IP Restrictions

PAM360 allows privileged administrators to enforce IP-based restrictions to limit inbound connections to the PAM360 server, thereby minimizing unwanted traffic and enhancing security. This feature lets administrators specify which systems are permitted or blocked from accessing and sending requests to the PAM360 server. IP restrictions can be applied to individual IP addresses or a range of IP addresses. PAM360 offers three types of IP restrictions:

  1. Web Access
  2. API Access
  3. Agent Access

Additional Details

  • The IP addresses must be entered in the text field as comma-separated values. (E.g., 10.0.2.1 - 10.0.2.15, 10.0.3.176, 10.0.3.222)
  • There is no limit to the number of IP addresses that can be defined in the Allowed and Blocked IP Address(es) fields.

1. Web Access

PAM360 allows you to enforce IP-based restrictions specifically for accessing the PAM360 web server. These restrictions can be applied to individual IP addresses or ranges, providing flexibility in managing who can connect to the web interface. Follow the steps detailed below to configure IP restrictions for web access:

  1. Navigate to Admin > > Server Hardening >> IP Restrictions.
  2. Under the Web Access section, you will find two options:
    1. Allowed IP Address(es): When this option is selected, only the devices with the specified IP addresses can access the PAM360 web server. All the other devices will be denied access to the web server.
    2. Blocked IP Address(es): This option enables you to block devices with specific IP addresses from accessing the PAM360 web server. When this option is enabled, only the devices with the IP addresses specified in this field cannot access the web server, allowing access to all the other devices.
      IP Restrictions

2. API Access

PAM360 provides the ability to enforce IP-based restrictions on API calls, as well as on communications from native mobile apps and browser extensions, ensuring that only authorized IP addresses can interact with the PAM360 server through these channels. This adds a crucial layer of security, preventing unauthorized access and API misuse. The IP restrictions can be set at various levels and combinations, such as defined IP ranges or individual IP addresses. Follow the steps detailed below to configure IP restrictions for API access:

  1. Navigate to Admin > > Server Hardening >> IP Restrictions.
  2. Under the API Access section, you will find two options:
    1. Allowed IP Address(es): Selecting this option will permit only the devices with the specified IP addresses to send/receive API calls to/from the PAM360 server, effectively blocking API access to all the other IP addresses.
    2. Blocked IP Address(es): This option allows you to block devices with specific IP addresses while allowing API access from/to all other IP addresses.

3. Agent Access

PAM360 offers the ability to regulate agent-based communication between target machines and the PAM360 server using IP-based restrictions. This adds a crucial layer of security, preventing unauthorized access and agent misuse. The IP restrictions can be set at various levels and combinations, such as defined IP ranges or individual IP addresses. Follow the steps detailed below to configure IP restrictions for agent access:

  1. Navigate to Admin > > Server Hardening >> IP Restrictions.
  2. Under the Agent Access section, you will find two options:
    1. Allowed IP Address(es): This option enables only the devices with the specified IP addresses to establish agent-based communication to the PAM360 server.
    2. Blocked IP Address(es): This option allows you to block devices with specific IP addresses from establishing agent-based communication with the PAM360 server while allowing access to all other IP addresses.



Top