انتقل إلى المحتوى

Access Control Lists (ACL) in Security Edge Inline

An access control list (ACL) is a set of rules that defines which IP addresses can access specific hosts and locations of your APIs protected by Security Edge Inline.

The Wallarm Node checks each incoming request against the ACL rules. If a request matches a deny rule, it gets blocked. This prevents unauthorized activity and potential attacks.

Requirements

Access control lists (ACL) are supported starting from Edge Node version 6.6.0.

Creating an ACL

ACLs provide targeted control by applying rules to specific hosts and locations of your API. You first create an ACL with the required rules and then assign it to the hosts or locations you want to protect.

You can create an ACL either during or after Edge Node deployment.

  1. Go to Wallarm Console → Security EdgeInlineConfigureAccess control lists and click Create ACL.

  2. Give your ACL a recognizable name.

  3. Define which IPs will be allowed and/or denied access to your hosts and locations. To do so, click Add rule and select the configuration type:

    • If you choose "Allow" or "Deny", specify an IPv4 address in one of the following formats:

      • A single IP address (e.g., 192.0.2.1)
      • A block of IPs using CIDR notation (e.g., 192.0.2.0/20)
    • If you choose "Allow all" or "Deny all", no IP address is required. The rule applies to all IP addresses.

      Configuration notice

      The "Deny all" configuration blocks all traffic. To avoid blocking legitimate requests, add allow rules or change the configuration type.

  4. To add multiple rules, repeat the step above. To reorder rules, use drag and drop. Rules are checked from top to bottom - access is based on the first match.

  5. Once you have created the desired configuration, click Save.

The created ACL appears in the list. You can see how many rules it contains and how many locations it secures.

The newly created ACL is used in 0 hosts and locations. To secure hosts or locations with this ACL, you need to assign it to them.

Zero locations

Assigning an ACL to protect hosts and locations

You can assign an ACL either during or after Edge Node deployment.

  1. Go to Wallarm Console → Security EdgeInlineConfigureHosts.

  2. Under "Access control list (ACL)", select the desired ACL.

Select ACL

ACL and IP list evaluation order

An IP must pass both the ACL and IP list evaluations to access protected endpoints. ACLs are always processed first and take precedence over IP list decisions.

When both ACLs and IP lists (allowlist, denylist, graylist) are configured, each incoming request is evaluated in two sequential stages:

Stage 1: ACL evaluation

The ACL determines whether the request is allowed to proceed.

If the ACL denies the request, evaluation stops — the request is blocked regardless of IP list entries.

Stage 2: IP list evaluation

If the request passes the ACL, the IP list is applied.

The denylist still takes precedence and will block the request even if it passed ACL evaluation.

ACL evaluation IP list evaluation Final result
Allow Allow Request allowed
Deny Allow Request blocked
Allow Deny Request blocked