


How to configure Nginx to protect WordPress/PHP website security
Nginx is a popular web server. It not only has the characteristics of high performance, low consumption, and strong concurrency, but also supports the configuration of reverse proxy, load balancing, HTTPS and many other functions. For WordPress/PHP websites, how to use Nginx configuration for security protection is very important. This article will introduce some Nginx configuration methods to ensure the security of WordPress/PHP websites.
- Configure reverse proxy
Reverse proxy refers to forwarding client requests to the internal server, and the internal server returns a response to the client. Through reverse proxy, the real IP address of the internal server can be hidden, thereby achieving the purpose of protecting the server. In Nginx, you can use the proxy_pass directive to configure the reverse proxy, as shown below:
server { listen 80; server_name yourdomain.com; location / { proxy_pass http://127.0.0.1:8080; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; } }
In the above configuration, the address of the reverse proxy server is http://127.0.0.1:8080, and $host represents the client. The requested domain name, $remote_addr represents the real IP address of the client.
- Configuring restricted IP access
Configuring restricted IP access can control access to certain IPs or IP segments to protect the server from illegal access. In Nginx, you can use the allow and deny directives to configure IP access control, as shown below:
location / { deny 192.168.1.1; allow all; }
The above configuration will deny access requests with the IP address 192.168.1.1 and allow access requests from other IP addresses. You can use commas to separate multiple IP addresses or IP segments.
- Configuring HTTPS
Configuring HTTPS can encrypt the transmitted data, thereby protecting the data from being stolen or tampered with during transmission. In Nginx, you can use the ssl_certificate and ssl_certificate_key instructions to configure HTTPS, as follows:
server { listen 443 ssl; server_name yourdomain.com; ssl_certificate /path/to/yourdomain.crt; ssl_certificate_key /path/to/yourdomain.key; location / { ... } }
In the above configuration, /path/to/yourdomain.crt and /path/to/yourdomain.key are the SSL certificate and The path to the private key.
- Configuring anti-hotlinking
Configuring anti-hotlinking can prevent other websites from displaying pictures or resources of this site through direct links, thereby protecting resources from illegal use. In Nginx, you can use the valid_referers directive to configure anti-hotlinking, as shown below:
location /images/ { valid_referers none blocked yourdomain.com; if ($invalid_referer) { return 403; } }
In the above configuration, /images/ is the resource path to be protected, valid_referers is used to specify a valid source domain name, and none means not to use it. Domain name restrictions, blocked means denying all illegal sources, yourdomain.com means allowing access from sources of this domain name. If the requested origin is not in the valid origin list, a 403 error will be returned.
- Configuring the cache
Configuring the cache can reduce the load on the server, improve the access speed of the website, and maintain the accessibility of the website when the server is down. In Nginx, you can use the proxy_cache_path directive to configure the cache, as shown below:
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=my_cache:10m inactive=60m; location / { proxy_cache my_cache; proxy_cache_valid 200 60m; proxy_cache_valid 404 1m; }
In the above configuration, /var/cache/nginx is the cache path, and levels=1:2 indicates the hierarchical level of the cache path. keys_zone=my_cache:10m means using my_cache as the cache storage space, the size is 10M, inactive=60m means the cache will be cleared after 60 minutes. The proxy_cache directive is used to enable caching, and the proxy_cache_valid directive is used to set the cache time.
Summary
Through the above five Nginx configuration methods, you can effectively protect the security of WordPress/PHP websites. Reverse proxy can hide the real IP address of the server, restricting IP access can control access rights to the server, HTTPS can encrypt data transmission, anti-leeching can protect resources from illegal use, and caching can improve the access speed and accessibility of the website. Of course, these configuration methods cannot completely guarantee the security of the website. You also need to pay attention to other security issues, such as password protection, file permissions, etc.
The above is the detailed content of How to configure Nginx to protect WordPress/PHP website security. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



How to confirm whether Nginx is started: 1. Use the command line: systemctl status nginx (Linux/Unix), netstat -ano | findstr 80 (Windows); 2. Check whether port 80 is open; 3. Check the Nginx startup message in the system log; 4. Use third-party tools, such as Nagios, Zabbix, and Icinga.

In Linux, use the following command to check whether Nginx is started: systemctl status nginx judges based on the command output: If "Active: active (running)" is displayed, Nginx is started. If "Active: inactive (dead)" is displayed, Nginx is stopped.

How to configure Nginx in Windows? Install Nginx and create a virtual host configuration. Modify the main configuration file and include the virtual host configuration. Start or reload Nginx. Test the configuration and view the website. Selectively enable SSL and configure SSL certificates. Selectively set the firewall to allow port 80 and 443 traffic.

Steps to start Nginx in Linux: Check whether Nginx is installed. Use systemctl start nginx to start the Nginx service. Use systemctl enable nginx to enable automatic startup of Nginx at system startup. Use systemctl status nginx to verify that the startup is successful. Visit http://localhost in a web browser to view the default welcome page.

Starting an Nginx server requires different steps according to different operating systems: Linux/Unix system: Install the Nginx package (for example, using apt-get or yum). Use systemctl to start an Nginx service (for example, sudo systemctl start nginx). Windows system: Download and install Windows binary files. Start Nginx using the nginx.exe executable (for example, nginx.exe -c conf\nginx.conf). No matter which operating system you use, you can access the server IP

The server does not have permission to access the requested resource, resulting in a nginx 403 error. Solutions include: Check file permissions. Check the .htaccess configuration. Check nginx configuration. Configure SELinux permissions. Check the firewall rules. Troubleshoot other causes such as browser problems, server failures, or other possible errors.

There are two ways to solve the Nginx cross-domain problem: modify the cross-domain response header: add directives to allow cross-domain requests, specify allowed methods and headers, and set cache time. Use CORS modules: Enable modules and configure CORS rules that allow cross-domain requests, methods, headers, and cache times.

Answer to the question: 304 Not Modified error indicates that the browser has cached the latest resource version of the client request. Solution: 1. Clear the browser cache; 2. Disable the browser cache; 3. Configure Nginx to allow client cache; 4. Check file permissions; 5. Check file hash; 6. Disable CDN or reverse proxy cache; 7. Restart Nginx.
