NexQloud Knowledge Base
Discover tailored support solutions designed to help you succeed with NexQloud, no matter your question or challenge.

How do I set up IP restrictions for my account?
Network-Based Access Control and IP Whitelisting
Setting up IP restrictions provides an additional security layer for your NexQloud account by limiting access to trusted network locations, which is especially important for organizations managing sensitive enterprise cloud computing services and cloud engineering services across distributed teams. IP restrictions help prevent unauthorized access even if account credentials are compromised, providing critical protection for cloud native application development environments and multi-cloud management operations.
This security measure is particularly valuable for teams managing kubernetes management tools, edge computing solutions, and artificial intelligence at the edge deployments where network-level access control complements other security measures like multi-factor authentication and role-based permissions.
IP Restriction Configuration:
Setting Up IP Whitelists:
- Access Network Security Settings - Navigate to "Account Settings" → "Security" → "Network Access"
 - Configure IP Restrictions: 
- Individual IP Addresses: Add specific IP addresses for individual users or devices
 - IP Address Ranges: Configure CIDR blocks for office networks or VPN ranges
 - Geographic Restrictions: [Information Needed - geographic access control capabilities]
 - Time-Based Access: [Information Needed - time-based IP restriction options]
 
 - Restriction Types: 
- Account Access: Restrict login access to the NexQloud dashboard
 - API Access: Separate IP restrictions for programmatic API access
 - Resource Access: [Information Needed - resource-specific IP restrictions]
 - Administrative Functions: Enhanced restrictions for administrative operations
 
 
Advanced IP Management: 4. Dynamic IP Handling:
- VPN Integration: Configure access through corporate VPN services
 - Dynamic IP Ranges: [Information Needed - support for dynamic IP address ranges]
 - Mobile Access: Configure restrictions for mobile and remote access scenarios
 - Backup Access Methods: [Information Needed - emergency access procedures when IP restrictions conflict]
 
IP Restriction Configuration Example:
Enterprise IP Management: 5. Organizational IP Policies:
- Department-Level Restrictions: Configure different IP policies by department or team
 - Role-Based Network Access: Apply IP restrictions based on user roles and permissions
 - Conditional Access: Combine IP restrictions with device trust and MFA requirements
 - Audit and Compliance: [Information Needed - IP restriction audit logging and compliance reporting]
 
Management and Monitoring:
- Access Logging: Track all access attempts and IP restriction enforcement
 - Alert Configuration: Set up notifications for blocked access attempts or policy violations
 - Regular Review: Periodically review and update IP restriction policies as organizational needs change
 - Emergency Procedures: [Information Needed - emergency access procedures and approval workflows]
 
Best Practices:
- Gradual Implementation: Test IP restrictions with a small group before organization-wide deployment
 - Backup Access: Always maintain alternative access methods for emergency situations
 - Documentation: Keep detailed records of approved IP ranges and restriction policies
 
Regular Updates: Review and update IP restrictions as network infrastructure changes

.webp)





.webp)
.webp)
.webp)
.webp)

.webp)
.webp)






