LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. Getting Started
  2. 4. Security Rules

4.1 BlackList & WhiteList

Previous4. Security RulesNext4.2 User Agent Filtering

Last updated 9 days ago

🧭 Overview

The BlackList & WhiteList module in ShieldsGuard gives administrators the power to allow or block specific IP addresses from accessing the protected website or application. This forms the most fundamental and direct layer of access control in your security policy.

With this module, traffic can be explicitly permitted (whitelisted) or denied (blacklisted), regardless of WAF, DDoS, or any other protection mechanisms in place.


βœ… Allowed IP Addresses (Whitelist)

This section allows you to define IPs or ranges that should bypass all protection engines β€” including:

  • Web Application Firewall (WAF)

  • DDoS Protection

  • Rate Limiting

  • Behavior-based Blocking

Use Cases:

  • Trusted internal IPs (corporate office, VPNs)

  • Monitoring systems or uptime checkers

  • Developers or testers who should never be blocked

  • Third-party services with known IPs (e.g., Stripe, PayPal, Cloud providers)

Example:

203.0.113.42
10.10.0.0/16

⚠️ Whitelisted IPs are treated as fully trusted β€” ensure they are secure and properly scoped.


🚫 Blocked IP Addresses (Blacklist)

This section allows you to completely ban IPs or ranges from accessing the site. Any request from a blacklisted IP will be dropped immediately.

Use Cases:

  • Known malicious actors

  • Repeated brute-force or spam sources

  • IPs flagged by threat intelligence

  • Abuse reports or geo-blocking by range

Example:

192.168.100.23
203.0.113.0/24

πŸ”’ Blacklist takes absolute precedence β€” blocked IPs cannot bypass via any other setting.


πŸ”§ How to Use

  1. Go to Security Rules > BlackList & WhiteList

  2. Switch between Allowed IP Addresses or Blocked IP Addresses

  3. Click β€œAdd IP Address”

  4. Enter:

    • Single IP (e.g., 192.0.2.10)

    • IP Range / CIDR (e.g., 192.0.2.0/24)

  5. Save

Changes take effect immediately and will be logged in traffic analytics.


πŸ” Search and Manage

  • You can search IPs using the search bar

  • Use bulk selection for mass deletion or editing

  • Logs will indicate whether a request was blocked or allowed due to IP rule


πŸ“Œ Best Practices

Situation
Recommendation

Allow internal staff

Whitelist static corporate IPs

Prevent botnets & scrapers

Use blacklists with CIDR blocks

Integrate threat feeds

Automate blacklist entries via API

Avoid accidental lockout

Whitelist your own IP before testing


πŸ›‘οΈ IP-level control is your first line of defense. Use it to allow what you trust, and block what you know to be harmful.