Manual Chapter :
Managing Address Lists
Applies To:
Show VersionsBIG-IQ Centralized Management
- 6.0.1
Managing Address Lists
About address lists
Address lists
, also called network address lists, are collections of IPv4 or IPv6
addresses, address ranges, nested address lists, geolocations, and subnets. These can be used by
other parts of the BIG-IQ® Centralized Management system, such as firewall
rules or firewall policies.You can manage address lists from the following locations:
Be aware of the following considerations about address lists.
- Address lists are containers and must contain at least one entry. You cannot create an empty address list; you cannot remove an entry in an address list if it is the only one.
- Before nesting an address list inside an address list, check to be sure this option is supported on each BIG-IP® device where you intend to deploy the address list.
- To pin an address list to a deployment, you must do so from the Local Traffic pinning policy user interface:.
- You can add geolocation awareness to address lists, which enables you to specify source or destination IP addresses by geographic location rather than by their IP addresses. The geolocation is validated when the address list is saved. If you use a geolocation specification that is valid on the BIG-IQCentralized Management system, but not supported on a particular BIG-IP device because the device has a different geolocation database, it causes a deployment failure for that device. Importing a BIG-IP device with an invalid geolocation specification causes a discovery failure for that device.
Create address lists
You create address lists so that you
can use them with other parts of the BIG-IQ® Centralized Management
system, such as firewall rules. Address lists are a collection of addresses. You can
access address lists from either the network or the network security configuration menu.
- To use the network configuration, click.
- To use the security configuration, click.
- Open the Address Lists screen.You can access the address list from either the network or network security configuration menu and it will behave in the same way.
- ClickCreate.The New Address List screen opens.
- On the left, clickProperties.
- Supply the properties for the address list.
- In theNamesetting, type a unique name for the address list.
- In theDescriptionsetting, type an optional description for the address list.
- In thePartitionsetting, type a partition if needed. TheCommonpartition is the default.
- On the left, clickAddresses.
- Supply the addresses for the address list.The screen displays a template address for you to complete. An address list must contain at least one address.
- In theTypecolumn, select the address type, and then provide the address information in theAddressescolumn. You can also add a description for each address in theDescriptioncolumn.
- To add a single address, selectAddressand type an IPV4 or IPV6 address.
- To add an address list, selectAddress Listand select the name of the address list.
- To add a range of addresses, selectAddress Rangeand type the beginning and ending IPV4 or IPV6 addresses.
- To add a location to the address list, selectCountry/Regionand select the country and optionally, the region of the country. You can also selectUnknownas the country or region option. Address locations can be used when defining rules based on where a system is located (the geolocation of the system), rather than on the IP address of the system.
- To add a domain name, selectDomain Nameand type the domain name.
- In theAdd/Removecolumn, click+to add the address to the list.You can clickXto delete an address from the list.
- Continue to add or delete addresses to the address list until the address list is complete.
- Save your work.
Edit address lists
You edit address lists to change the
properties of the address list or to add, modify, or remove addresses from the address
list, or both. You can access address lists from either the network or the network
security configuration menu.
- To use the network configuration, click.
- To use the security configuration, click.
- Open the Address Lists screen.You can access an address list from either area and it will behave in the same way.
- Click the name of the address list to edit it.
- To modify the address listDescription, clickPropertiesand in theDescriptionsetting, type or revise an optional description for the address list.
- On the left, clickAddresses.
- Add, modify, or delete addresses for the address list.
- To modify that address, click the pencil icon to the left of the address.
- To delete an address, clickXin theAdd/Removecolumn.
- To add an address, click+in theAdd/Removecolumn.
An address list must contain at least one address. - If you are adding or modifying an address, supply or modify the settings.In theTypecolumn, select the address type, and then provide the address information in theAddressescolumn. You can also add a description for each address in theDescriptioncolumn.
- To add a single address, selectAddressand type an IPV4 or IPV6 address.
- To add an address list, selectAddress Listand select the name of the address list.
- To add a range of addresses, selectAddress Rangeand type the beginning and ending IPV4 or IPV6 addresses.
- To add a location to the address list, selectCountry/Regionand select the country and optionally, the region of the country. You can also selectUnknownas the country or region option. Address locations can be used when defining rules based on where a system is located (the geolocation of the system), rather than on the IP address of the system.
- To add a domain name, selectDomain Nameand type the domain name.
- In theAdd/Removecolumn, click+to add the address to the list.You can clickXto delete an address from the list.
- Continue to add, modify, or delete addresses in the address list until the address list is complete.
- Save your work.
Clone address lists
You can clone an address list to
create a copy of it, which you can then edit to address any special considerations. You
can access address lists from either the network or the network security configuration
menu.
- To use the network configuration, click.
- To use the security configuration, click.
- Open the Address Lists screen.You can access an address list from either area and it will behave in the same way.
- Select the check box next to the address list to clone.
- ClickClone.The system makes a copy of that address list with the same name, but with-CLONEappended to the name and a blankDescriptionfield.
- Change the address list properties and contained addresses as needed, such as providing a meaningful name or changing an address within the list.
- Save your work.
The new address list is now defined
and you can assigned it to an object.
Rename address
lists
You rename an address list when you want to make
that name more accurate or distinct. Renaming an address list causes a new address list
to be created and the old address list to be deleted in a single transaction. All
references to the old address list are updated to refer to the renamed address
list.
- Click.You cannot rename an address list from thearea.
- Select the check box next to the address list to rename.
- ClickRename.A dialog box displays.
- Enter the new name in the dialog box and clickSave.The BIG-IQ system shows the status of the renaming operation in the dialog box.
- ClickCloseto exit the dialog box.
The address list has been renamed.
Deploy address lists
If you want to do a quicker deployment by only
deploying the address list portion of a configuration, you can do a partial deployment
of the address list, instead of deploying the entire configuration. You can access
address lists from either the network or the network security configuration menu.
- To use the network configuration, click.
- To use the security configuration, click.
- Open the Address Lists screen.You can access an address list from either area and it will behave in the same way.
- Select the check box next to the address list to deploy.
- ClickDeploy.
The system displays the selected
address list, with options for partial deployment selected. You can now continue the
partial deployment process.
Delete address lists
You delete address lists you no
longer use to avoid confusion in the user interface. You can access address lists from
either the network or the network security configuration menu.
- To use the network configuration, click.
- To use the security configuration, click.
- Open the Address Lists screen.You can access an address list from either area and it will behave in the same way.
- Click the check box next to the address list to delete.
- ClickDelete.
- In the confirmation dialog box that opens, clickDeleteto confirm the removal.If the address list is pinned to a BIG-IP device pinning policy, the deletion will fail.