On-Property IP Whitelist
Restrict self-service check-in to specific IP addresses. Useful for limiting check-in to on-property kiosks only.
Control which networks can complete on-property check-in steps, including facial verification and self-service check-in. IP Whitelist lets you prevent guests from checking in remotely when you only want kiosk-based check-in.
Where to Find It
Settings → Check-In → IP WhitelistQuick Overview
| Setting | What It Controls | Use Case |
|---|---|---|
| Enable on-property IP whitelist | Turns enforcement on or off | Temporarily allow check-in from any network |
| IP Whitelist | Allowed IP addresses | Restrict check-in to specific locations |
| Current IP | Your current IP address | Quick reference for adding |
| CIDR Blocks | Entire network ranges | Whitelist multiple devices at once |
Guest & Staff Impact
- Guests: Guests on other networks can upload documents pre-arrival but cannot complete check-in until they connect to a whitelisted network or scan the hotel's QR code.
- Staff: You control which kiosks and staff networks can complete check-in, reducing unauthorized access.
How IP Whitelist Works
IP Whitelist has two layers:
- Master toggle: Enables or disables enforcement for the property.
- Entry toggles: Turn specific IPs on or off without removing them.
When the master toggle is enabled:
- ✅ Allowed: Check-in from whitelisted IPs
- ❌ Blocked: Check-in attempts from other IPs
Guests from non-whitelisted IPs will see an error and cannot complete self-service check-in.
Allowed Formats
Only IPv4 addresses and CIDR ranges are supported. IPv4-mapped IPv6 values are accepted and normalized.
| Format | Example | Description |
|---|---|---|
| IPv4 Address | 192.168.1.5 | A specific device |
| CIDR Block | 10.0.0.0/24 | An entire subnet (256 addresses) |
| CIDR /16 Block | 192.168.0.0/16 | Large subnet (65,536 addresses) |
| IPv4-mapped IPv6 | ::ffff:192.168.1.5 | Normalized to IPv4 |
Currently only IPv4 addresses are supported. IPv6 support coming soon.
Use Cases
Kiosk-Only Check-In
Scenario: You have dedicated kiosks in your lobby and don't want guests checking in from their rooms or homes.
Setup:
- Find your kiosk's IP address (use Current IP feature)
- Add kiosk IP to whitelist
- Enable whitelist
✓ Now only guests at the kiosk can check in
Multiple Locations
Scenario: You have kiosks in lobby, parking area, and business center.
Setup:
- Get IP address from each location
- Add all IPs to whitelist (or use CIDR block if they're on the same network)
- Test from each location
Staff-Only Check-In Terminals
Scenario: Only front desk terminals should be able to check in guests.
Setup:
- Get IP addresses of front desk computers
- Add to whitelist
- Train staff to use designated terminals
Hotel Wi-Fi Network
Scenario: Allow check-in from anywhere on your hotel's Wi-Fi network.
Setup:
- Get Wi-Fi network's IP range (e.g.,
192.168.1.0/24) - Add CIDR block to whitelist
- Guests on hotel Wi-Fi can check in from their rooms
Setting Up IP Whitelist
Step 1: Find Your IP Address
-
Look for Current IP display
-
Note the IP address shown
✓ This is the IP address you're accessing AVA from right now
The "Current IP" feature shows your current IP address, making it easy to add the address you're currently using.
Step 2: Turn On the Whitelist
-
Find Enable on-property IP whitelist.
-
Toggle it On.
✓ The IP list and entry fields appear.
Step 3: Add IP Addresses or CIDR Blocks
Option A: Add individual IPs
- Enter the IP address in the IP Whitelist field
- (Optional) Add an owner label (e.g., "Lobby Kiosk 1")
- Click Add IP
Option B: Add CIDR blocks
- Enter the CIDR range (e.g.,
192.168.1.0/24) - (Optional) Add an owner label (e.g., "Front Desk VLAN")
- Click Add IP
Option C: Add your current IP
- Click Add my current IP button
- System automatically detects and adds your IP
- Add a label for reference
Step 4: Enable/Disable Entries
- Toggle Active to turn enforcement on or off for each entry
- Disabled entries remain in the list but don't restrict access
- Useful for temporary changes without removing entries
Step 5: Save Changes
- Review all whitelist entries
- Click Save whitelist to apply updates
- Test from both allowed and blocked locations
Step 6: Test the Whitelist
From whitelisted location:
- Open check-in landing page
- Attempt to start check-in
- ✓ Should work normally
From non-whitelisted location:
- Use a different device/network
- Try to access check-in
- ✓ Should be blocked with error message
Managing the Whitelist
Adding Entries
Multiple IP addresses (comma-separated):
192.168.1.10, 192.168.1.11, 192.168.1.12
Individual IPs with labels:
- IP:
192.168.1.100→ Label: "Reception Desk 1" - IP:
192.168.1.101→ Label: "Lobby Kiosk" - IP:
192.168.1.102→ Label: "Parking Kiosk"
CIDR blocks for networks:
192.168.1.0/24→ Label: "Front Desk VLAN"10.0.0.0/16→ Label: "Hotel Wi-Fi Network"
Removing Entries
-
Find the entry to remove
-
Click Remove button
-
Click Save whitelist
✓ Access is immediately revoked
Temporary Disable
Instead of removing, disable entries temporarily:
- Toggle Active to OFF
- Click Save whitelist
- Entry remains but doesn't restrict access
Finding IP Addresses
For Kiosk Devices
- On the kiosk device, open any web browser
- Search for "what is my ip"
- Note the public IP address shown
- Add to whitelist
For Office Computers
Windows:
- Open Command Prompt
- Type
ipconfig - Look for "IPv4 Address"
Mac:
- Open System Preferences
- Go to Network
- Note IP address shown
For Network Ranges (CIDR)
Contact your IT administrator to get:
- Network range (e.g.,
192.168.1.0/24) - Subnet information
- Static IP assignments
Common Configurations
| Scenario | IPs to Whitelist | Example |
|---|---|---|
| Single lobby kiosk | 1 IP | 192.168.1.100 |
| Multiple kiosks (same network) | 1 CIDR block | 192.168.1.0/24 |
| Kiosks + Front desk | Multiple IPs or CIDR | 192.168.1.0/24, 10.0.5.0/24 |
| Hotel Wi-Fi network | CIDR block | 192.168.0.0/16 |
| Remote pre-check-in allowed | Leave empty | No whitelist (open access) |
Disabling IP Whitelist
To allow check-in from any IP address:
- Toggle Enable on-property IP whitelist Off
- Click Save whitelist
✓ Self-service check-in now works from anywhere
Turning the master toggle off keeps your IP list. Turn it back on when you are ready.
If you want guests to pre-check-in from home, leave the IP whitelist empty or disabled.
Best Practices
When to Use IP Whitelist
✅ Use when:
- You have fixed kiosk locations
- You want to prevent remote check-in
- Compliance requires on-premise check-in
- You have static IP addresses or defined networks
❌ Don't use when:
- Guests should pre-check-in remotely
- Your IPs change frequently
- You use mobile hotspots for kiosks
- You want maximum flexibility
Security Best Practices
- Use static IPs for kiosks and front desk devices
- Whitelist hotel Wi-Fi and kiosk networks before enabling enforcement
- Review quarterly to remove decommissioned devices and old subnets
- Use CIDR blocks for easier management of multiple devices
- Label all entries so you know what each IP/range represents
- Test thoroughly before enabling in production
Network Architecture
Recommended setup:
- Dedicated VLAN for kiosks
- Static IPs for all check-in terminals
- Separate network for guest Wi-Fi (if allowing room-based check-in)
- Firewall rules complementing IP whitelist
Troubleshooting
Whitelist blocking legitimate users
What you see: Guests at kiosk cannot check in
Fix:
- Check the Current IP from the kiosk
- Verify this IP is in your whitelist
- Ensure no typos in IP address
- Check that entry is toggled Active
- Click Save whitelist again
IP list is missing
What you see: You only see the toggle and no IP list.
Fix:
- Turn on Enable on-property IP whitelist
- Wait for the list to appear
- Add IPs and click Save whitelist
IP address keeps changing
What you see: Kiosk IP changes daily/weekly
Why it happens:
- Dynamic IP assignment (DHCP)
- ISP rotates your public IP
Fix:
- Contact your IT department
- Request a static IP for kiosk devices
- Update whitelist with static IP
- Or use CIDR block for the entire DHCP range
Cannot add IP address
What you see: Save button grayed out or error appears
Check:
- IP format is valid (xxx.xxx.xxx.xxx)
- CIDR notation is correct (xxx.xxx.xxx.xxx/xx)
- No spaces before/after IP
- Using dots (.) not commas between octets
- IP is not 0.0.0.0 or 255.255.255.255
Current IP not showing
What you see: "Current IP" field is empty
Fix:
- Refresh the page
- Check browser console for errors
- Disable browser VPN/proxy
- Try different browser
CIDR block not working
What you see: Devices in the range still blocked
Check:
- CIDR notation is correct (e.g.,
/24not/255.255.255.0) - IP range includes the devices you're testing from
- Entry is toggled Active
- Changes were saved
Combining with Other Security
IP Whitelist works alongside:
- Device fingerprinting
- Session timeouts
- User authentication
- Facial verification (IP whitelist controls where verification can happen)
- Document authenticity checks
Still Stuck?
Contact success@vouch-technologies.com if:
- ❌ Cannot find your kiosk's IP address
- ❌ IP keeps changing despite requesting static IP
- ❌ Whitelist blocking users incorrectly
- ❌ Need help setting up CIDR blocks
- ❌ Network architecture questions
Helpful to include:
- List of IP addresses or CIDR blocks you're trying to whitelist
- Network setup (WiFi, ethernet, mobile)
- Screenshot of error guests see
- Network diagram (if available)