Skip to content

Access lists

Access lists provide control over incoming traffic to your website. They allow administrators to set specific rules that determine which IP addresses, network masks, autonomous systems, or countries are allowed or blocked from accessing the website. This provides a powerful tool for managing the security and performance of a website.

Peakhour provides the following types of access lists:

  1. IP Block and Allow Lists: IP block and allow lists allow administrators to specify individual IP addresses that should be either blocked or allowed access to the website. This can be useful for managing access to sensitive resources or blocking known malicious IP addresses.
  2. Netmask Block and Allow Lists: Netmask block and allow lists allow administrators to specify a range of IP addresses to be either blocked or allowed access to the website. This is useful for blocking or allowing access from entire networks, such as those belonging to a specific organization.
  3. ASN Allow and Block Lists: Autonomous System (ASN) allow and block lists allow administrators to specify entire autonomous systems that should be either blocked or allowed access to the website. This is useful for managing access from large organizations that may have multiple networks.
  4. Country Code Allow and Block Lists: Country code allow and block lists allow administrators to specify entire countries that should be either blocked or allowed access to the website. This is useful for managing access from specific countries, such as blocking traffic from countries known for high levels of malicious activity.

Use cases for Access Lists:#

  • Blocking access from IP addresses known to be associated with malicious activity, such as those listed on IP reputation lists.
  • Allowing access only from specific countries or regions, such as those where the majority of your customers are located.
  • Preventing bots and scrapers from accessing sensitive parts of your website, such as login pages.
  • Managing access to resources with strict security requirements, such as financial or medical information.

By using access lists, administrators can control access to their website and improve the security and performance of their online presence.