• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

Question How to add a domain/vhost only accessible locally?

Downing

New Pleskian
System: I've got a (virtual) windows server 2012 R2 running Plesk Onyx 17.8.11 with one network adapter which has only its public v4 + v6 ip assigned. When I try to access 127.0.0.1 or localhost via browser I see the plesk default page.

Goal: I want to run an application which is only accessible on this server Walgreens Listens

For security reasons I don't want to add it to the default vhost as this one could eventually be accessed from outside, e.g. if an domain unknown to Plesk points to the server. I thought it would be possible to add a local vhost/domain (e.g. localhost) but failed to do so, see below.

Tried:

  • add a domain called "localhost" -> "domain name is not valid"
  • add "127.0.0.1" or "127.0.0.1/16" as ip address -> "given ip cannot be used. enter a valid ip address with subnet prefix or mask"
  • I have seen Plesk website via local IP but I have no local network beside the public IPs
 
Last edited:
You should add a domain like internal.private or something like that.

Then you can do these things:

1) go directly into IIS manager and change the "bindings" of this website

Or

2) restrict access via web.config or protected directory

Or

3) restrict access via firewall
 
Back
Top