The IP and Domain Restrictions Role Service feature must be installed as part of Web Server (IIS) on the Apex One server.
To install it, click Start > Server Manager > Add Roles and Features > Server Selection > Server Roles > Web Server (IIS) > Web Server > Security > IP and Domain Restrictions > Next > Next > Install.
To restrict Apex One web console access:
- On the Apex One server computer, launch Internet Information Services (IIS) Manager.
- Expand SERVERNAME > Sites > OfficeScan website > officescan and then click the console directory.
- Double-click IP Address and Domain Restrictions under IIS group.
- To deny all access, select "Deny action under Access for unspecified clients: setting".
Restricting all access will have the following limitation, which is addressed in Apex One Patch 2 Build 2146 or later builds:
- Add the IP addresses of allowed devices e.g. system administrator computer and then click Add Allow Entry… action on the upper-right section.
- Input the target Specific IP address or IP address range and then click OK.
- Add both IPv4 and IPv6 addresses of the allowed computers. The following should have allowed access:
- System administrator
- Apex One server
- Apex Central server
- Apex One Edge server
- Allow localhost IP to ensure any internal Apex One communication within the console. Below are the default localhost IP values:
- 127.0.0.1
- ::1
- If you get logged out after allowing the necessary IP address when you are accessing Apex One web console, clear the browser cache and restart the web browser.
If you are using the default action type (forbidden), an easy way to identify the IPv6 addresses would be to check the Apex One website’s IIS logs.
You can search all “error 403” and back-check the restricted IPv6 addresses of the allowed computers.
- Add both IPv4 and IPv6 addresses of the allowed computers. The following should have allowed access:
- The "Enable Proxy Mode" setting can be enabled to filter clients that access IIS through one or more firewalls, load-balancing, or proxy servers. Administrators can configure their servers to examine the X-Forwarded-For HTTP header in order to determine which requests to block.
To enable X-Forwarded-For logging in IIS:
- Expand SERVERNAME > Sites > OfficeScan website directory.
- Double-click Logging under IIS group.
- Click the Select Fields button under Log File Format.
- In the W3C Logging Fields menu, click Add Field… and then input “X-Forwarded-For” on both the Field Name and Source sections.
- The Custom Fields section should show the entry after you click OK.
- Restart IIS Admin Service.
The log file name should append a ”_x” at the end and show X-Forwarded-For in the header.
Below is the default message that the restricted IP/domain gets when the Apex One web console is accessed:
403 - Forbidden: Access is denied.
You do not have permission to view this directory or page using the credentials that you supplied.
In IIS 8.0, administrators can configure to deny access in several additional ways.
Action Type | Description |
---|---|
Unauthorized | Returns Error 401 |
Forbidden | Returns Error 403 |
Not Found | Returns Error 404 |
Abort | Terminates the connection |