Skip to main content

On-Property IP Whitelist

Quick Setup

Restrict self-service check-in to specific IP addresses. Useful for limiting check-in to on-property kiosks only.

Control which networks can complete on-property check-in steps, including facial verification and self-service check-in. IP Whitelist lets you prevent guests from checking in remotely when you only want kiosk-based check-in.

Where to Find It

Settings → Check-In → IP Whitelist

Quick Overview

SettingWhat It ControlsUse Case
Enable on-property IP whitelistTurns enforcement on or offTemporarily allow check-in from any network
IP WhitelistAllowed IP addressesRestrict check-in to specific locations
Current IPYour current IP addressQuick reference for adding
CIDR BlocksEntire network rangesWhitelist multiple devices at once

Guest & Staff Impact

  • Guests: Guests on other networks can upload documents pre-arrival but cannot complete check-in until they connect to a whitelisted network or scan the hotel's QR code.
  • Staff: You control which kiosks and staff networks can complete check-in, reducing unauthorized access.

How IP Whitelist Works

IP Whitelist has two layers:

  • Master toggle: Enables or disables enforcement for the property.
  • Entry toggles: Turn specific IPs on or off without removing them.

When the master toggle is enabled:

  • Allowed: Check-in from whitelisted IPs
  • Blocked: Check-in attempts from other IPs
Blocking Behavior

Guests from non-whitelisted IPs will see an error and cannot complete self-service check-in.

Allowed Formats

Only IPv4 addresses and CIDR ranges are supported. IPv4-mapped IPv6 values are accepted and normalized.

FormatExampleDescription
IPv4 Address192.168.1.5A specific device
CIDR Block10.0.0.0/24An entire subnet (256 addresses)
CIDR /16 Block192.168.0.0/16Large subnet (65,536 addresses)
IPv4-mapped IPv6::ffff:192.168.1.5Normalized to IPv4
IPv4 Only

Currently only IPv4 addresses are supported. IPv6 support coming soon.

Use Cases

Kiosk-Only Check-In

Scenario: You have dedicated kiosks in your lobby and don't want guests checking in from their rooms or homes.

Setup:

  1. Find your kiosk's IP address (use Current IP feature)
  2. Add kiosk IP to whitelist
  3. Enable whitelist

✓ Now only guests at the kiosk can check in

Multiple Locations

Scenario: You have kiosks in lobby, parking area, and business center.

Setup:

  1. Get IP address from each location
  2. Add all IPs to whitelist (or use CIDR block if they're on the same network)
  3. Test from each location

Staff-Only Check-In Terminals

Scenario: Only front desk terminals should be able to check in guests.

Setup:

  1. Get IP addresses of front desk computers
  2. Add to whitelist
  3. Train staff to use designated terminals

Hotel Wi-Fi Network

Scenario: Allow check-in from anywhere on your hotel's Wi-Fi network.

Setup:

  1. Get Wi-Fi network's IP range (e.g., 192.168.1.0/24)
  2. Add CIDR block to whitelist
  3. Guests on hotel Wi-Fi can check in from their rooms

Setting Up IP Whitelist

Step 1: Find Your IP Address

  1. Go to Settings → Check-In → IP Whitelist

  2. Look for Current IP display

  3. Note the IP address shown

    ✓ This is the IP address you're accessing AVA from right now

Current IP Feature

The "Current IP" feature shows your current IP address, making it easy to add the address you're currently using.

Step 2: Turn On the Whitelist

  1. Find Enable on-property IP whitelist.

  2. Toggle it On.

    ✓ The IP list and entry fields appear.

Step 3: Add IP Addresses or CIDR Blocks

Option A: Add individual IPs

  1. Enter the IP address in the IP Whitelist field
  2. (Optional) Add an owner label (e.g., "Lobby Kiosk 1")
  3. Click Add IP

Option B: Add CIDR blocks

  1. Enter the CIDR range (e.g., 192.168.1.0/24)
  2. (Optional) Add an owner label (e.g., "Front Desk VLAN")
  3. Click Add IP

Option C: Add your current IP

  1. Click Add my current IP button
  2. System automatically detects and adds your IP
  3. Add a label for reference

Step 4: Enable/Disable Entries

  • Toggle Active to turn enforcement on or off for each entry
  • Disabled entries remain in the list but don't restrict access
  • Useful for temporary changes without removing entries

Step 5: Save Changes

  1. Review all whitelist entries
  2. Click Save whitelist to apply updates
  3. Test from both allowed and blocked locations

Step 6: Test the Whitelist

From whitelisted location:

  1. Open check-in landing page
  2. Attempt to start check-in
  3. ✓ Should work normally

From non-whitelisted location:

  1. Use a different device/network
  2. Try to access check-in
  3. ✓ Should be blocked with error message

Managing the Whitelist

Adding Entries

Multiple IP addresses (comma-separated):

192.168.1.10, 192.168.1.11, 192.168.1.12

Individual IPs with labels:

  • IP: 192.168.1.100 → Label: "Reception Desk 1"
  • IP: 192.168.1.101 → Label: "Lobby Kiosk"
  • IP: 192.168.1.102 → Label: "Parking Kiosk"

CIDR blocks for networks:

  • 192.168.1.0/24 → Label: "Front Desk VLAN"
  • 10.0.0.0/16 → Label: "Hotel Wi-Fi Network"

Removing Entries

  1. Find the entry to remove

  2. Click Remove button

  3. Click Save whitelist

    ✓ Access is immediately revoked

Temporary Disable

Instead of removing, disable entries temporarily:

  1. Toggle Active to OFF
  2. Click Save whitelist
  3. Entry remains but doesn't restrict access

Finding IP Addresses

For Kiosk Devices

  1. On the kiosk device, open any web browser
  2. Search for "what is my ip"
  3. Note the public IP address shown
  4. Add to whitelist

For Office Computers

Windows:

  1. Open Command Prompt
  2. Type ipconfig
  3. Look for "IPv4 Address"

Mac:

  1. Open System Preferences
  2. Go to Network
  3. Note IP address shown

For Network Ranges (CIDR)

Contact your IT administrator to get:

  • Network range (e.g., 192.168.1.0/24)
  • Subnet information
  • Static IP assignments

Common Configurations

ScenarioIPs to WhitelistExample
Single lobby kiosk1 IP192.168.1.100
Multiple kiosks (same network)1 CIDR block192.168.1.0/24
Kiosks + Front deskMultiple IPs or CIDR192.168.1.0/24, 10.0.5.0/24
Hotel Wi-Fi networkCIDR block192.168.0.0/16
Remote pre-check-in allowedLeave emptyNo whitelist (open access)

Disabling IP Whitelist

To allow check-in from any IP address:

  1. Toggle Enable on-property IP whitelist Off
  2. Click Save whitelist

✓ Self-service check-in now works from anywhere

Keep entries for later

Turning the master toggle off keeps your IP list. Turn it back on when you are ready.

Remote Check-In

If you want guests to pre-check-in from home, leave the IP whitelist empty or disabled.

Best Practices

When to Use IP Whitelist

Use when:

  • You have fixed kiosk locations
  • You want to prevent remote check-in
  • Compliance requires on-premise check-in
  • You have static IP addresses or defined networks

Don't use when:

  • Guests should pre-check-in remotely
  • Your IPs change frequently
  • You use mobile hotspots for kiosks
  • You want maximum flexibility

Security Best Practices

  • Use static IPs for kiosks and front desk devices
  • Whitelist hotel Wi-Fi and kiosk networks before enabling enforcement
  • Review quarterly to remove decommissioned devices and old subnets
  • Use CIDR blocks for easier management of multiple devices
  • Label all entries so you know what each IP/range represents
  • Test thoroughly before enabling in production

Network Architecture

Recommended setup:

  1. Dedicated VLAN for kiosks
  2. Static IPs for all check-in terminals
  3. Separate network for guest Wi-Fi (if allowing room-based check-in)
  4. Firewall rules complementing IP whitelist

Troubleshooting

Whitelist blocking legitimate users

What you see: Guests at kiosk cannot check in

Fix:

  1. Check the Current IP from the kiosk
  2. Verify this IP is in your whitelist
  3. Ensure no typos in IP address
  4. Check that entry is toggled Active
  5. Click Save whitelist again

IP list is missing

What you see: You only see the toggle and no IP list.

Fix:

  1. Turn on Enable on-property IP whitelist
  2. Wait for the list to appear
  3. Add IPs and click Save whitelist

IP address keeps changing

What you see: Kiosk IP changes daily/weekly

Why it happens:

  • Dynamic IP assignment (DHCP)
  • ISP rotates your public IP

Fix:

  1. Contact your IT department
  2. Request a static IP for kiosk devices
  3. Update whitelist with static IP
  4. Or use CIDR block for the entire DHCP range

Cannot add IP address

What you see: Save button grayed out or error appears

Check:

  • IP format is valid (xxx.xxx.xxx.xxx)
  • CIDR notation is correct (xxx.xxx.xxx.xxx/xx)
  • No spaces before/after IP
  • Using dots (.) not commas between octets
  • IP is not 0.0.0.0 or 255.255.255.255

Current IP not showing

What you see: "Current IP" field is empty

Fix:

  1. Refresh the page
  2. Check browser console for errors
  3. Disable browser VPN/proxy
  4. Try different browser

CIDR block not working

What you see: Devices in the range still blocked

Check:

  • CIDR notation is correct (e.g., /24 not /255.255.255.0)
  • IP range includes the devices you're testing from
  • Entry is toggled Active
  • Changes were saved

Combining with Other Security

IP Whitelist works alongside:

  • Device fingerprinting
  • Session timeouts
  • User authentication
  • Facial verification (IP whitelist controls where verification can happen)
  • Document authenticity checks

Still Stuck?

Contact success@vouch-technologies.com if:

  • ❌ Cannot find your kiosk's IP address
  • ❌ IP keeps changing despite requesting static IP
  • ❌ Whitelist blocking users incorrectly
  • ❌ Need help setting up CIDR blocks
  • ❌ Network architecture questions

Helpful to include:

  • List of IP addresses or CIDR blocks you're trying to whitelist
  • Network setup (WiFi, ethernet, mobile)
  • Screenshot of error guests see
  • Network diagram (if available)