What it does
- Evaluates the incoming request IP at the pre-request stage
- Allows the request only if it matches one of the configured IPs or CIDR ranges
- Returns 403 Forbidden otherwise
- Can be toggled on/off via configuration
Configuration Parameters
| Parameter | Type | Description | Required | Default |
|---|---|---|---|---|
enabled | boolean | Enables or disables enforcement | No | false |
ips | array | Exact IP addresses to allow (e.g., "203.0.113.5") | Cond. | [] |
cidrs | array | Allowed CIDR ranges (e.g., "203.0.113.0/24") | Cond. | [] |
- When
enabledistrue, provide at least one ofipsorcidrs. - Each IP must be a valid IPv4/IPv6 address; each CIDR must be a valid IPv4/IPv6 block.
- Stage: PreRequest
- Uses the connection fingerprint to extract the client IP
- If the IP cannot be determined, the request is denied with 403
Example configuration
Add the plugin to a rule’s actions list with the desired settings:Best practices
- Keep IP allowlists as tight as possible and review them periodically
- Prefer CIDR ranges for corporate networks and exact IPs for fixed hosts
- Combine with rate limiting and bot detection for stronger perimeter security
- Log blocked attempts to monitor and investigate unauthorized access