How could I make a service only available from my local network? #4017
Unanswered
LickABrick
asked this question in
Q&A
Replies: 1 comment 4 replies
-
|
You can restrict services to your local network using Traefik's
http:
routers:
your-service-router-secure:
rule: Host(`service1.mydokploy.private`)
service: your-service
entryPoints:
- websecure
tls:
certResolver: letsencrypt
middlewares:
- internal-only
middlewares:
internal-only:
ipAllowList:
sourceRange:
- 192.168.0.0/16
- 10.0.0.0/8Important notes:
Alternative approaches:
The To reply, just mention @dosu. How did I do? Good | Irrelevant | Incorrect | Verbose | Hallucination | Report 🐛 | Other |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I’m running several services on a single Dokploy host, and some of them shouldn’t be publicly accessible from the internet.
My initial idea was to use a private DNS naming scheme, for example:
service1.mydokploy.privateHowever, this doesn’t actually secure anything. If someone manually adds a DNS record pointing that hostname to my Dokploy server, the service would still be reachable. While guessing the hostname isn’t trivial, it’s definitely not a reliable security measure.
What I’m trying to achieve:
Keep using ports 80/443 (no custom ports)
Avoid spinning up a separate Dokploy instance that’s completely internal
Restrict certain services so they are only accessible from internal networks (or otherwise protected)
What would be the best way to handle this setup?
Is there a recommended approach within Dokploy (or via a reverse proxy / middleware) to properly restrict access to specific services?
Beta Was this translation helpful? Give feedback.
All reactions