πŸ“œ
Our Manifesto
🧰
Backup & Disaster Recovery
πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦ Customer Success & Supporty
πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦ Community
Powered By GitBook
Enable VPN access with IP whitelisting
A brief about how to enable IP whitelisting in Elastic Load Balancer

How to enable IP whitelisting at Nginx Ingress Level

To enable IP whitelisting at the Nginx Ingress level level, please follow the steps below.

STEP 1: Log into the release portal

Visit the release portal, and enter the password.
Release Console Login Page

STEP 2: Switch to the "Config" tab

STEP 3: Enable IP whitelisting

    1.
    Set "Restrict product to certain IP ranges" to true.
    2.
    Once you select this option, 2 more fields will become visible.
    3.
    Put the IP ranges you want to whitelist in the "IP range to whitelist" field.
image
πŸ‘€ Note: Make sure to include the NAT Gateway IP that was deployed with Atlan CloudFormation as a comma separated value along with the Public VPN IPs. You can get the IP from the CloudFormation output.
πŸ‘€ Note: While adding a single IP, put /32 with the IP.

STEP 4: Save your configuration

After updating these changes, click on the "Save Config" button at the bottom.

STEP 5: Deploy the new release

You'll have to deploy the new release that gets created. For more information, visit this link: How to deploy new releases.
image
This will ensure that the product becomes only accessible via your VPN

How to enable IP whitelisting at Elastic Load Balancer Level (ELB)

STEP 1: Follow all of the above steps

STEP 2: Select the additional checkbbox

Select the "Restrict traffic at Load Balancer level" checkbox. This will put the IP restriction at Load Balancer itself, instead of just at the NGINX level.
πŸ‘€ Note: If you are using the "Restrict traffic at Load Balancer level" option, then your CloudFront URL won't work. Make sure to map your own custom domain for the product.
image

STEP 3: Deploy the release

Save the config and deploy the release as described above.
Last modified 3d ago