search
HomeOperation and MaintenanceNginxNginx security firewall configuration to protect the website from malicious attacks

Nginx security firewall configuration to protect websites from malicious attacks

Introduction:
In today's Internet era, websites face various security threats, such as malicious attacks, intrusions, etc. In order to protect the data and user privacy of the website, we need to take a series of measures to strengthen the security of the website. Nginx is a high-performance web server that also provides rich features in terms of security. We can protect the website from malicious attacks through Nginx firewall configuration.

1. Nginx security firewall configuration

  1. Installing Nginx
    First, we need to install the Nginx server. Nginx can be installed through the following command:
$ sudo apt update
$ sudo apt install nginx
  1. Configure Nginx firewall
    The firewall function of Nginx is implemented through the configuration file nginx.conf. Open the nginx.conf file, find the configuration section of the http section, and add the following content:
http {
    # 允许的IP列表
    deny 192.168.0.1;
    allow 192.168.0.0/24;
    
    # 防止目录遍历攻击
    location ~ /. {
        deny all;
    }
    
    # 防止SQL注入攻击
    location ~ inj/ {
        deny all;
    }
    
    # 限制HTTP请求方法
    if ($request_method !~ ^(GET|HEAD|POST)$) {
        return 444;
    }
    
    # 禁止目录索引的访问
    location ~ ^/(.|php) {
        deny all;
    }
}

In the above configuration example, deny is used to deny specific IP addresses, and allow is used to allow specific IP address sections. . With this configuration, we can restrict access to our website to only specific IP addresses.

location ~ /. { deny all; } This configuration is used to prevent directory traversal attacks. When the access URL contains "../", 403 Forbidden is returned.

location ~ inj/ { deny all; } This configuration is used to prevent SQL injection attacks. When the URL contains "inj/", 403 Forbidden is returned.

if ($request_method !~ ^(GET|HEAD|POST)$) { return 444; } This configuration is used to limit the HTTP request method, only GET, HEAD, and POST are allowed Three methods, other methods return 444 indicating no response.

location ~ ^/(.|php) { deny all; } This configuration is used to prohibit access to the directory index when the URL ends with "/." or ".php" At the end, 403 Forbidden is returned.

  1. Restart Nginx server
    After completing the above configuration, we need to restart the Nginx server to make the configuration take effect:
$ sudo systemctl restart nginx

2. Summary
Firewall configuration through Nginx , we can effectively protect our website from malicious attacks. These configurations are only entry-level protection measures. For more complex attacks, we need to further strengthen the security of the website, such as using Web Application Firewall (WAF), HTTPS, etc. In the process of building a secure website, we need to pay close attention to the latest security threats and vulnerabilities, and promptly update and improve protective measures to improve the security of the website.

The above is an introduction to Nginx security firewall configuration. I hope it will be helpful to everyone. Through reasonable configuration and protection measures, we can ensure the security of the website and provide a better user experience.

The above is the detailed content of Nginx security firewall configuration to protect the website from malicious attacks. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to start nginxHow to start nginxApr 14, 2025 pm 01:06 PM

Question: How to start Nginx? Answer: Install Nginx Startup Nginx Verification Nginx Is Nginx Started Explore other startup options Automatically start Nginx

How to check whether nginx is startedHow to check whether nginx is startedApr 14, 2025 pm 01:03 PM

How to confirm whether Nginx is started: 1. Use the command line: systemctl status nginx (Linux/Unix), netstat -ano | findstr 80 (Windows); 2. Check whether port 80 is open; 3. Check the Nginx startup message in the system log; 4. Use third-party tools, such as Nagios, Zabbix, and Icinga.

How to close nginxHow to close nginxApr 14, 2025 pm 01:00 PM

To shut down the Nginx service, follow these steps: Determine the installation type: Red Hat/CentOS (systemctl status nginx) or Debian/Ubuntu (service nginx status) Stop the service: Red Hat/CentOS (systemctl stop nginx) or Debian/Ubuntu (service nginx stop) Disable automatic startup (optional): Red Hat/CentOS (systemctl disabled nginx) or Debian/Ubuntu (syst

How to configure nginx in WindowsHow to configure nginx in WindowsApr 14, 2025 pm 12:57 PM

How to configure Nginx in Windows? Install Nginx and create a virtual host configuration. Modify the main configuration file and include the virtual host configuration. Start or reload Nginx. Test the configuration and view the website. Selectively enable SSL and configure SSL certificates. Selectively set the firewall to allow port 80 and 443 traffic.

How to solve nginx403 errorHow to solve nginx403 errorApr 14, 2025 pm 12:54 PM

The server does not have permission to access the requested resource, resulting in a nginx 403 error. Solutions include: Check file permissions. Check the .htaccess configuration. Check nginx configuration. Configure SELinux permissions. Check the firewall rules. Troubleshoot other causes such as browser problems, server failures, or other possible errors.

How to start nginx in LinuxHow to start nginx in LinuxApr 14, 2025 pm 12:51 PM

Steps to start Nginx in Linux: Check whether Nginx is installed. Use systemctl start nginx to start the Nginx service. Use systemctl enable nginx to enable automatic startup of Nginx at system startup. Use systemctl status nginx to verify that the startup is successful. Visit http://localhost in a web browser to view the default welcome page.

How to check whether nginx is started?How to check whether nginx is started?Apr 14, 2025 pm 12:48 PM

In Linux, use the following command to check whether Nginx is started: systemctl status nginx judges based on the command output: If "Active: active (running)" is displayed, Nginx is started. If "Active: inactive (dead)" is displayed, Nginx is stopped.

How to solve nginx304 errorHow to solve nginx304 errorApr 14, 2025 pm 12:45 PM

Answer to the question: 304 Not Modified error indicates that the browser has cached the latest resource version of the client request. Solution: 1. Clear the browser cache; 2. Disable the browser cache; 3. Configure Nginx to allow client cache; 4. Check file permissions; 5. Check file hash; 6. Disable CDN or reverse proxy cache; 7. Restart Nginx.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment