Manage email notifications

Manage who receives email notifications about the planned changes to Akamai edge server IP addresses. This way, you will know when to update your organization's firewall rules to accept traffic from new IP addresses or to revoke access to decommissioned IP addresses.

​Akamai​ provides six to eight weeks of advance notice before activating the IP addresses.

What you'll do

Subscribe and unsubscribe to notifications for specific services.

Subscribe to notifications

To view which services you can subscribe to, run the Get-FirewallRulesService command. For a specific service's details, pass the -ServiceID parameter in the command.

# Get all
Get-FirewallRulesService

# Get one
Get-FirewallRulesService -ServiceID 3
serviceId serviceName                              description
--------- -----------                              -----------
        1 FIRSTPOINT                               Global Traffic Management
        3 LOG_DELIVERY                             Log Delivery
        4 SITE_SNAPSHOT                            Site Snapshot
        5 EdgeDNS_ZTAs                             Edge DNS Zone Transfer Agents
        7 ESN                                      Edge Staging Network
        8 SESN                                     Secure Edge Staging Network
        9 PERF_ANALYTICS                           Performance / Monitoring / SLA Agents
       10 NETSTORAGE                               NetStorage Content Mgmt: FileStore
       13 Test IPs                                 Development Test IPs
       14 FTP_NON_ANONYMOUS_DOWNLOAD               FTP Non Anonymous Download
       15 CCUAPI                                   Content Control Utility
       16 NetStorageUpload_C2S                     NetStorage Content Mgmt:ObjectStore & Aspera
       17 Flash/ HD Flash Universal Live Streaming Flash/ HD Flash Universal Live Streaming Entrypoints
serviceId serviceName  description
--------- -----------  -----------
        3 LOG_DELIVERY Log Delivery

Once you know for which services you want to receive email notification, subscribe yourself or others with the New-FirewallRulesSubscription command.

New-FirewallRulesSubscription -ServiceID 3 -Email 'jsmith@example.com, jasmith@example.com'
subscriptionId : 12345
serviceId      : 3
serviceName    : LOG_DELIVERY
createdBy      : jsmith@example.com
description    : Log Delivery
email          : jsmith@example.com, jasmith@example.com
signupDate     : 2025-12-04

Update notifications

If you want to update your subscriptions, save the result of the Get-FirewallRulesSubscription command in a variable and update specific attributes of your subscription. Then pipe the whole object back to the Set-FirewallRulesSubscription command to make your changes effective.

$MySubscriptions = Get-FirewallRulesSubscription

$MySubscriptions[0].email = "josmith@example.com"

$MySubscriptions | Set-FirewallRulesSubscription
subscriptionId : 12345
serviceId      : 3
serviceName    : LOG_DELIVERY
createdBy      : jsmith@example.com
description    : Log Delivery
email          : josmith@example.com
signupDate     : 2025-12-04

Alternatively, you can update your subscription settings in a variable as a hashtable, PSCustomObject, or JSON string, specifying the service ID and the email of a user you want to include in a given subscription. Then pipe the variable to the Set-FirewallRulesSubscription.

With this method, if you don't provide all your subscriptions, they will be removed from your set.

$MySubscriptions = @{
  subscriptions = @(
    {
      serviceId = 3
      email = "josmith@example.com"
    }
  )
}

$MySubscriptions | Set-FirewallRulesSubscription
$MySubscriptions = '{
  "subscriptions": [
    {
      "serviceId": 3,
      "email": "josmith@example.com"
    }
  ]
}'

$MySubscriptions | Set-FirewallRulesSubscription

Unsubscribe from notifications

If you don't know your subscription ID, run the Get-FirewallRulesSubscription to return a list of all subscriptions.

Get-FirewallRulesSubscription
subscriptionId : 12345
serviceId      : 3
serviceName    : LOG_DELIVERY
createdBy      : jsmith@example.com
description    : Log Delivery
email          : jsmith@example.com, jasmith@example.com
signupDate     : 2025-12-04

subscriptionId : 98765
serviceId      : 86
serviceName    : Shield NS53
createdBy      : jsmith@example.com
description    : Shield NS53
email          : jsmith@example.com
signupDate     : 2025-12-04

Then remove yourself or others from the notification list with the Remove-FirewallRulesSubscription command specifying the subscription ID.

Remove-FirewallRulesSubscription -SubscriptionId 12345
subscriptionId : 12345
serviceId      : 3
serviceName    : LOG_DELIVERY
createdBy      : jsmith@example.com
description    : Log Delivery
email          : jsmith@example.com, jasmith@example.com
signupDate     : 2025-12-04

View CIDR blocks

To view the CIDR blocks for the services you've subscribed to, run the Get-FirewallRulesCIDR command.

Optionally, you can provide additional parameters, like:

  • -LastAction to return only CIDR blocks that were added, updated, or removed from service. Possible values are add, update, or delete. The CIDR block with the delete status means it's no longer in service, and you can remove it from your firewall rules.
  • -EffectiveDateGt to return the CIDR blocks that start serving traffic to your origin from the indicated timestamp.
# Get all
Get-FirewallRulesCIDR

# Get filtered results
Get-FirewallRulesCIDR -LastAction 'add' -EffectiveDateGt '2014-03-21'
cidrId        : 12345
serviceId     : 3
serviceName   : LOG_DELIVERY
description   : Log Delivery
cidr          : 12.3456.78.9
cidrMask      : /24
port          : 21
creationDate  : 2014-03-04
effectiveDate : 2014-03-19
changeDate    : 
minIp         : 12.3456.78.9
maxIp         : 12.3456.78.901
lastAction    : add

cidrId        : 98765
serviceId     : 3
serviceName   : LOG_DELIVERY
description   : Log Delivery
cidr          : 987.65.432.1
cidrMask      : /24
port          : 21
creationDate  : 2014-03-06
effectiveDate : 2014-03-21
changeDate    : 
minIp         : 987.65.432.1
maxIp         : 987.65.432.198
lastAction    : add