Manage email notifications
Manage who receives email notifications about the planned changes to Akamai edge server IP addresses. This way, you will know when to update your organization's firewall rules to accept traffic from new IP addresses or to revoke access to decommissioned IP addresses.
Akamai provides six to eight weeks of advance notice before activating the IP addresses.
What you'll do
Subscribe and unsubscribe to notifications for specific services.
Subscribe to notifications
To view which services you can subscribe to, run the Get-FirewallRulesService command. For a specific service's details, pass the -ServiceID parameter in the command.
# Get all
Get-FirewallRulesService
# Get one
Get-FirewallRulesService -ServiceID 3
serviceId serviceName description
--------- ----------- -----------
1 FIRSTPOINT Global Traffic Management
3 LOG_DELIVERY Log Delivery
4 SITE_SNAPSHOT Site Snapshot
5 EdgeDNS_ZTAs Edge DNS Zone Transfer Agents
7 ESN Edge Staging Network
8 SESN Secure Edge Staging Network
9 PERF_ANALYTICS Performance / Monitoring / SLA Agents
10 NETSTORAGE NetStorage Content Mgmt: FileStore
13 Test IPs Development Test IPs
14 FTP_NON_ANONYMOUS_DOWNLOAD FTP Non Anonymous Download
15 CCUAPI Content Control Utility
16 NetStorageUpload_C2S NetStorage Content Mgmt:ObjectStore & Aspera
17 Flash/ HD Flash Universal Live Streaming Flash/ HD Flash Universal Live Streaming Entrypoints
serviceId serviceName description
--------- ----------- -----------
3 LOG_DELIVERY Log Delivery
Once you know for which services you want to receive email notification, subscribe yourself or others with the New-FirewallRulesSubscription command.
New-FirewallRulesSubscription -ServiceID 3 -Email 'jsmith@example.com, jasmith@example.com'
subscriptionId : 12345
serviceId : 3
serviceName : LOG_DELIVERY
createdBy : jsmith@example.com
description : Log Delivery
email : jsmith@example.com, jasmith@example.com
signupDate : 2025-12-04
Update notifications
If you want to update your subscriptions, save the result of the Get-FirewallRulesSubscription command in a variable and update specific attributes of your subscription. Then pipe the whole object back to the Set-FirewallRulesSubscription command to make your changes effective.
$MySubscriptions = Get-FirewallRulesSubscription
$MySubscriptions[0].email = "josmith@example.com"
$MySubscriptions | Set-FirewallRulesSubscription
subscriptionId : 12345
serviceId : 3
serviceName : LOG_DELIVERY
createdBy : jsmith@example.com
description : Log Delivery
email : josmith@example.com
signupDate : 2025-12-04
Alternatively, you can update your subscription settings in a variable as a hashtable, PSCustomObject, or JSON string, specifying the service ID and the email of a user you want to include in a given subscription. Then pipe the variable to the Set-FirewallRulesSubscription.
With this method, if you don't provide all your subscriptions, they will be removed from your set.
$MySubscriptions = @{
subscriptions = @(
{
serviceId = 3
email = "josmith@example.com"
}
)
}
$MySubscriptions | Set-FirewallRulesSubscription
$MySubscriptions = '{
"subscriptions": [
{
"serviceId": 3,
"email": "josmith@example.com"
}
]
}'
$MySubscriptions | Set-FirewallRulesSubscription
Unsubscribe from notifications
If you don't know your subscription ID, run the Get-FirewallRulesSubscription to return a list of all subscriptions.
Get-FirewallRulesSubscription
subscriptionId : 12345
serviceId : 3
serviceName : LOG_DELIVERY
createdBy : jsmith@example.com
description : Log Delivery
email : jsmith@example.com, jasmith@example.com
signupDate : 2025-12-04
subscriptionId : 98765
serviceId : 86
serviceName : Shield NS53
createdBy : jsmith@example.com
description : Shield NS53
email : jsmith@example.com
signupDate : 2025-12-04
Then remove yourself or others from the notification list with the Remove-FirewallRulesSubscription command specifying the subscription ID.
Remove-FirewallRulesSubscription -SubscriptionId 12345
subscriptionId : 12345
serviceId : 3
serviceName : LOG_DELIVERY
createdBy : jsmith@example.com
description : Log Delivery
email : jsmith@example.com, jasmith@example.com
signupDate : 2025-12-04
View CIDR blocks
To view the CIDR blocks for the services you've subscribed to, run the Get-FirewallRulesCIDR command.
Optionally, you can provide additional parameters, like:
-LastActionto return only CIDR blocks that were added, updated, or removed from service. Possible values areadd,update, ordelete. The CIDR block with thedeletestatus means it's no longer in service, and you can remove it from your firewall rules.-EffectiveDateGtto return the CIDR blocks that start serving traffic to your origin from the indicated timestamp.
# Get all
Get-FirewallRulesCIDR
# Get filtered results
Get-FirewallRulesCIDR -LastAction 'add' -EffectiveDateGt '2014-03-21'
cidrId : 12345
serviceId : 3
serviceName : LOG_DELIVERY
description : Log Delivery
cidr : 12.3456.78.9
cidrMask : /24
port : 21
creationDate : 2014-03-04
effectiveDate : 2014-03-19
changeDate :
minIp : 12.3456.78.9
maxIp : 12.3456.78.901
lastAction : add
cidrId : 98765
serviceId : 3
serviceName : LOG_DELIVERY
description : Log Delivery
cidr : 987.65.432.1
cidrMask : /24
port : 21
creationDate : 2014-03-06
effectiveDate : 2014-03-21
changeDate :
minIp : 987.65.432.1
maxIp : 987.65.432.198
lastAction : add
Updated about 2 hours ago
