Set Up Trusted IP Range

See previous W5 version guide

PURPOSE

This document contains the detailed procedure for how you can restrict login through IP ranges for your organization.

WHY IS THIS IMPORTANT?

To help protect your organization’s data from unauthorized access, you can specify a list of IP addresses from which users can log in. Users outside of the Trusted IP Range are restricted from accessing the system entirely.

PROCEDURE

1. From the menu, click Set Up > Systems > Security > Trusted IPs.

2. Click on Action and select New.

3. Enter a valid IP address in the Start IP Address and End IP Address fields.

The start and end addresses define the range of allowable IP addresses from which users can log in, including the start and end values. If you want to allow logins from a single IP address, enter the same address in both fields.

The start and end IP addresses must be in an IPv4 range.

4. Enter a description for the range. This is optional.

5. Click Save.

6. If you want to edit the existing IP range, click on the Edit hyperlink.

7. To delete existing IP range, select the IP range to delete by ticking on the checkbox and click on Action and select Delete.

FREQUENTLY ASKED QUESTIONS

 

RELATED INFORMATION

 

CHANGE HISTORY

blank

Categories:

0 Comments

Leave a Reply

blank

Your email address will not be published. Required fields are marked *



    Close Bitnami banner
    Bitnami