I use this one server wide command to restrict access to wp-login.php to two hits a second. It works well.
QS_LocRequestLimitMatch "^(/wp-login.php).*$" 2
How do I whitelist an IP address from this restriction now? This does not seem to help:
SetEnvIf Remote_Addr 1.2.3.4 QS_VipRequest=yes
QS_LocRequestLimitMatch "^(/wp-login.php).*$" 2
Thanks for any input.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
I use this one server wide command to restrict access to wp-login.php to two hits a second. It works well.
QS_LocRequestLimitMatch "^(/wp-login.php).*$" 2
How do I whitelist an IP address from this restriction now? This does not seem to help:
SetEnvIf Remote_Addr 1.2.3.4 QS_VipRequest=yes
QS_LocRequestLimitMatch "^(/wp-login.php).*$" 2
Thanks for any input.
You have to use the QS_VipHeaderName directive to enable the VIP feature.
see also http://opensource.adnovum.ch/mod_qos/index.html#QS_VipRequest
Ok, thanks. Maybe I'll get that a try.