Skip to main content

Network Signature

Maps client IP addresses or ranges to user-groups so access restriction rules and reporting apply by network segment. No user login required; policy is enforced by source IP or subnet. Use when user identity is unavailable (device-only access, legacy apps, shared kiosks).

Rule Evaluation Order

SafeSquid evaluates Network Signature rules (Allow List) top to bottom and applies the first matching rule. Place specific IP rules above broader ranges to ensure correct policy application. See Rule Order Matters below for details.

When to use Network Signature

Use Network Signature WhenUse User Authentication Instead
IoT devices, printers, shared kiosksUser workstations with logins
Legacy apps without proxy auth supportModern apps with credential prompts
Policy by location/VLAN/segmentPolicy by individual user
Device-level accountability acceptableUser-level attribution required (SOC 2, PCI DSS)
Prerequisites
  • SafeSquid deployed and operational
  • Admin access to Configuration Portal
  • Known client IP addresses or subnets (static or predictable ranges)
Compliance Consideration

Network Signature attributes traffic to IP/subnet and group, not to a named user. Where regulations require user-level attribution (e.g., PCI DSS, HIPAA), combine with user authentication or document the scope of IP-only policies for auditors.

Configure IP-based user-groups

  1. Access SafeSquid Configuration
    Open the Configuration Portal and click Configure.

    SafeSquid Configure page

  2. Navigate to Access Restrictions
    Application SetupAccess RestrictionsAllow List

    Access Restrictions section Allow List tab

  3. Create New Policy
    Click Add New.

    Add New button

  4. Define IP Range
    Enter the IP address or range in the IP Address field.

    Supported formats:

    • Single IP: 192.168.1.50
    • Multiple IPs: 192.168.1.50, 192.168.1.51, 192.168.1.52
    • IP range: 192.168.1.50-192.168.1.100
    • CIDR notation: 192.168.1.0/24

    IP Address field

  5. Assign User-Group
    In Add to User-Groups, specify a unique group name (e.g., FINANCE_DEVICES, GUEST_KIOSKS, IOT_SENSORS).

    User-Groups field

  6. Save Policy
    Click the checkmark to save.

Optional: Combine with Authentication

Set PAM Authentication to TRUE or add Username/Password if you want that IP range to also require user login. This allows "IP range + user authentication" for specific segments.

Example: Segmented network policies

SegmentIP RangeUser-GroupAuthenticationPolicy Goal
Finance workstations192.168.10.0/24FINANCEPAM requiredUser-level + department policy
Guest kiosks192.168.20.10-20GUEST_KIOSKSNoneRestricted browsing, no login
IoT devices192.168.30.0/24IOT_DEVICESNoneUpdate servers only
Executive floor192.168.5.0/24EXECUTIVESAD/LDAP requiredPremium access + audit

Verification

  1. Test from Client
    Send traffic through the proxy from a client in the configured IP range. The client is assigned the configured user-group and matching access rules apply.

  2. Check Interface
    Access RestrictionsAllow List shows the rule with IP range and user-group

  3. Review Logs

    tail -f /var/log/safesquid/identity.log

    Or ReportsDetailed Logs
    Logs show client IP and assigned user-group

  4. Confirm Policy Application
    Access a restricted site from the client; confirm the group-specific policy is enforced (allowed/blocked as configured)

Troubleshooting

SymptomLikely CauseFix
Wrong policy appliedClient IP not in range or rule order issueVerify client IP is within the configured range; check rule order in Allow List (more specific rules should be above broader ones)
No group assignedIP mismatch or typo in rangeConfirm IP field syntax; test from a known IP in the range
Unexpected auth promptRule has PAM or credentials setFor IP-only policy (no user login), ensure PAM is set to FALSE and username/password fields are empty
Overlapping rangesMultiple rules match same IPConsolidate rules or use more specific ranges; SafeSquid uses first matching rule
Rule Order Matters

SafeSquid evaluates Allow List rules top to bottom. Place narrow, specific IP rules above broad ones:

  1. 192.168.10.50 (single executive IP with premium access)
  2. 192.168.10.0/24 (department subnet with standard access)
  3. 0.0.0.0/0 (default policy for all others)

Advanced: Dynamic IP assignment

For environments with DHCP where client IPs change:

  1. DHCP reservations: Assign static IPs via DHCP for critical devices
  2. VLAN-based ranges: Use predictable ranges per VLAN; map VLAN subnets to user-groups
  3. Combine with MAC-based DHCP: Tie MAC addresses to IP reservations, then use Network Signature on those IPs
  4. Upgrade to user auth: For dynamic endpoints (laptops, mobile), use Directory Services instead

Next steps

  • Add user authentication: Combine Network Signature with Directory Services or BASIC for user-aware policies
  • Refine access rules: Use Access Restriction to define what each user-group can access
  • Enable SSL Inspection: Configure SSL Inspection to inspect HTTPS traffic from IP-based groups
  • Report by group: Use SafeSquid reports to analyze bandwidth and activity per user-group