![]() ![]() The full expression would look like this: (( contains "wp-login.php") or ( contains "xmlrpc.php") or ( contains "admin-ajax.php") or ( contains "wp-admin")) and not ((ip.geoip.asnum eq 14618 or ip.geoip.asnum eq 8075) and (http. Cloudflare Access protects internal resources by securing, authenticating and monitoring access per-user and by application. Only allow the IP if it comes from a particular ASIN : and not ((ip.geoip.asnum eq 14618) or (ip.geoip.asnum eq 8075)) If you want to also block other common destinations prone to attacks: (( contains "wp-login.php") or ( contains "xmlrpc.php") or ( contains "admin-ajax.php") or ( contains "wp-admin")) If your team only uses Firefox to access the site, add the following: and (er_agent contains "Firefox") For example, you can allow only users using a specific browser, or those coming from certain IP ranges. Want to go beyond? Cloudflare can help you mitigate your attack surface even further. ![]() Limit Hostname with equals, URI Path with contains /wp-admin or /wp-admin/ (this is shown in the screenshot below), and Country with is not in This is the easy way, supported in all cases. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |