IP Blacklist/Whitelist

ZStack allows you to configure a blacklist or whitelist for login IP addresses to protect your cloud. You can configure a blacklist or whitelist as needed to identify and filter the identities of those who access your cloud, thereby enhancing the access control and security of your cloud.

To use the IP Blacklist/Whitelist feature, go to Settings > Global Settings > Advanced, locate IP Blacklist/Whitelist, and change the value to true.

Add IP Blacklist/Whitelist

On the IP blacklist/whitelist page, you can add an IP blacklist or whitelist as needed. The methods for adding IP blacklist and whitelist are the same. The following is an example of adding an IP blacklist:

In the navigation pane of the ZStack Private Cloud UI, choose Platform Management > IP Blacklist/Whitelist. On the IP Blacklist/Whitelist page, click Add IP Blacklist. On the displayed Add IP Blacklist page, set the following parameters:
  • Name: Enter a name for the IP blacklist.
  • Description: Optional. Enter a description for the IP blacklist.
  • IP Address: Enter the IP addresses to be added to the blacklist.
    Note:
    • You can add static IP addresses, IP ranges, or CIDRs, and separate them by using commas (,).
    • You can add a combination of up to 100 items of the supported formats.
As shown in Figure 1.
Figure 1. Add IP Blacklist


Notice

The implementation mechanism of IP blacklist and whitelist is as follows:
  • By default, if no IP blacklist or whitelist is added, the access requests from all IP addresses are allowed.
  • If only an IP blacklist is added, the access requests from all IP addresses in the blacklist are denied, while the access requests from IP addresses outside of the blacklist are allowed.
  • If only an IP whitelist is added, the access requests from both IP addresses in and outside of the whitelist are allowed.
  • If both an IP blacklist and an IP whitelist are added, the whitelist takes precedence over the blacklist. For example, if an IP address is added to a blacklist and a whitelist at the same time, the access requests from the IP address will be allowed.