-
|
Hello, I've installed DefGuard on three Ubuntu servers. In my proxy setup, I have two network interfaces: DMZ (for public access) and MGT (for SSH access). After some research, I couldn't find any documentation or discussion about this topic. Is there any supported way to separate user and admin access across different interfaces or domains? If not, is this feature planned or considered? Thanks in advance for your help! Axel |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 5 replies
-
|
Hi @axelere - can you elaborate more - what do you mean by ,proxy'? It's unclear if it's our proxy component or a reverse proxy (particularly I do not understand the /admin/ path - we have no such context - we have defguard core which should be in the intranet and our proxy for enrollment and onboarding services and keeping our desktop/mobile clients uptodate with configs). Whatever the scenario is you can always use our ACLs which are firewall rules to define for example that Admin group has access to IPs/submets/etc (or doesn't have) - see our ACLs documentation. They should be exactly what you are looking for. |
Beta Was this translation helpful? Give feedback.
-
|
@axelere Your concern is absolutely valid and not paranoid at all. Our recommended approach is not to expose Core at all. Only the Proxy and Gateway should be public. The Core web UI should be reachable only from the internal network or via VPN. Users can still enroll through the Proxy and connect to the VPN via the Gateway. Users manage their accounts only after connecting to the VPN. With this approach, we do not see a strong need to divide the admin-related and user-related screens in the Core web UI. More on our recommendations here. |
Beta Was this translation helpful? Give feedback.
-
|
@kchudy thank you very much for your feedback. This is exactly the approach I used and implemented (except that I still use the Proxy internal interface (limited to internal IPs) for redirection to the core; I don't remember why I did it that way, I might need to change it). A simple workflow idea for a new user, but without considering potential risks. Perhaps allow adding MFA via the proxy (GUI Enroll) if 0/3 MFA is configured ? |
Beta Was this translation helpful? Give feedback.

@axelere Your concern is absolutely valid and not paranoid at all.
Our recommended approach is not to expose Core at all. Only the Proxy and Gateway should be public. The Core web UI should be reachable only from the internal network or via VPN.
Users can still enroll through the Proxy and connect to the VPN via the Gateway.
Users manage their accounts only after connecting to the VPN.
With this approach, we do not see a strong need to divide the admin-related and user-related screens in the Core web UI.
More on our recommendations here.