IP whitelisting (IP allowlisting) is a network security technique that allows access to business systems only to whitelisted (allowlisted) IP addresses. Doing this reduces the risk of online threats and shrinks the company’s attack surface.Create Free AccountSee Demo
No card needed. Full onboarding support.
Block network-borne attacks like DDoS, IP and port sniffing, man-in-the middle, and other.
Define your trusted users, assign them a unique IP address, and provide access only to them.
Leverage your existing infrastructure and provide secure access via the internet.
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
secure remote access
Allow end-users to connect from home, cafés, hotels, or airports via a secure tunnel to a VPN gateway with a whitelisted static IP address. Use user-friendly client apps for user authentication.
prevent future breaches
Prevent unauthorized access to your internet-facing services that only trusted IP addresses can connect to. Use the static IP address of your gateway and define a policy that remains valid indefinitely.
Protect your connections to cloud services and resources by allowlisting your static IP address in the cloud’s security settings.
Ensure your IoT devices (cameras, sensors, building controllers, etc.) that communicate via the internet can only be reached by trusted entities.
Pre-authenticate users on your VPN gateway and centralize the management of user access rights, MFA, and SSO for all your systems.
No card required.
Full onboarding support.
We were looking for fast, secure, and quality audio transmission. We are excited that GoodAccess allows our agents to make phone calls with our clients via VOIP provider using the office IP from their home. GoodAccess is inexpensive, easy-to-use, safe, and the support team is brilliant!
GoodAccess has strong encryption which shows to our customers that we take great care in protecting their data. The app is straightforward to use so we can access our systems from 14 different time zones and work efficiently. Simply a VPN with static IP for a great price.
It's important for us that GoodAccess' VPN with static IP is fast & has low latency, which feels like working from the office. I love the user friendly control panel, which just makes the work much easier!
GoodAccess increases the level of security in our organization. We use it to access several cloud services and our data warehouse. We appreciate the customer-oriented support team, frequent product updates, and the excellent price/value ratio.
Test all premium features for 14 days without limitation. No credit card required.
Decide which devices to include and build your secure environment in 10 minutes.
Whitelist your IP address in cloud systems, provide quick remote access, or publish your online services.
No card needed. Full onboarding support.
Get a permanent and unique identifier of your business on the public internet.
Conserve bandwidth by routing only critical connections through an encrypted tunnel.
Connect from anywhere in the world via a secure and private tunnel.
IP Whitelisting guide
IP whitelisting requires a static IP address. A whitelisted IP address means that a system inside the LAN, datacenter, or third-party cloud application is configured for access only by users who have their organization’s IP address, regardless of where they are connecting from. Communication from all other addresses will be rejected.
GoodAccess offers a static IP address for its business VPN gateway, which you can use for IP whitelisting in your other systems. Using the gateway’s IP address for IP whitelisting instead of the addresses of routers, LANs, or individual user devices offers significant benefits:
1. GoodAccess pre-authenticates all users with MFA and SSO before they connect, thus ensuring they are eligible.
2. The GoodAccess gateway serves as an access control point. You can centralize all access privileges in one web-based configuration panel.
3. You can manage your IP whitelists centrally and extend IP whitelisting to services and applications that do not support it natively.
IP whitelisting gives you direct control over who can access your internal systems. This is important when your company has a lot of remote employees who are connecting through their own devices and from third-party networks.
IP whitelisting, paired with user and device authentication gives you the control and visibility you need to secure a distributed workforce.
IP whitelisting should not be treated as the sole security measure for your company. While it works well against DDoS or IP sniffing, it is still vulnerable to IP spoofing and intrusion via compromised endpoints. You should think of it as a way of reducing risk and speeding up access for end-users, rather than an impervious shield against all threats.
As a best practice, always use more security layers that are complementary to IP whitelisting, such as MFA and zero-trust access control.
Setting up IP whitelisting manually on a router or firewall can be labor-intensive. It also requires manual changes every time user roles or access rights change.
A larger downside is that if an endpoint is compromised (e.g. by a Trojan), or if the IP address is spoofed, the attacker could gain easy access to critical systems. For that reason it is crucial to supplement IP whitelisting by more granular access control mechanisms and MFA for user authentication.
A whitelist contains trusted addresses or domains. As such, it is used for access control purposes as a way of proving the legitimacy of access to internal systems.
A blacklist does the opposite – it lists harmful or disreputable domains or IP addresses, and is used by DNS/web filters for online threat protection rather than as an access control mechanism.