πŸ”₯IP allowlist

IP allowlist feature to protect system security

You can enable IP allowlist feature, set the IP addresses or ranges allowed to log in to the system, precisely control user access rights, and effectively enhance the security of company data!

Setup

  • IP address

    • Supported formats: IPv4 (for example:192.168.1.1) or IPv6.

    • Enter a single IP or multiple IPs as needed. Please confirm the IP addresses are correct to avoid accidentally locking yourself out.

  • CIDR address

    • CIDR is a way to specify IP network ranges; different mask lengths set different IP coverage ranges. Here are common examples:

      • 8: allows a very wide range, for example the entire 192.0.0.0/8.

      • 16: covers a medium-sized IP block, for example 192.168.0.0/16, ranges from 192.168.0.0 to 192.168.255.255.

      • 24: commonly used for a single subnet with a more precise range, for example 192.168.1.0/24, covering from 192.168.1.0 to 192.168.1.255.

    • If the IP input is 192.168.1.0and the CIDR input is 24, it means the allowed range is 192.168.1.0 to 192.168.1.255 of all IP addresses.

  • Description

    • This field is optional, but it is recommended to fill in a brief description, such as: "Company internal network" or "Branch office IP."

  • Allow type

    • API: set whether API access is allowed. If checked, IPs in the list can use API functions.

    • System: set whether login to the system is allowed.

Example entries

Assuming the company's internal network IP range is 192.168.0.0/24, example settings are as follows:

  • IP address:192.168.0.1(e.g., to allow only a single IP).

  • CIDR address:24.

  • Description: enter "Company internal network."

  • Allow type: check API and System.

IP configuration suggestions and precautions

If you cannot determine your company's environment IP addresses or are not familiar with the related settings,please contact your company's network administrator or relevant personnel for assistance.or at least add the IP address you are currently using to the allowlist. Ensure you can still access the system during the configuration process to avoid the risk of interruption.

Last updated