About lists
SIA allows you to create two broad categories of lists: block lists and exception lists. The actions associated with these lists are prioritized over Akamai Security and classifications in SIA. If domains, IP addresses, or URLs are configured in multiple lists with conflicting actions, SIA selects the action based on a priority. For more information, see Policy conflicts.
Each entry in a list is counted separately. For example, in a custom list, each domain and IP address is counted as a separate entry. SIA allows you to have a maximum of 200,000 list entries.
An enterprise can create a maximum of 100 lists. If your organization needs to create more lists, contact your Akamai representative.
You need to deploy your work after creating, modifying, or deleting a list. The deployment takes approximately 20-30 seconds.
Block lists
Block lists are used to define whether a policy should block, monitor, or allow access when users make requests to outside resources.
In a block list, you can configure the following:
- Domains. You can identify domains that you know or suspect are threats.
- IP addresses. You can identify the IP addresses that you know or suspect are threats.
- File hashes. You can identify the hashes of files that you want to block, monitor, or allow.
- URLs. You can identify the URLs that you want to block, monitor, or allow.
- Top-level domains. You can identify country-code top-level domains (ccTLD) and generic top-level domains (gTLD).
If you select the allow action when assigning a block list to a policy, note the following:
- If the proxy is enabled, this action directs traffic to SIA Proxy for analysis.
- If the proxy is disabled, this action resolves requests to the origin.
To learn more about the Allow policy action, see Allow.
Exception lists
Exception lists are used to define the specific traffic and file hashes that you don’t want scanned by SIA or SIA Proxy. If SIA Proxy is enabled, the proxy does not scan the domains, IP addresses, URLs, or file hashes in exception lists. By default, when a user associates an exception list to a policy, it's assigned the bypass policy action.
In an exception list, you can configure the following:
- Domains. You can specify the domains that you don’t want scanned or analyzed by SIA.
- IP addresses. You can specify IP addresses that you don’t want scanned or analyzed by SIA.
- File hashes. You can specify the hashes of files that you don't want scanned by SIA Proxy.
- URLs. You can specify one or more URLs that you don't want scanned by SIA Proxy.
Updated over 1 year ago