Ngrok install mac os

Содержание
  1. Public URLs for
  2. Take advantage of a powerful local inspector
  3. And so much more.
  4. Join the hundreds of thousands of developers who love ngrok Here’s some kind words from a few of them.
  5. Ngrok install mac os
  6. Inspecting your traffic
  7. Replaying requests
  8. Installing your Authtoken
  9. Getting a stable URL
  10. HTTP Tunnels
  11. Custom subdomain names
  12. Password protecting your tunnel
  13. Tunnels on custom domains (white label URLs)
  14. Local HTTPS servers
  15. Rewriting the Host header
  16. Serving local directories with ngrok’s built-in fileserver
  17. Tunneling only HTTP or HTTPS
  18. Disabling Inspection
  19. Websockets
  20. TLS Tunnels
  21. TLS Tunnels without certificate warnings
  22. Terminating TLS connections
  23. Running non-HTTP services over TLS tunnels
  24. Compatible Clients
  25. More Tunneling Options
  26. Wildcard domains
  27. Wildcard domain rules
  28. Forwarding to servers on a different machine (non-local services)
  29. The ngrok configuration file
  30. Configuration file location
  31. Default configuration file location
  32. Tunnel definitions
  33. Running multiple simultaneous tunnels
  34. Example Configuration Files
  35. Configuration Options
  36. authtoken
  37. console_ui
  38. console_ui_color
  39. http_proxy
  40. inspect_db_size
  41. log_level
  42. log_format
  43. metadata
  44. region
  45. root_cas
  46. socks5_proxy
  47. tunnels
  48. update
  49. update_channel
  50. web_addr
  51. Web Inspection Interface
  52. Inspecting requests
  53. Request body validation
  54. Filtering requests
  55. Replaying requests
  56. Replaying modified requests
  57. Status page: metrics and configuration
  58. Event Subscriptions
  59. Event Types
  60. Parts of an Event Subscription
  61. Event Sources
  62. Event Destinations
  63. Events Payloads
  64. IP Whitelisting Tunnel Access
  65. Managing the whitelist
  66. IP Ranges
  67. Global infrastructure

Public URLs for

Spend more time programming. One command for an instant, secure URL to your localhost server through any NAT or firewall.

Welcome to Kate’s Site!

It’s currently under development… Check back soon!

node app.js Serving app.js port 3000

./ngrok http 3000

ngrok by @inconshreveable Session Status online Account Kate Libby (Plan: Pro) Web Interface http://127.0.0.1:4040 Forwarding http://katesapp.ngrok.io -> localhost:3000 Forwarding https://katesapp.ngrok.io -> localhost:3000

Take advantage of a powerful local inspector

And so much more.

Join the hundreds of thousands of developers who love ngrok
Here’s some kind words from a few of them.

ngrok has become essential to my workflow. Makes testing responsive designs so much easier.

ngrok is genius, replaying requests makes webhooks 1M times easier to handle. ngrok.com

#ngrok is a dream for testing localhost with remote APIs!

ngrok has got to be the easiest local tunnel solution I’ve ever used.

ngrok, probably the best tool I have started to use for my webwork since firebug also great support

Источник

Ngrok install mac os

ngrok allows you to expose a web server running on your local machine to the internet. Just tell ngrok what port your web server is listening on.

If you don’t know what port your web server is listening on, it’s probably port 80, the default for HTTP.

Example: Expose a web server on port 80 of your local machine to the internet

When you start ngrok, it will display a UI in your terminal with the public URL of your tunnel and other status and metrics information about connections made over your tunnel.

The ngrok console UI

Inspecting your traffic

ngrok provides a real-time web UI where you can introspect all of the HTTP traffic running over your tunnels. After you’ve started ngrok, just open http://localhost:4040 in a web browser to inspect request details.

Try making a request to your public URL. After you have, look back at the inspection UI. You will see all of the details of the request and response including the time, duration, headers, query parameters and request payload as well as the raw bytes on the wire.

Detailed introspection of HTTP requests and responses

Replaying requests

Developing for webhooks issued by external APIs can often slow down your development cycle by requiring you do some work, like dialing a phone, to trigger the hook request. ngrok allows you to replay any request with a single click dramatically speeding up your iteration cycle. Click the Replay button at the top-right corner of any request on the web inspection UI to replay it.

Replay any request against your tunneled web server with one click

Installing your Authtoken

Many advanced features of the ngrok.com service described in further sections require that you sign up for an account. Once you’ve signed up, you need to configure ngrok with the authtoken that appears on your dashboard. This will grant you access to account-only features. ngrok has a simple ‘authtoken’ command to make this easy. Under the hood, all the authtoken command does is to add (or modify) the authtoken property in your ngrok configuration file.

Install your authtoken

Getting a stable URL

On the free plan, ngrok’s URLs are randomly generated and temporary. If you want to use the same URL every time, you need to upgrade to a paid plan so that you can use the subdomain option for a stable URL with HTTP or TLS tunnels and the remote-addr option for a stable address with TCP tunnels.

HTTP Tunnels

Custom subdomain names

ngrok assigns random hexadecimal names to the HTTP tunnels it opens for you. This is okay for one-time personal uses. But if you’re displaying the URL at a hackathon or integrating with a third-party webhook, it can be frustrating if the tunnel name changes or is difficult to read. You can specify a custom subdomain for your tunnel URL with the -subdomain switch.

Example: Open a tunnel with the subdomain ‘inconshreveable’

Password protecting your tunnel

Anyone who can guess your tunnel URL can access your local web server unless you protect it with a password. You can make your tunnels secure with the -auth switch. This enforces HTTP Basic Auth on all requests with the username and password you specify as an argument.

Example: Password-protect your tunnel

Tunnels on custom domains (white label URLs)

Instead of your tunnel appearing as a subdomain of ngrok.io , you can run ngrok tunnels over your domains. To run a tunnel over dev.example.com , follow these steps:

  1. Navigate to the Domains tab of your ngrok.com dashboard and click ‘Add a domain’. Enter dev.example.com as a Reserved Domain. This guarantees that no one else can hijack your domain name with their own tunnel.
  2. On your dashboard, click on the ‘CNAME’ icon to copy your CNAME target.
  3. Create a DNS CNAME record from dev.example.com to your CNAME target. In this example, we would point the CNAME record to 2w9c34maz.cname.ngrok.io
  4. Invoke ngrok with the -hostname switch and specify the name of your custom domain as an argument. Make sure the -region you specify matches the region in which you reserved your domain.

Example: Run a tunnel over a custom domain

Local HTTPS servers

ngrok assumes that the server it is forwarding to is listening for unencrypted HTTP traffic, but what if your server is listening for encrypted HTTPS traffic? You can specify a URL with an https:// scheme to request that ngrok speak HTTPS to your local server.

Forward to an https server by specifying the https:// scheme

As a special case, ngrok assumes that if you forward to port 443 on any host that it should send HTTPS traffic and will act as if you specified an https:// URL.

Forward to the default https port on localhost

Rewriting the Host header

When forwarding to a local port, ngrok does not modify the tunneled HTTP requests at all, they are copied to your server byte-for-byte as they are received. Some application servers like WAMP and MAMP and use the Host header for determining which development site to display. For this reason, ngrok can rewrite your requests with a modified Host header. Use the -host-header switch to rewrite incoming HTTP requests.

If rewrite is specified, the Host header will be rewritten to match the hostname portion of the forwarding address. Any other value will cause the Host header to be rewritten to that value.

Rewrite the Host header to ‘site.dev’
Rewrite the Host header to ‘example.com’

Serving local directories with ngrok’s built-in fileserver

ngrok can serve local file system directories by using its own built-in fileserver, no separate server needed! You can serve files using the file:// scheme when specifying the forwarding URL.

All paths must be specified as absolute paths, the file:// URL scheme has no notion of relative paths.

Share a folder on your computer with authentication

File URLs can look a little weird on Windows, but they work the same:

Share a folder on your Windows computer

Tunneling only HTTP or HTTPS

By default, when ngrok runs an HTTP tunnel, it opens endpoints for both HTTP and HTTPS traffic. If you wish to only forward HTTP or HTTPS traffic, but not both, you can toggle this behavior with the -bind-tls switch.

Example: Only listen on an HTTP tunnel endpoint
Example: Only listen on an HTTPS tunnel endpoint

Disabling Inspection

ngrok records each HTTP request and response over your tunnels for inspection and replay. While this is really useful for development, when you’re running ngrok on production services, you may wish to disable it for security and performance. Use the -inspect switch to disable inspection on your tunnel.

Example: An http tunnel with no inspection

Websockets

Websocket endpoints work through ngrok’s http tunnels without any changes. However, there is currently no support for introspecting them beyond the initial 101 Switching Protocols response.

TLS Tunnels

HTTPS tunnels terminate all TLS (SSL) traffic at the ngrok.com servers using ngrok.com certificates. For production-grade services, you’ll want your tunneled traffic to be encrypted with your own TLS key and certificate. ngrok makes this extraordinarily easy with TLS tunnels.

Forward TLS traffic to a local HTTPS server on port 443

Once your tunnel is running, try accessing it with curl.

TLS Tunnels without certificate warnings

Notice that —insecure option in the previous curl command example? You need to specify that because your local HTTPS server doesn’t have the TLS key and certificate necessary to terminate traffic for any ngrok.io subdomains. If you try to load up that page in a web browser, you’ll notice that it tells you the page could be insecure because the certificate does not match.

If you want your certificates to match and be protected from man-in-the-middle attacks, you need two things. First, you’ll need to buy an SSL (TLS) certificate for a domain name that you own and configure your local web server to use that certificate and its private key to terminate TLS connections. How to do this is specific to your web server and SSL certificate provider and beyond the scope of this documentation. For the sake of example, we’ll assume that you were issued an SSL certificate for the domain secure.example.com .

Once you have your key and certificate and have installed them properly, it’s now time to run a TLS tunnel on your own custom domain name. The instructions to set this up are identical to those described in the HTTP tunnels section: Tunnels on custom domains. The custom domain you register should be the same as the one in your SSL certificate ( secure.example.com ). After you’ve set up the custom domain, use the -hostname argument to start the TLS tunnel on your own domain.

Forward TLS traffic over your own custom domain

Terminating TLS connections

It’s possible that the service you’re trying to expose may not have the capability to terminate TLS connections. The ngrok client can do this for you so that you can encrypt your traffic end-to-end but not have to worry about whether the local service has TLS support. Specify both the -crt and -key command line options to specify the filesystem paths to your TLS certificate and key and the ngrok client will take care of terminating TLS connections for you.

Offload TLS Termination to the ngrok client

Running non-HTTP services over TLS tunnels

ngrok TLS tunnels make no assumptions about the underlying protocol being transported. All examples in this documentation use HTTPS because it is the most common use case, but you can run run any TLS-wrapped protocol over a TLS tunnel (e.g. imaps, smtps, sips, etc) without any changes.

Compatible Clients

TLS tunnels work by inspecting the data present in the Server Name Information (SNI) extension on incoming TLS connections. Not all clients that initiate TLS connections support setting the SNI extension data. These clients will not work properly with ngrok’s TLS tunnels. Fortunately, nearly all modern browsers use SNI. Some modern software libraries do not though. The following list of clients do not support SNI and will not work with TLS tunnels:

  • Microsoft Internet Explorer 6.0
  • Microsoft Internet Explorer 7 & 8 on Windows XP or earlier
  • Native browser on Android 2.X
  • Java -remote-addr option when invoking ngrok to bind a tunnel on your reserved TCP address. Make sure the -region you specify matches the region in which you reserved your address.
Bind a TCP tunnel on a reserved remote address

More Tunneling Options

Wildcard domains

ngrok permits you to bind HTTP and TLS tunnels to wildcard domains. All wildcard domains, even those that are subdomains of ngrok.io must first be reserved for your account on your dashboard. When using -hostname or -subdomain , specify a leading asterisk to bind a wildcard domain.

Bind a tunnel to receive traffic on all subdomains of example.com

Wildcard domain rules

The use of wildcard domains creates ambiguities in some aspects of the ngrok.com service. The following rules are used to resolve these situations and are important to understand if you are using wildcard domains.

For the purposes of example, assume you have reserved the address *.example.com for your account.

  • Connections to nested subdomains (e.g. foo.bar.baz.example.com ) will route to your wildcard tunnel.
  • You may bind tunnels on any valid subdomain of example.com without creating an additional reserved domain entry.
  • No other account may reserve foo.example.com or any other subdomain that would match a wildcard domain reserved by another account.
  • Connections are routed to the most specific matching tunnel online. If you are running tunnels for both foo.example.com and *.example.com , requests to foo.example.com will always route to foo.example.com

Forwarding to servers on a different machine (non-local services)

ngrok can forward to services that aren’t running on your local machine. Instead of specifying a port number, just specify a network address and port instead.

Example: Forward to a web server on a different machine

The ngrok configuration file

Sometimes your configuration for ngrok is too complex to be expressed in command line options. ngrok supports an optional, extremely simple YAML configuration file which provides you with the power to run multiple tunnels simultaneously as well as to tweak some of ngrok’s more arcane settings.

Configuration file location

You may pass a path to an explicit configuration file with the -config option. This is recommended for all production deployments.

Explicitly specify a configuration file location

You may pass the -config option more than once. If you do, the first configuration is parsed and each successive configuration is merged on top of it. This allows you to have per-project ngrok configuration files with tunnel definitions but a master configuration file in your home directory with your authtoken and other global settings.

Specify an additional configuration file with project-specific overrides

Default configuration file location

If you don’t specify a location for a configuration file, ngrok tries to read one from the default location $HOME/.ngrok2/ngrok.yml . The configuration file is optional; no error is emitted if that path does not exist.

In the default path, $HOME is the home directory for the current user as defined by your operating system. It is not the environment variable $HOME, although they are often the same. For major operating systems, if your username is example the default configuration would likely be found at the following paths:

OS X /Users/example/.ngrok2/ngrok.yml
Linux /home/example/.ngrok2/ngrok.yml
Windows C:\Users\example\.ngrok2\ngrok.yml

Tunnel definitions

The most common use of the configuration file is to define tunnel configurations. Defining tunnel configurations is useful because you may then start pre-configured tunnels by name from your command line without remembering all of the right arguments every time.

Tunnels are defined as mapping of name -> configuration under the tunnels property in your configuration file.

Define two tunnels named ‘httpbin’ and ‘demo’
Start the tunnel named ‘httpbin’

Each tunnel you define is a map of configuration option names to values. The name of a configuration option is usually the same as its corresponding command line switch. Every tunnel must define proto and addr . Other properties are available and many are protocol-specific.

Tunnel Configuration Properties
tunnel protocol name, one of http , tcp , tls addr forward traffic to this local port number or network address inspect enable http request inspection auth HTTP basic authentication credentials to enforce on tunneled requests host_header Rewrite the HTTP Host header to this value, or preserve to leave it unchanged bind_tls bind an HTTPS or HTTP endpoint or both true , false , or both subdomain subdomain name to request. If unspecified, uses the tunnel name hostname hostname to request (requires reserved name and DNS CNAME) crt PEM TLS certificate at this path to terminate TLS traffic before forwarding locally key PEM TLS private key at this path to terminate TLS traffic before forwarding locally client_cas PEM TLS certificate authority at this path will verify incoming TLS client connection certificates. remote_addr bind the remote TCP port on the given address metadata arbitrary user-defined metadata that will appear in the ngrok service API when listing tunnels

Running multiple simultaneous tunnels

You can pass multiple tunnel names to ngrok start and ngrok will run them all simultaneously.

Start three named tunnels from the configuration file

You can also ask ngrok to start all of the tunnels defined in the configuration file with the —all switch.

Start all tunnels defined in the configuration file

Conversely, you may ask ngrok to run without starting any tunnels with the —none switch. This is useful if you plan to manage ngrok’s tunnels entirely via the API.

Run ngrok without starting any tunnels

Example Configuration Files

Example configuration files are presented below. The subsequent section contains full documentation for all configuration parameters shown in these examples.

Run tunnels for multiple virtual hosted development sites
Tunnel a custom domain over both http and https with your own certificate
Expose ngrok’s web inspection interface and API over a tunnel
Example configuration file with all options

Configuration Options

authtoken

This option specifies the authentication token used to authenticate this client when it connects to the ngrok.com service. After you’ve created an ngrok.com account, your dashboard will display the authtoken assigned to your account.

ngrok.yml specifying an authtoken

console_ui

true enable the console UI
false disable the console UI
iftty enable the UI only if standard out is a TTY (not a file or pipe)

console_ui_color

transparent don’t set a background color when displaying the console UI
black set the console UI’s background to black

http_proxy

URL of an HTTP proxy to use for establishing the tunnel connection. Many HTTP proxies have connection size and duration limits that will cause ngrok to fail. Like many other networking tools, ngrok will also respect the environment variable http_proxy if it is set.

Example of ngrok over an authenticated HTTP proxy

inspect_db_size

positive integers size in bytes of the upper limit on memory to allocate to save requests over HTTP tunnels for inspection and replay.
0 use the default allocation limit, 50MB
-1 disable the inspection database; this has the effective behavior of disabling inspection for all tunnels

log_level

Logging level of detail. In increasing order of verbosity, possible values are: crit , warn , error , info , debug

log_format

Format of written log records.

logfmt human and machine friendly key/value pairs
json newline-separated JSON objects
term custom colored human format if standard out is a TTY, otherwise same as logfmt

Write logs to this target destination.

stdout write to standard out
stderr write to standard error
false disable logging
other values write log records to file path on disk

metadata

Opaque, user-supplied string that will be returned as part of the ngrok.com API response to the List Online Tunnels resource for all tunnels started by this client. This is a useful mechanism to identify tunnels by your own device or customer identifier. Maximum 4096 characters.

region

Choose the region where the ngrok client will connect to host its tunnels.

United States eu Europe ap Asia/Pacific au Australia sa South America jp Japan in India

root_cas

The root certificate authorities used to validate the TLS connection to the ngrok server.

use only the trusted certificate root for the ngrok.com tunnel service host use the root certificates trusted by the host’s operating system. You will likely want to use this option to connect to third-party ngrok servers. other values path to a certificate PEM file on disk with certificate authorities to trust

socks5_proxy

URL of a SOCKS5 proxy to use for establishing a connection to the ngrok server.

tunnels

A map of names to tunnel definitions. See Tunnel definitions for more details.

update

true automatically update ngrok to the latest version, when available
false never update ngrok unless manually initiated by the user

update_channel

The update channel determines the stability of released builds to update to. Use ‘stable’ for all production deployments.

channel beta update to new beta builds when available

web_addr

Network address to bind on for serving the local web interface and api.

network address bind to this network address
127.0.0.1:4040 default network address
false disable the web UI

Web Inspection Interface

The ngrok client ships with a powerful realtime inspection interface which allows you to see what traffic is sent to your application server and what responses your server is returning.

Inspecting requests

Every HTTP request through your tunnels will be displayed in the inspection interface. After you start ngrok, open http://localhost:4040 in a browser. You will see all of the details of every request and response including the time, duration, source IP, headers, query parameters, request payload and response body as well as the raw bytes on the wire.

The inspection interface has a few limitations. If an entity-body is too long, ngrok may only capture the initial portion of the request body. Furthermore, ngrok does not display provisional 100 responses from a server.

Detailed introspection of HTTP requests and responses

Request body validation

ngrok has special support for the most common data interchange formats in use on the web. Any XML or JSON data in request or response bodies is automatically pretty-printed for you and checked for syntax errors.

The location of a JSON syntax error is highlighted

Filtering requests

Your application server may receive many requests, but you are often only interested in inspecting some of them. You can filter the requests that ngrok displays to you. You can filter based on the request path, response status code, size of the response body, duration of the request and the value of any header.

Click the filter bar for filtering options

You may specify multiple filters. If you do, requests will only be shown if they much all filters.

Filter requests by path and status code

Replaying requests

Developing for webhooks issued by external APIs can often slow down your development cycle by requiring you do some work, like dialing a phone, to trigger the hook request. ngrok allows you to replay any request with a single click, dramatically speeding up your iteration cycle. Click the Replay button at the top-right corner of any request on the web inspection UI to replay it.

Replay any request against your tunneled web server with one click

Replaying modified requests

Sometimes you want to modify a request before you replay it to test a new behavior in your application server.

Click the dropdown arrow on the ‘Replay’ button to modify a request before it is replayed

The replay editor allows you to modify every aspect of the http request before replaying it, including the method, path, headers, trailers and request body.

The request replay modification editor

Status page: metrics and configuration

ngrok’s local web interface has a dedicated status page that shows configuration and metrics information about the running ngrok process. You can access it at http://localhost:4040/status.

The status page displays the configuration of each running tunnel and any global configuration options that ngrok has parsed from its configuration file.

Tunnel and global configuration

The status page also display metrics about the traffic through each tunnel. It display connection rates and connection duration percentiles for all tunnels. For http tunnels, it also displays http request rates and http response duration percentiles.

Tunnel traffic metrics

Event Subscriptions

Event Subscriptions capture events from your ngrok account and send them to configurable destinations like Amazon CloudWatch Logs, Amazon Kinesis (as a data stream) or Amazon Kinesis Firehose (as a delivery stream).

You might create an Event Subscription to audit every time a team member gets created, updated, and deleted in your ngrok account, or every time somebody connects to an ngrok tunnel.

Event Types

Many objects within ngrok have corresponding events that are generated when an instance of the object is created, updated and deleted. For example, an event of type ip_policy_created.v0 is generated when an IP Policy is created. All Event Types have a version, represented in the Event Type string following the period. The initial version for all Event Types is v0.

A full list of Event Types follows:

  • api_key_created.v0
  • api_key_deleted.v0
  • api_key_updated.v0
  • certificate_authority_created.v0
  • certificate_authority_deleted.v0
  • certificate_authority_updated.v0
  • domain_created.v0
  • domain_deleted.v0
  • domain_updated.v0
  • event_destination_created.v0
  • event_destination_deleted.v0
  • event_destination_updated.v0
  • event_subscription_created.v0
  • event_subscription_deleted.v0
  • event_subscription_updated.v0
  • http_request_complete.v0
  • ip_policy_created.v0
  • ip_policy_deleted.v0
  • ip_policy_rule_created.v0
  • ip_policy_rule_deleted.v0
  • ip_policy_rule_updated.v0
  • ip_policy_updated.v0
  • ip_restriction_created.v0
  • ip_restriction_deleted.v0
  • ip_restriction_updated.v0
  • ssh_certificate_authority_created.v0
  • ssh_certificate_authority_deleted.v0
  • ssh_certificate_authority_updated.v0
  • ssh_host_certificate_created.v0
  • ssh_host_certificate_deleted.v0
  • ssh_host_certificate_updated.v0
  • ssh_public_key_created.v0
  • ssh_public_key_deleted.v0
  • ssh_public_key_updated.v0
  • ssh_user_certificate_created.v0
  • ssh_user_certificate_deleted.v0
  • ssh_user_certificate_updated.v0
  • tcp_address_created.v0
  • tcp_address_deleted.v0
  • tcp_address_updated.v0
  • tcp_connection_closed.v0
  • tls_certificate_created.v0
  • tls_certificate_deleted.v0
  • tls_certificate_updated.v0
  • tunnel_credential_created.v0
  • tunnel_credential_deleted.v0
  • tunnel_credential_updated.v0

Parts of an Event Subscription

You can think of an Event Subscription as a set of Sources attached to one or more Destinations. Sources define which events to capture, and Destinations specify where to send those events.

Event Sources

An Event Source specifies the type of event to capture. A single Event Subscription can have many Sources.

Event Destinations

An Event Destination specifies a service and any required configuration for it to receive Events data. You can send a set of Events to one or more Destinations. Currently, you can configure your Destinations to send Events to the following services:

  • AWS CloudWatch Logs
  • AWS Kinesis Data Streams
  • AWS Kinesis Firehose Delivery Streams

Note that Kinesis Firehose can deliver events into an S3 bucket.

Events Payloads

Events are sent as JSON to configured destinations. All events include the following fields:

Name Description Example
event_id unique identifier for this event, always prefixed with ev_ ev_1vPlyBW3OR44bpPphS4HIZyajDD
event_type identifies the object, action, and version of the event ip_policy_created.v0
event_timestamp timestamp of when the event fired in RFC 3339 format 2021-07-16T21:44:37Z
object a json object describing the resource where the event occurred <
«id»: «ipp_1vPlyF4iyQj82hjSv67dRkV8woI»,
«uri»: «https://api.ngrok.com/ip_policies/ipp_1vPlyF4iyQj82hjSv67dRkV8woI»,
«created_at»: «2021-07-16T21:44:16Z»,
«description»: «bar»,
«metadata»: «»,
«action»: «allow»
>

IP Whitelisting Tunnel Access

You may whitelist access to tunnel endpoints on your account. The whitelist is enforced by the ngrok.com servers. It is applied globally to all of your tunnel endpoints. Any incoming connection to any of your tunnel endpoints is checked to guarantee that the source IP address of the connection matches at least one entry in your whitelist. If a connection does not match the whitelist it is terminated immediately and never forwarded to an ngrok client.

As a special case, if your whitelist is empty, all connections are allowed.

Managing the whitelist

You can manage the IP whitelist on the auth tab of your ngrok dashboard. Enter a new IP address under the «IP Whitelist» section and then click Add Whitelist Entry. Changes to the IP Whitelist can take up to 30 seconds to take effect.

IP Ranges

Sometimes, you may wish to whitelist an entire range of IPs. Instead of entering just a single IP address, you may instead specify a block of IP addresses using CIDR notation. For example, to allow all IP addresses from 10.1.2.0 to 10.1.2.255, you would add 10.1.2.0/24 to your whitelist.

Global infrastructure

ngrok runs globally distributed tunnel servers around the world to enable fast, low latency traffic to your applications.

Источник

Читайте также:  Как отключить лимитное подключение windows 10 вай фай
Оцените статью