Back to blog
Security3 min read|

January 26, 2026

Using IP Allowlists to Secure Your SFTP Server

Learn how IP allowlists add an extra layer of security to your SFTP server by restricting access to trusted networks and partners.

Using IP Allowlists to Secure Your SFTP Server

When securing an SFTP server, encryption and strong authentication are just the starting point. One of the most effective ways to reduce your attack surface is to restrict which IP addresses are allowed to connect in the first place. This is where IP allowlists come in.

What Are IP Allowlists?

An IP allowlist (sometimes called a whitelist) is a list of approved IP addresses or ranges that are permitted to connect to your server. Any connection attempt from an IP not on the list is rejected before authentication even begins. This means that even if an attacker has valid credentials, they cannot reach your SFTP server from an unauthorized network.

How IP Allowlists Work for SFTP

SFTP runs over SSH, typically on port 22. When a client initiates a connection, the server checks the source IP against the allowlist. If the IP matches an approved entry, the connection proceeds to authentication. If not, the connection is dropped immediately.

This check happens at the network layer, before any SSH handshake or credential exchange occurs. That makes it a powerful first line of defense.

Understanding CIDR Notation

IP allowlists often use CIDR notation to specify ranges. CIDR (Classless Inter-Domain Routing) lets you define a block of addresses with a single entry. For example:

  • 203.0.113.10/32 allows a single IP address
  • 203.0.113.0/24 allows all 256 addresses from 203.0.113.0 to 203.0.113.255
  • 10.0.0.0/16 allows 65,536 addresses in the 10.0.x.x range

The number after the slash indicates how many bits of the address are fixed. A smaller number means a larger range.

When to Use IP Allowlists

IP allowlists are especially useful in these scenarios:

  • Partner restrictions: When exchanging files with specific business partners, you can limit access to their known IP ranges. This ensures only their systems can connect.
  • Regulatory requirements: Compliance frameworks like PCI DSS, HIPAA, and SOC 2 often recommend or require network-level access controls. IP allowlists help satisfy these requirements.
  • Internal access control: Restricting SFTP access to your corporate network or VPN addresses prevents connections from unknown locations.
  • Reducing brute-force attacks: By blocking all unauthorized IPs, you eliminate the vast majority of automated attack traffic.

Managing Allowlists at Scale

As your organization grows and you onboard more partners, managing IP allowlists can become complex. Here are some best practices:

  • Document every entry with the partner name, contact, and reason for the allowlist rule.
  • Review allowlists regularly to remove stale entries from former partners or decommissioned networks.
  • Use per-user or per-group allowlists so that each partner's access is scoped independently.
  • Automate updates where possible, using APIs or infrastructure-as-code tools to manage rules consistently.

Combining with Other Security Measures

IP allowlists work best as part of a layered security approach. Combine them with:

  • SSH key authentication to eliminate password-based attacks entirely
  • Audit logging to track all connection attempts, both successful and blocked
  • Encryption at rest to protect files stored on the server
  • Rate limiting to slow down any remaining unauthorized attempts

No single measure is sufficient on its own, but together they create a strong security posture.

How FilePulse Supports IP Allowlists

FilePulse makes it straightforward to configure IP allowlists for your managed SFTP server. You can define allowlists per user or per organization, using individual IPs or CIDR ranges. Changes take effect immediately, and all blocked connection attempts are recorded in the audit log for review.

With FilePulse, you get network-level access control without the hassle of managing firewall rules or server configurations yourself.

Ready to secure your file transfers with IP allowlists? Sign up for FilePulse or contact our team to learn more.