68 lines
1.5 KiB
Markdown
68 lines
1.5 KiB
Markdown
|
# IPWhiteList
|
||
|
|
||
|
Limiting Clients to Specific IPs
|
||
|
{: .subtitle }
|
||
|
|
||
|
IPWhitelist accepts / refuses connections based on the client IP.
|
||
|
|
||
|
## Configuration Examples
|
||
|
|
||
|
```yaml tab="Docker"
|
||
|
# Accepts connections from defined IP
|
||
|
labels:
|
||
|
- "traefik.tcp.middlewares.test-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7"
|
||
|
```
|
||
|
|
||
|
```yaml tab="Kubernetes"
|
||
|
apiVersion: traefik.containo.us/v1alpha1
|
||
|
kind: MiddlewareTCP
|
||
|
metadata:
|
||
|
name: test-ipwhitelist
|
||
|
spec:
|
||
|
ipWhiteList:
|
||
|
sourceRange:
|
||
|
- 127.0.0.1/32
|
||
|
- 192.168.1.7
|
||
|
```
|
||
|
|
||
|
```yaml tab="Consul Catalog"
|
||
|
# Accepts request from defined IP
|
||
|
- "traefik.tcp.middlewares.test-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7"
|
||
|
```
|
||
|
|
||
|
```json tab="Marathon"
|
||
|
"labels": {
|
||
|
"traefik.tcp.middlewares.test-ipwhitelist.ipwhitelist.sourcerange": "127.0.0.1/32,192.168.1.7"
|
||
|
}
|
||
|
```
|
||
|
|
||
|
```yaml tab="Rancher"
|
||
|
# Accepts request from defined IP
|
||
|
labels:
|
||
|
- "traefik.tcp.middlewares.test-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7"
|
||
|
```
|
||
|
|
||
|
```toml tab="File (TOML)"
|
||
|
# Accepts request from defined IP
|
||
|
[tcp.middlewares]
|
||
|
[tcp.middlewares.test-ipwhitelist.ipWhiteList]
|
||
|
sourceRange = ["127.0.0.1/32", "192.168.1.7"]
|
||
|
```
|
||
|
|
||
|
```yaml tab="File (YAML)"
|
||
|
# Accepts request from defined IP
|
||
|
http:
|
||
|
middlewares:
|
||
|
test-ipwhitelist:
|
||
|
ipWhiteList:
|
||
|
sourceRange:
|
||
|
- "127.0.0.1/32"
|
||
|
- "192.168.1.7"
|
||
|
```
|
||
|
|
||
|
## Configuration Options
|
||
|
|
||
|
### `sourceRange`
|
||
|
|
||
|
The `sourceRange` option sets the allowed IPs (or ranges of allowed IPs by using CIDR notation).
|