IP Whitelisting — User Guide

Plivo's IP Whitelisting feature adds an extra layer of API access control by allowing requests only from specified IP addresses or CIDR ranges. This helps protect your account from unauthorized access.

Note: This is a request only feature. Please fill this form to request access to the feature.

 

🛠️ 1. Steps to Set Up IP Whitelisting

Step 1: Navigate to IP Whitelisting

OR

  • Go to Account Settings > IP Whitelisting from the left navigation pane.

Step 2: Add IPs

  • Click + Add CIDR Address.

  • In the modal popup, enter one or more IP addresses in CIDR format (comma-separated).
    • Example: 192.0.2.0/24, 1.1.1.1/32

  • Click Add to save the entries.

Step 3: Enable IP Whitelisting

  • Toggle the switch to Enable IP Whitelisting.
  • Confirm via the popup that enabling will restrict API access to listed IPs only.

Step 4: Confirm Entries

  • After enabling, the system will block any API request not coming from whitelisted IPs.
  • The list will show all currently active CIDRs with subnet masks.
  • You can edit or delete any entry at any time.

 

✅ 2. Instructions for IPs to Be Added (Avoiding Errors)

To ensure smooth configuration, please follow these validation rules:

Error Case How to Avoid
Invalid Format Always enter IPs in proper CIDR format. Ex: 192.168.1.0/24 or 2001:db8::/64
Duplicate Entry Do not re-enter an IP or CIDR already present in the list
Subset Already Exists Avoid adding an IP that is already covered by a broader CIDR
Superset Conflict You must remove more specific entries before adding a broader range
Private or Special Ranges Blocked Avoid using localhost (e.g., 127.0.0.1/32) or reserved/documentation IPs
Limit Reached (50 CIDRs) Remove an existing IP if you've already reached the limit of 50 entries

 

ℹ️ Key Pointers

  • ✅ The system matches the requesting IP address against the whitelist using CIDR matching.
  • ❌ Requests from non-whitelisted IPs will receive an HTTP 403 (Forbidden) response.
  • ✅ Only “Allow” rules are supported; no “deny” or custom logic at this time.
  • 🔄 Max 50 CIDRs allowed per account.
  • 👥 Subaccounts inherit the parent account’s whitelist rules — subaccount CIDRs cannot be independently managed.
  • 🔁 Validation checks occur both while adding new entries and editing existing ones to avoid overlaps, supersets, and duplicates.
  • 🛡️ IP Whitelisting can be toggled ON/OFF by the main account user using the feature flag toggle.

 

❓ 3. Frequently Asked Questions (FAQs)

Q: What happens if my IP is not whitelisted?

A: Your API requests will be rejected with an HTTP 403 Forbidden response.

Q: How many CIDRs can I add?

A: You can add up to 50 CIDR entries per account.

Q: Can I add a single IP without a CIDR mask?

A: No. You must use CIDR format. For single IPs, use /32 for IPv4 or /128 for IPv6 (e.g., 203.0.113.5/32).

Q: Can I whitelist IP ranges?

A: Yes, use CIDR notation (e.g., 203.0.113.0/24) to specify a range.

Q: Can subaccounts have different IP rules?

A: No. Subaccounts will follow the CIDR rules of their parent account.

Q: How can I troubleshoot blocked access?

A: Check that:

  • Your current IP matches one of the CIDRs.
  • IP Whitelisting is enabled.
  • There are no formatting or range-related issues with your entry.

Q: Will disabling the toggle remove the CIDRs?

A: No, it will just pause enforcement. The list is retained.

 

Would you like a downloadable PDF or HTML version of this document for user onboarding or support sharing?

Was this article helpful?
0 out of 3 found this helpful
Didn’t find what you are looking for? Create new ticket