About IP Zones
An IP Zone enables admins to define network perimeters around a set of IPs. Admins can add both Gateway IPs and Proxy IPs to IP Zones.
IPs that can be added to an IP Zone as:
- Single IPs
- IP ranges
- Using CIDR notation
- Proxy IPs added as trusted proxies
Trusted proxies are used for determining the request’s client IP and are not blocked by Okta ThreatInsight. When adding untrusted proxies to an IP Zone, add them as gateways.
IP Zones evaluation
When determining whether a request is from inside or outside of an IP Zone, consider the IP chain. The IP chain is the IPs of all the network hops between the originating request and Okta. The following table explains IP chain processing for one or multiple IPs in an IP chain.
|IP Chain Type||Description|
|IP chain contains one IP||
The request is considered to be within a zone if the IP is contained within any of the defined gateways for that zone.
|IP chain contains more than one IP||
If the final IP in the chain, the one directly connecting to Okta, is within any of the defined gateways or proxies for the IP Zone.
IP chain processing repeats until:
- A matching Gateway IP is found, in which case the request is from within the Network Zone or
- Five IPs in the chain are checked, in which case the request is not from within the IP Zone.
IP Zone example
|IP Chain||Gateway||Proxy||Is the Request From Inside the Zone?|