Restricting Execution via IP Allowlist
In high-security enterprise environments, organizations often mandate that internal infrastructure can only be accessed from known, trusted networks. HasMCP provides an aggressive IP Allowlist feature attached directly to individual Provider Tools.Setting Up the Allowlist
When creating or modifying a specific Provider Tool (such asExecute_Postgres_Query), navigate to the Security block.
- Locate the Allowed IPs array.
- Provide a single static IPv4 address (
192.168.1.100) or a CIDR subnet block (10.0.0.0/24). - Save the Provider Tool.
Execution Blocking
Once the allowlist is configured, the HasMCP Proxy Server explicitly inspects the originating IP of the incoming MCP Client request. If the developer’s Desktop LLM or production Agent is executing from an unauthorized external IP, the proxy drops the tool call completely with a403 Forbidden response.
The execution never reaches the external provider logic, completely preventing unauthorized lateral network traversal.