from 103.21.244.0/22;
      set_real_ip_from 103.22.200.0/22;
      set_real_ip_from 103.31.4.0/22;
      set_real_ip_from 104.16.0.0/13;
      set_real_ip_from 104.24.0.0/14;
      set_real_ip_from 108.162.192.0/18;
      set_real_ip_from 141.101.64.0/18;
      set_real_ip_from 162.158.0.0/15;
      set_real_ip_from 172.64.0.0/13;
      set_real_ip_from 173.245.48.0/20;
      set_real_ip_from 188.114.96.0/20;
      set_real_ip_from 190.93.240.0/20;
      set_real_ip_from 197.234.240.0/22;
      set_real_ip_from 198.41.128.0/17;
      set_real_ip_from 2400:cb00::/32;
      set_real_ip_from 2606:4700::/32;
      set_real_ip_from 2803:f800::/32;
      set_real_ip_from 2405:b500::/32;
      set_real_ip_from 2405:8100::/32;
      set_real_ip_from 2a06:98c0::/29;
      set_real_ip_from 2c0f:f248::/32;
      real_ip_header CF-Connecting-IP;
      real_ip_recursive on;
      Once pasted, save and repeat for all your other proxy hosts if needed.
      The above config is a list of cloudflare IP's and will replace the source ip header with the clients ip actual ip. Now you can go back to openappsec and set source identity to "source IP" and enforce the policy. Thats it, you should be able to now get the clients IP instead of cloudflares.
      Note: The X-Forwarded-For Header only will accept single IPs and not subnets such as 10.0.0.1/24. So this will work if you have an internal proxy and not cloudflare.
      Please like and share!

  • @allxtechnologies
    @allxtechnologies Месяц назад

    Love your videos! I've been looking into this for a while now. There is any way to selfhost the dashboard instead of connecting it to saas?

    • @geek2gether469
      @geek2gether469  Месяц назад +1

      Yes there is a self hosted option. I’m actually working on a video for that!

  • @nightbot4773
    @nightbot4773 2 месяца назад +1

    Hello, I want to ask, how about doing it to protect the http in localhost, can you help me to do an experiment 🙏

    • @geek2gether469
      @geek2gether469  2 месяца назад

      Head over to hub.geek2gether.com/c/openappsec/17 and post a question about what you need help with.

    • @nightbot4773
      @nightbot4773 2 месяца назад

      OK, thank you, I'll wait for your answer there​@@geek2gether469