All Products
Search
Document Center

Edge Security Acceleration:Get started with global settings

Last Updated:Mar 05, 2026

Lists in Global Settings let you define reusable collections of IP addresses, CIDR blocks, ASNs, or hostnames. You create a list once and reference it across multiple WAF and bot management rules. When you update a list, the change propagates automatically to every associated policy.

Benefits

  • Centralized management -- Maintain IP addresses, CIDR blocks, ASNs, or hostnames in one place. Update a list once to apply the change to every rule that references it.

  • Policy consistency -- Reference standardized lists instead of entering the same values manually across multiple rules, eliminating discrepancies.

  • Reuse across environments -- Flexibly create and adjust lists based on business scenarios and reuse the lists across environments, giving you efficient, layered control over your security policies.

Supported list types

Type Description Limits
IP Address/CIDR Block IPv4 or IPv6 addresses and CIDR blocks. Separate multiple entries with a comma (,). Up to 10 lists; up to 5,000 entries per list
ASN An Autonomous System Number (ASN) uniquely identifies an autonomous system -- a group of IP networks and routers controlled by a single network management organization such as an ISP, enterprise, or institution. You can query the ASN in a request. For more information, see How do I query the ASN of an IP address? or Instant Logs. Up to 500 entries per list
Hostname The value of the Host header in the request, which determines the requested domain name. Up to 500 entries per list

Where you can use lists

After you create a list, you can reference it as a match value when you configure rules for any of the following features:

To reference a list in a rule, set the logic operator to is in list or is not in list in the If requests match... section. The match field depends on the list type:

  • IP Address/CIDR Block lists: Set the match field to Client IP.

  • ASN lists: Set the match field to ASN.

  • Hostname lists: Set the match field to Hostname.

Lists are scoped to the website under which they are referenced. For example, if you reference a list under example.com, the list takes effect for example.com and its subdomains only. The list does not take effect for other websites that have not referenced it.

Create a list

  1. Log on to the ESA console. In the left-side navigation pane, choose Global Settings > Lists.

  2. On the Lists page, click Create List.

  3. In the Create List dialog box, specify the following parameters:

    • List Name: Enter a name for the list.

    • Type: Select IP Address/CIDR Block, ASN, or Hostname.

    • In the input field, enter a match value.

  4. Click OK.

image

Reference a list in a WAF custom rule

The following walkthrough shows how to create a list containing your local server's IP address, reference the list in a custom rule that blocks matching requests, and verify that the rule takes effect.

Step 1: Create a custom rule that references the list

  1. In the ESA console, choose Websites and click the website name you want to manage.

  2. In the left-side navigation pane, choose Security > WAF. On the WAF page, click the Custom Rules tab, and then click Create Rule.

  3. On the Create Custom Rule page, specify Rule Name.

  4. In the If requests match... section, configure the following settings:

    • Set the match type to Client IP.

    • Set the match condition to is in list.

    • Select the list that you created.

  5. In the Then execute... section, configure the following settings:

    • Set Action to Block.

    • Set Error Page to Default Error Page. The status code 403 cannot be changed.

  6. Click OK.

Step 2: Verify the rule

After the list is referenced, run the following command to test that requests from the listed IP address are blocked:

curl -I http://esa.xxx.top/pic_03.jpg

If the response returns status code HTTP 403, the rule is working as expected.

image

What's next