Getting Started

SmartIpier Addon for Lernen LMS

Thank you so much for purchasing our item from CodeCanyon.


  • Created: 25 March, 2025

If you have any questions that are beyond the scope of this help file, please feel free to email via Item Support Page.


Things You Must Have:

These are prerequisites for SmartIpier

  • Lernen: 2.1.5

Downloading and Installation

Follow these steps to install the SmartIpier - Addon for the Lernen in your Lernen project:

  • Step 1: Download the Package

    When downloading the zip package file from CodeCanyon, you'll have all the files you need inside. The zip package contains the following files:

    • IPManager.zip contains the SmartIpier - Addon for the Lernen
    • IPManager.zip folder (It contains documentation for the Addon)
  • Step 2: Extract the Package
    • Extract the downloaded zip file i.e. IPManager.zip
  • Step 3: Install Subscriptions
    • Goto Admin > Manage Addons > Add new and click on Add/Update addon. Subscription Addons
    • Choose the IPManager.zip file and click on Install. Subscription Addons
  • Troubleshooting

    If you encounter any issues while installing the SmartIpier Addon, follow these steps:

    • Ensure that the packages directory has write permissions
    • Ensure that the composer.json file has write permissions
  • Alternatively, Manually Installation

    If you prefer to manually install the SmartIpier Addon, follow these steps:

    • Extract the downloaded zip file i.e. IPManager.zip
      • After uploading you need to execute the following commands in the website root directory through CLI
        • Execute this – php artisan module:enable IPManager
        • Execute this – php artisan migrate
        • Execute this – php artisan module:publish IPManager
        • Execute this – php artisan module:seeder IPManager

Login History

The IP Management - Login History tab provides a comprehensive log of user login details, including identity, OS, browser, device, IP address, and location. Administrators can efficiently track logins, analyze trends, and strengthen security using real-time insights and a structured audit trail.

  • User Information This section shows the name of the logged-in user. An external link next to the name provides quick access to additional profile details or admin privileges, streamlining user management.
  • Operating System (OS) Displays the operating system used during login, such as Windows, Mac OS, or Linux. This helps in identifying user environments and detecting unusual access patterns for enhanced security.
  • Browser Displays the browser used for login, such as Chrome or Firefox. This information helps administrators track browser preferences, ensure compatibility, and identify potential security concerns.
  • Device Type Shows the type of device used for login, whether Desktop, Mobile, or Tablet. This helps in understanding access patterns and optimizing security measures accordingly.
  • IP Address Every login attempt is linked to a unique IP address, enabling administrators to monitor access points, detect suspicious activity, and strengthen security protocols. Analyzing IP data ensures compliance with security policies and prevents unauthorized access.
  • Country Shows the country where the login attempt was made. This helps administrators track user access, identify trends, and spot any unusual or unauthorized locations.
  • City Shows the city where the login attempt occurred, helping administrators track access patterns and detect any unusual login activities.
  • Latitude & Longitude Identifies the exact login location. Latitude shows how far north or south, while Longitude indicates east or west. This data aids in tracking access and spotting unusual activity.
  • Session Start Captures the exact time a user logs in, helping track activity timelines and monitor access patterns efficiently.
  • Session End Captures the exact time a user logs out or the session is terminated, providing a clear record of session duration and access activity.
  • Duration Tracks how long a session stays active, measured in seconds, minutes, or hours. This helps monitor user activity and detect unusually long or short sessions for security purposes.

Actions

  • End Session Instantly terminates an active user session, preventing unauthorized access or prolonged usage. This ensures enhanced security by allowing administrators to take immediate action against suspicious or unnecessary sessions.
  • Block IP Blocks future logins from the specified IP address, preventing unauthorized access. This helps enhance security, reduce risks, and ensure that only trusted users can connect to the system.
  • Remove Deletes the login record from the system, helping to keep records organized and remove outdated or unnecessary entries. This ensures a cleaner and more manageable login history for administrators.

Smart IP Search and Filter

  • The Search Bar helps administrators find login records by searching for a specific IP address. This makes it easier to track user logins, monitor security risks, and detect unusual activity. Since the search is limited to IP addresses, admins can quickly identify suspicious logins and enhance security oversight.
  • The Filter Dropdown allows administrators to refine login records based on session status:
  • All: Shows every recorded login session, whether currently active or previously ended, providing a complete overview of user access history.
  • Open: Displays only login sessions that are still active, allowing administrators to monitor ongoing user activity in real time.
  • Ended: Displays login sessions that have already been completed, helping administrators review past user activities efficiently.
img

IP Restriction

The IP Restriction tab in the IP Management module allows administrators to control access by restricting login attempts based on specific IP addresses, IP ranges, or even entire countries. This enhances security by preventing unauthorized users from accessing the system and reducing the risk of malicious activity.

  • ID A unique system-generated identifier assigned to each restriction entry, making it easy to track and manage.
  • Value Displays the name of the restricted country, a specific blocked IP address, or an entire restricted IP range, making it simple for administrators to identify and manage access restrictions effectively.
  • Reason Describes why the restriction was applied, helping administrators keep track of security decisions and maintain clear records for future reference.

Types of IP Restrictions

  • Restrict by Country Administrators can restrict access from specific countries, ensuring users from those regions cannot log in. This feature helps maintain security, enforce compliance policies, and minimize the risk of fraudulent or unauthorized access.
  • Restrict by Specific IP Blocking specific IP addresses prevents unauthorized users from accessing the system. This is particularly useful for stopping suspicious or potentially harmful individuals from attempting to log in, ensuring better security and control.
  • Restrict by IP Range Administrators have the option to restrict access from a range of IP addresses instead of blocking them individually. This is especially useful for preventing unauthorized access from entire networks or groups of potential threats while maintaining strong security measures

Actions

  • Edit Enables administrators to modify existing restrictions, ensuring better access control and strengthened security.
  • Remove Removes a restriction, allowing previously blocked users or locations to regain access, ensuring adaptable and secure access management.
ip_restriction

Add Restriction

  • Type Administrators can choose the type of restriction from a dropdown menu, including blocking access from a country, a specific IP, or a range of IPs. This feature provides better control over system access and improves security by preventing unauthorized connections.
  • Restriction Type (Specific IP, IP Range, or Country) The restriction input field changes based on the selected restriction type. If "Specific IP" is chosen, the administrator must enter a single IP address (e.g., 192.168.1.1). If "IP Range" is selected, they need to specify a range of IP addresses (e.g., 192.168.1.1 - 192.168.1.50). For "Country," the administrator selects a country from a predefined list to block access from that location.
  • Reason A text field where administrators can enter a reason for applying the restriction. This helps in record-keeping and justifies why an IP or country is being restricted.
  • Save Button Once all fields are filled out correctly, clicking the "Save" button applies the restriction and adds it to the list of active restrictions.
img