Applies To:
Show VersionsBIG-IQ Centralized Management
- 6.0.0
Managing Address Lists
About address lists
Address lists, also called network address lists, are collections of IPv4 or IPv6 addresses, address ranges, nested address lists, geolocations, and subnets. These can be used by other parts of the BIG-IQ® Centralized Management system, such as firewall rules or firewall policies.
You can manage address lists from the following locations:
Be aware of the following considerations about address lists.
- Address lists are containers and must contain at least one entry. You cannot create an empty address list; you cannot remove an entry in an address list if it is the only one.
- Before nesting an address list inside an address list, check to be sure this option is supported on each BIG-IP® device where you intend to deploy the address list.
- To pin an address list to a deployment, you must do so from the Local Traffic pinning policy user interface: .
- You can add geolocation awareness to address lists, which enables you to specify source or destination IP addresses by geographic location rather than by their IP addresses. The geolocation is validated when the address list is saved. If you use a geolocation specification that is valid on the BIG-IQ Centralized Management system, but not supported on a particular BIG-IP device because the device has a different geolocation database, it causes a deployment failure for that device. Importing a BIG-IP device with an invalid geolocation specification causes a discovery failure for that device.
Create address lists
- To use the network configuration, click .
- To use the security configuration, click .
Edit address lists
- To use the network configuration, click .
- To use the security configuration, click .
Clone address lists
- To use the network configuration, click .
- To use the security configuration, click .
Deploy address lists
- To use the network configuration, click .
- To use the security configuration, click .
Delete address lists
- To use the network configuration, click .
- To use the security configuration, click .