Black and White Lists

Configure website protection blacklists and whitelists with the following priority order: Super Whitelist > IP Whitelist > URL Whitelist > User-Agent (UA) Whitelist > IP Blacklist > URL Blacklist > UA Blacklist > Interception List > Protection Rules.


1. Spider IP Whitelist

Allow search engine spiders based on IP addresses, excluding Spider characteristics.

Our company operates an automatic spider IP collection system to swiftly gather the latest spider IP addresses.


2. URL Black and White List

Allow or block access to URL addresses (supporting parameters), with multiple URLs separated by line breaks.


Examples of entries:

/admin/

/index.php?s=admin

http://www.magiaegis.com/admin.php

http://www.magiaegis.com/admin/


Matching Method: 

Partial matching is employed, meaning any access address that includes the entered URL will be matched.

For instance, if "/admin.php" is entered, all URL addresses containing "/admin.php" will be matched.

For example, https://www.magiaegis.com/admin.php will be allowed.


3. IP/Region Black and White List

Allow or block access for client IPs, with support for adding regions.

Supports IPs, subnet masks, and IP ranges. Separate multiple entries with line breaks. 


Examples of entries:

192.168.2.1

192.168.2.1/16

192.168.2.1-192.168.255.255


4. UA Black and White List

Allow or block access based on UA keywords. A match occurs if the (User-Agent) contains the keyword. Separate multiple keywords with line breaks. 


Examples of entries:

baiduspider

safari


5. Referer Black and White List

Allow or block access based on the referer source. Access via the specified referer will be either allowed or blocked accordingly. A match occurs if the referer contains the keyword. Separate multiple keywords with line breaks.


Examples of entries:

test.com

{$empty}


6. Malicious IP Blacklist

Automatically download a vast library of malicious IPs from the cloud and block these malicious IPs from accessing the website.

We have established a global threat monitoring network that collects a massive list of malicious IPs daily and synchronizes it with various intrusion prevention system terminals.


34.png


<< Interception Settings