Nile Service Block
Core Concepts
Static IP management
13 min
new static ip handling for improved security and organization nile’s default architecture is designed for security many customer devices still rely on static ip addresses, and nile supports them however, static ip usage introduces risks such as ip conflicts, spoofing attempts, and potential unauthorized access if not properly controlled in most customer networks today, static ip management is poorly organized it teams often lack visibility into which devices are using static ip addresses and how they are configured nile addresses this challenge by introducing enhanced controls that secure static ip usage while also organizing the network for better management recommendation nile strongly advises using dhcp based ip addressing wherever possible for devices that must use static ip addresses, consider migrating them to dhcp with ip reservations on the dhcp server this provides the security and manageability benefits of dhcp while retaining device specific ip assignments static ip drawbacks security risks devices using static ip addresses can bypass first hop security ip spoofing becomes easier in environments where static ip usage is unmanaged the likelihood of ip conflicts increases significantly management complexity networks with unmanaged static ip addresses become unorganized and hard to control each device must be manually configured, creating unnecessary overhead changes to ip addressing or device configurations require manual updates scalability challenges manual ip assignment is error prone and does not scale in larger environments as networks grow, managing static ips becomes increasingly difficult and resource intensive static ip management in nile nile introduces a more secure way to manage devices with static ip addresses by requiring explicit approval in the mab (mac authentication bypass) settings minimizes security risk administrators must explicitly approve devices as “statically addressed ” devices not marked as approved for static ip are blocked by default brings order to the network previously unorganized networks gain structure and visibility administrators are notified of new static ip devices attempting access ip conflicts are eliminated or minimized since approval is required before devices can use static ip supports scalability mac addresses approved for static ip must be explicitly flagged in mab or wireless access management settings customers can bulk upload csv files of all static ip devices from legacy networks this creates an organized baseline for future migration to dhcp reservation, since the list of devices is already centralized in the nile control center feature settings for new customers adding a statically addressed device log in to the nile portal navigate to settings > access management select add device and choose static ip provide mac address or oui segment (mandatory) geographical scope (mandatory) ip address (recommended for highest security) if many devices share the same oui (for example iot devices), the ip field can remain blank approving the oui as static ip will allow all devices with that oui to connect using static ip addresses if a mac address is mab approved but not allowed to use static ip, leave the static ip option unchecked this denies connectivity even if the device is otherwise approved bulk upload a list of ‘approved’ mac addresses w/static ip can be bulk uploaded as well mab table has new ‘static ip ’ and ip address column (default hidden), admins can add them on demand level of security vs flexibility administrators can choose between strict security and greater flexibility highest security approve a specific mac address as static ip and specify the exact ip address it is allowed to use moderate flexibility approve a mac address as static ip without specifying the ip address maximum flexibility approve an oui as static ip, allowing any device with that oui to connect using static ip for environments with a large number of iot devices, administrators often choose oui based approval to simplify onboarding for critical assets, nile recommends the stricter mac plus ip approval model alerting nile provides a comprehensive alerting system for static ip violations if a device attempts to use a static ip without proper approval, the nile portal generates an alert in certain cases, the device is also blocked automatically the table below summarizes the behavior approved as static static ip specified detected condition action yes yes (mac + ip specified) device connects with a different static ip block + alert yes yes device connects with dhcp ip allow + alert yes no device connects with dhcp ip allow + alert yes no device connects with static ip allow no not applicable device connects with static ip block + alert no no device connects using a static ip not belonging to any configured subnet within segments block + alert feature constraints the nile service block software must be updated to support the new static ip management feature existing customers using the legacy static ip feature will be migrated by the nile team new customers who are not on the required nsb version and wish to use this feature should contact nile support the team will schedule an nsb upgrade and enable the feature in the nile control center