Frontend Real IP Header Configuration
With the introduction of local account mechanisms in V1, accurate retrieval of the client’s real IP address is essential to prevent brute-force attacks on login endpoints (Web Application Firewall functionality).
This feature can be managed via /dashboard/settings/waf.
Configuration Scenarios
Depending on how the service is deployed, there are two primary configuration scenarios:
1. Direct Public Access to the Dashboard
- Enable
Use Direct IPin the settings. No additional configuration is required.
2. Deployment Behind a Web Proxy or CDN
- Refer to the Reverse Proxy Configuration documentation.
- The configuration examples utilize the
nz-realipheader for transmitting client IP addresses. You can either use this default header or define your own. - Ensure the proxy server is correctly set up to include the client IP in the custom header and forward it to the Dashboard.
Common Issues
Q1: What if a configuration error causes the Dashboard to be inaccessible or agents to disconnect?
Modify the Dashboard configuration file:
Locate the configuration file at/data/config.yamland update the following entry:yamlrealipheader: ""Set the
realipheadervalue to an empty string (""), save, and exit.Restart the Dashboard service.
Access the Dashboard again and verify if the connection is restored.