Skip to main content
IP rules define allow and deny lists for client IP addresses based on CIDR ranges.
IP rules are defined in the policy schema but are not executed by the sentinel engine yet.

Fields

allow
string[]
CIDR ranges to allow (for example, 10.0.0.0/8, 192.168.1.0/24). Use /32 for individual IPv4 addresses and /128 for individual IPv6 addresses.
deny
string[]
CIDR ranges to deny. Deny entries take precedence over allow entries.

Examples

{
  "policies": [
    {
      "id": "block-bad-ips",
      "name": "Block known bad IPs",
      "enabled": true,
      "match": [],
      "ip_rules": {
        "deny": ["198.51.100.0/24", "203.0.113.42/32"],
        "allow": []
      }
    }
  ]
}

Evaluation order

Deny rules are checked first. If the client IP matches any deny entry, the request is rejected regardless of allow entries. If deny rules do not match and allow rules are configured, the client IP must match at least one allow entry.