以上就是两种简单的方法限制ip访问,还有许多方法可以利用工具进行ip限制。

总结
[root@localhost ~]# curl -I 172.16.1.10HTTP/1.1 403 ForbiddenServer: nginx/1.11.2Date: Sat, 25 Jul 2020 23:12:06 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-alive

172.16.1.10
Linux安全章节:禁止经常访问的ip访问nginx redhat6.5ip:172.16.1
172.16.1.100

nginx配置文件限制

此时172.16.1.100再也不能访问nginx

[root@localhost ~]# curl 172.16.1.10curl: (7) Failed connect to 172.16.1.10:80; 连接超时

172.16.1.100

[root@localhost ~]# iptables -I INPUT -s 172.16.1.100 -ptcp --dport 80 -j DROP

172.16.1.10

通过iptables限制ip访问

由此可见,一秒钟之内172.16.1.100访问了nginx10次,接下来禁止掉这个问题ip

[root@localhost ~]# tail /usr/local/nginx/logs/access.log 172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"172.16.1.100 - - [26/Jul/2020:05:58:24 +0800] "GET / HTTP/1.0" 200 612 "-" "ApacheBench/2.3"

172.16.1.10

查看nginx日志
[root@localhost ~]# ab -c 1 -n 10 http://172.16.1.10/This is ApacheBench, Version 2.3 <$Revision: 1430300 $>Copyright 1996 Adam Twiss, Zeus Technology Ltd, http://www.zeustech.net/Licensed to The Apache Software Foundation, http://www.apache.org/Benchmarking 172.16.1.10 (be patient).....doneServer Software:        nginx/1.11.2Server Hostname:        172.16.1.10Server Port:            80Document Path:          /Document Length:        612 bytesConcurrency Level:      1Time taken for tests:   0.016 secondsComplete requests:      10Failed requests:        0Write errors:           0Total transferred:      8450 bytesHTML transferred:       6120 bytesRequests per second:    617.02 [#/sec] (mean)Time per request:       1.621 [ms] (mean)Time per request:       1.621 [ms] (mean, across all concurrent requests)Transfer rate:          509.16 [Kbytes/sec] receivedConnection Times (ms)              min  mean[+/-sd] median   maxConnect:        0    1   0.3      0       1Processing:     1    1   0.3      1       2Waiting:        0    1   0.3      1       1Total:          1    1   0.5      1       2ERROR: The median and mean for the initial connection time are more than twice the standard       deviation apart. These results are NOT reliable.Percentage of the requests served within a certain time (ms)  50%      1  66%      1  75%      1  80%      2  90%      2  95%      2  98%      2  99%      2 100%      2 (longest request)

172.16.1.100

模拟172.16.1.100访问10次172.16.1.10

nginx 可以正常访问。
接下来,假设172.16.1.100是黑客主机,频繁访问nginx服务

[root@localhost ~]# curl -I 172.16.1.100HTTP/1.1 200 OKServer: nginx/1.11.2Date: Mon, 17 Aug 2020 09:36:29 GMTContent-Type: text/htmlContent-Length: 15Last-Modified: Mon, 17 Aug 2020 09:36:19 GMTConnection: keep-aliveETag: "5f3a4f93-f"Accept-Ranges: bytes
测试nginx服务
[root@localhost tools]# lsnginx-1.11.2.tar.gz[root@localhost tools]# yum  install gcc gcc-c++ make automake autoconf libtool pcre* zlib openssl openssl-devel[root@localhost tools]# tar xf nginx-1.11.2.tar.gz [root@localhost tools]# lsnginx-1.11.2  nginx-1.11.2.tar.gz[root@localhost tools]# cd nginx-1.11.2[root@localhost nginx-1.11.2]# lsauto  CHANGES  CHANGES.ru  conf  configure  contrib  html  LICENSE  man  README  src[root@localhost nginx-1.11.2]# ./configure[root@localhost nginx-1.11.2]# make[root@localhost nginx-1.11.2]# make install
172.16.1.10部署nginx

Linux安全章节:禁止经常访问的ip访问nginx redhat6.5ip:172.16.1
实验环境:
版本:redhat6.5
ip:172.16.1.100,172.16.10
软件:nginx