Hello there!

Need Help? We are right here!

miniOrange Email Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Search Results:


Enable IP with Reverse Proxy

IP feature is used to enable access to specific domains that are submitted by a user to make asynchronous requests to the server address.

Request a 10-day Free Trial Setup Guideline
IP Reverse Proxy Banner Image

What is IP Restriction?

IP Restriction allows you to give selective access to web servers based on the client’s IP address. This setting adds an extra layer of security by allowing an administrator to limit IP address by specifying which systems should be allowed or forbidden from accessing and making requests to the server, and hence minimizes unwanted traffic.

There are numerous requests submitted to web servers on a regular basis, and there are numerous reasons to maintain web services secure. We can handle the requests that come to the server with IP address restrictions. IP restriction monitors network traffic and, if it suspects a request coming from a specific IP address is suspicious, it will either limit IP address from accessing your web service or notify you to limit IP address access.



IP Restriction can be used to limit IP address from a particular range to improve security.

Increased flexibility:

The number of IP-based controllers you can utilize is unlimited.

Manage Traffic:

IP Restriction can help to manage and minimize unwanted traffic.


All IP Restriction Addresses are synchronized so that the authorization is highly accurate and Security is enhanced.

Easy Installation:

IP Restriction solution is easier to implement and install for your cloud.

High performance:

IP restriction will help to quickly transmit access to people who are allowed to access the site.

How does IP Restriction work?

Only whitelisted IP addresses are allowed to log in successfully, according to the IP restriction. If you attempt to log in from an IP address that the system does not recognize as being whitelisted, you won't be granted access and the client would be shown an error message.

Let’s See, how this IP restriction would work in a scenario where a client of the user, who has enabled the IP Restrictions feature, wants to access the user’s server:

What is Reverse Proxy?

  • The client sends a request to the proxy link of the user’s server.
  • The IP address of the client requesting the proxy link is fetched.
  • This IP address is compared with the list of IP addresses that the user has permitted or denied access to the proxy link.
  • If the IP address is allowed for that proxy link, the client will be able to access it; else, the client would be shown a ‘403 Forbidden’ error message.

IP Restriction Use Case

Let's take an example of one of our clients belonging to an organization. He wanted to limit the access of the web applications to authorized devices only. As the client wanted to allow only authorized personnel to access the application, their IP addresses were the only ones allowed to access the proxy link. Suppose a device connected to the web wants to access our client’s application via the proxy link. The IP address of this device making the request to the proxy link is verified against the list of IP addresses allowed by the client utilizing the services of the reverse proxy product. If the IP address is allowed, the device’s request is further transferred to the client’s server, else, the device receives a 403 Forbidden error.

Deprovisioning work module
If you already have IP restriction, learn how to enable it by following the steps written in this setup guide.

Latest Blogs

How to Stop Bot Traffic on Website with Reverse Proxy

A reverse proxy server is a special kind of proxy server. In contrast to a forward proxy server, which protects clients, a reverse proxy protects servers. A reverse proxy is a server that receives a client’s request, passes it to one of many [...]


How to set up WordPress role based access control to secure site folders?

Role based access control (RBAC)means allowing access to users to a stack based on the set user roles and permissions. With a defined role based access control (or rbac) users access levels throughout the organization and protect their data [...]

Read More