Features
| Pricing | Documentation | Contact | Blog
Specified the clients (IP addresses) allowed to make use of the listener. Packets from clients not specified here will be ignored.
To declare this entity in your AWS CloudFormation template, use the following syntax:
{ "Networks" : [ String, ... ], "Domains" : [ String, ... ] }
Networks: - String Domains: - String
Array of IPv4 or IPv6 CIDRs that identify allowed clients. IP addresses matching any CIDR in the array will be allowed.
Required: No
Type: List of String
Update requires: No interruption
Array of domain names that identify allowed clients using Client Policy Framework DNS records. Domains can be used when maintaining the list of allowed CIDRs is more easily done externally to Proxylity.
Required: No
Type: List of String
Update requires: No interruption
To allow traffic from any IP address, use the universal CIDR blocks:
{ "Networks": [ "0.0.0.0/0", "::/0" ] }
Networks: - "0.0.0.0/0" - "::/0"
To restrict access to a single specific IP address:
{ "Networks": [ "203.0.113.45/32" ] }
Networks: - "203.0.113.45/32"
To allow traffic from an entire /24 network (256 addresses):
{ "Networks": [ "198.51.100.0/24" ] }
Networks: - "198.51.100.0/24"
You can combine multiple CIDR blocks to allow traffic from different sources:
{ "Networks": [ "203.0.113.0/24", "198.51.100.0/24", "2001:db8::/32" ] }
Networks: - "203.0.113.0/24" - "198.51.100.0/24" - "2001:db8::/32"
For dynamic IP ranges managed externally via DNS:
{ "Domains": [ "allowed-clients.example.com" ] }
Domains: - "allowed-clients.example.com"