﻿---
title: Manage IP filters in ECE
description: Filtering by IP address or CIDR block is one of the security layers available in Elastic Cloud Enterprise. It allows you to limit how your deployments...
url: https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/security/ip-filtering-ece
products:
  - Elastic Cloud Enterprise
applies_to:
  - Elastic Cloud Enterprise: Generally available
---

# Manage IP filters in ECE
Filtering by IP address or CIDR block is one of the security layers available in Elastic Cloud Enterprise. It allows you to limit how your deployments can be accessed.
You can only configure ingress or inbound IP filters. These restrict access to your deployments from a set of IP addresses or CIDR blocks.
Follow the steps described here to set up ingress or inbound IP filters through the Cloud UI.
To learn how IP filtering rules work together, refer to [IP filtering rules in Elastic Cloud Enterprise](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/security/ece-filter-rules).
To learn how to manage IP filters using the Traffic Filtering API, refer to [Manage network security through the API](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/security/network-security-api).
<note>
  To learn how to create IP filters for Elastic Cloud Hosted deployments or Elastic Cloud Serverless projects, refer to [Manage IP filters in ECH or Serverless](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/security/ip-filtering-cloud).To learn how to create IP filters for self-managed clusters or Elastic Cloud on Kubernetes deployments, refer to [Manage IP filtering in ECK and self-managed clusters](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/security/ip-filtering-basic).
</note>


## Prerequisites

Make sure your [load balancer](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/deploy/cloud-enterprise/ece-load-balancers) preserves the real client IP address so the ECE proxy can enforce IP filtering rules. The mechanism depends on your load balancer mode:
- For HTTP (L7) mode: Configure the load balancer to set the `X-Forwarded-For` header with the client source IP and strip any inbound `X-Forwarded-For` headers to prevent spoofing.
- For TCP (L4) mode: Enable Proxy Protocol v2 on the load balancer.

For Elasticsearch transport traffic (ports 9300/9343), enable Proxy Protocol v2 regardless of the mode.
For more details, refer to [Client IP preservation](/elastic/docs-builder/docs/3028/deploy-manage/deploy/cloud-enterprise/ece-load-balancers#ece-client-ip-preservation).

## Apply an IP filter to a deployment

To apply an IP filter to a deployment, you must first create a rule set at the platform level, and then apply the rule set to your deployment.

### Step 1: Create an IP filtering rule set

You can combine any rules into a set, so we recommend that you group rules according to what they allow, and make sure to label them accordingly. Since multiple sets can be applied to a deployment, you can be as granular in your sets as you feel is necessary.
To create a rule set:
1. [Log into the Cloud UI](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/deploy/cloud-enterprise/log-into-cloud-ui).
2. From the **Platform** menu, select **Security**.
3. Select **Create filter**.
4. Select **IP filtering rule set**.
5. Create your rule set, providing a meaningful name and description.
6. Select if this rule set should be automatically attached to new deployments.
7. Add one or more rules using IPv4, or a range of addresses with CIDR.
   <note>
   DNS names are not supported in rules.
   </note>


### Step 2: Associate an IP filtering rule set with your deployment

After you’ve created the rule set, you’ll need to associate it with your deployment:
1. Open the deployment management page in the Cloud UI.
2. Select the **Security** tab on the left-hand side menu bar.
3. Under **Traffic filters**, select **Apply filter**.
4. Choose the filter you want to apply and select **Apply filter**.

At this point, the IP filtering rule set is active. You can remove or edit it at any time.

## Remove an IP filtering rule set association from your deployment

If you want to remove any traffic restrictions from a deployment or delete a rule set, you’ll need to remove any rule set associations first. To remove an association through the UI:
1. Open the deployment management page in the Cloud UI.
2. Select the **Security** tab on the left-hand side menu bar.
3. Under **Traffic filters**, choose the filter you want to detach and select the **X** icon in the **Actions** column.
4. In the confirmation dialog, select **Remove filter**.


## Edit an IP filtering rule set

You can edit a rule set name or change the allowed traffic sources using IPv4, or a range of addresses with CIDR.
1. [Log into the Cloud UI](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/deploy/cloud-enterprise/log-into-cloud-ui).
2. From the **Platform** menu, select **Security**.
3. Find the rule set you want to edit.
4. Select the **Edit** `pencil` button.


## Delete an IP filtering rule set

If you need to remove a rule set, you must first remove any associations with deployments.
To delete a rule set with all its rules:
1. [Remove any deployment associations](#remove-filter-deployment).
2. [Log into the Cloud UI](https://www.elastic.co/elastic/docs-builder/docs/3028/deploy-manage/deploy/cloud-enterprise/log-into-cloud-ui).
3. From the **Platform** menu, select **Security**.
4. Find the rule set you want to edit.
5. Select the **Delete** `trash` button. The button is inactive if there are deployments assigned to the rule set.