Adding IP ranges
Organization admins maintain the allowlist under Settings → IP whitelisting.Inventory egress
Collect office NAT public IPs, VPN concentrator pools, and cloud NAT ranges used by automation that calls Planasonix. Include IPv6 if your workforce uses it.
Enter CIDR blocks
Add each range in CIDR notation (for example
203.0.113.0/24 or 2001:db8::/32). Single hosts use /32 (IPv4) or /128 (IPv6).Label and document
Give each entry a name and ticket reference so future admins know why it exists and when to remove it.
CIDR notation
CIDR expresses an address prefix: the number after/ is the routing mask size.
| Example | Meaning |
|---|---|
198.51.100.17/32 | Exactly one IPv4 address |
198.51.100.0/24 | 256 addresses from 198.51.100.0 to 198.51.100.255 |
2001:db8:1::/48 | An IPv6 site prefix (size depends on your RIR allocation) |
IP recovery flow for lockouts
If nobody can log in:- Use a registered break-glass path – Many enterprises keep an out-of-band admin VPN or corporate device on an allowlisted carrier IP. Connect through that path and fix the list.
- Contact Planasonix support – Verify your identity per your support contract. Support can apply a temporary bypass or scheduled maintenance window that disables enforcement long enough for you to correct CIDRs.
- Emergency contact – Ensure two people hold credentials for the recovery VPN and that HR offboarding updates the break-glass runbook.
Best practices
Pair with SSO session policy
Pair with SSO session policy
IP allowlists complement SSO and session policy; they are not a substitute for MFA or device compliance.
Separate UI and API lists
Separate UI and API lists
If your plan supports split policies, put CI/CD automation on its own CIDR set so rotating office IPs does not break nightly jobs.
Plan for SaaS egress
Plan for SaaS egress
Some third-party tools call Planasonix on your behalf. Either proxy those calls through your allowlisted egress or add minimal vendor egress ranges and review them quarterly.
Audit quarterly
Audit quarterly
Remove stale entries tied to closed offices or decommissioned NAT gateways. Overgrown lists defeat the purpose of the control.
Pipeline agents and SSH bastions may need distinct allowlisting on the destination side. This page covers access to Planasonix; database firewalls are configured in each connection or cloud console.
Related topics
Session policy
Idle timeout and concurrent session rules.
Authentication troubleshooting
Resolve login failures after policy changes.