Configure IP-based session anomaly detection
IP-based Session Anomaly Detection settings are designed to prevent DDoS attacks and to optimize network load.
This setting may block legitimate traffic, especially if the environment (firewall/ISA/IDS) is not configured for the X-Forwarded-For
HTTP header. The X-Forwarded-For
header is a common way to identify the originating IP address of a device connecting to a web server through an HTTP proxy or load balancer.
The default is to use the load balancer with the x-Forwarded-For header.
This option is set at the System level.
- Go to Administration > Mail and Network Settings > Network Security.
- In the IP-based session anomaly detection area, select the type of anomaly detection for N-able N-central.
- Click Save.
If you change the default setting, you will need to log out and log back in to see the effects of the change.
When enabled, the session anomaly detection will be performed on each successive request after a user logs in. If a session anomaly is detected, the N-able N-central logs out the user and they are redirected to the login page.