Adding and Configuring an IP Whitelist in NxtFireGuard
In this guide, you'll learn how to create, configure, and apply an IP whitelist in NxtFireGuard. A whitelist is a list of IP addresses or ranges that you trust to bypass threat detection. This feature ensures NxtFireGuard excludes specified IPs or subnets from processing.
π What is an IP Whitelist?β
An IP Whitelist is a set of IP addresses or subnets marked as trusted, allowing them to bypass security measures that would typically apply. Use this feature to ensure that NxtFireGuard doesn't inadvertently block trusted traffic from specific IPs or networks.
π Step-by-Step Guide to Creating a Whitelistβ
Follow these steps to create a new IP whitelist in NxtFireGuard:
-
Open the Whitelist Menu
- Go to Whitelists and click the + button to create a new whitelist.
-
Name the Whitelist
- Give your whitelist a descriptive name. This can be changed at any time.
-
Configure the Whitelist
- Click the Edit button to access whitelist settings.
The Edit page includes two sections:
- Section 1: Subnets - Add subnets or single IPs to be whitelisted.
- Section 2: Apply Whitelist - Apply the whitelist on a per-host or per-blocklist basis, or both.
π How to Add a Subnet or Single IPβ
To add specific IPs or subnets to your whitelist:
-
Click the + Button
- Open the Subnets section and click the + button to add an IP or subnet.
-
Enter a Description
- Provide a description for the IP or subnet in the Description column to help identify its purpose.
-
Input the Subnet or Single IP
- Enter the IP address or subnet in the Subnet column.
-
Set the Netmask
- Specify the netmask using CIDR notation. For a single IP, use a
/32
mask to apply the rule to just that address.
- Specify the netmask using CIDR notation. For a single IP, use a
-
Save the Subnet or IP
- Click Done to save your entry.
- Adding the subnet
192.168.1.0/24
to the Whitelist.
- Adding the IP
10.0.0.10/32
to the Whitelist.
π Applying the Whitelistβ
The IP whitelist can be applied on either a per-host or per-blocklist basis to control where it takes effect.
Note: Whitelisted IPs wonβt trigger alerts or be processed if they meet certain conditions defined in the per-host or per-blocklist settings.
Applying the Whitelist on a Per-Host Basis π₯β
This application method ensures that any threat logs from specific hosts containing a whitelisted IP in the source field are ignored.
Conditions:
- Condition 1: The host sending the alert must be part of the Applied Hosts list.
- Condition 2: The threat logβs
source_ip
must match an IP in the Whitelisted Subnets.
Example: Apply the whitelist to docs-paloalto
and docs-firepower
hosts.
Result: Alerts from
docs-paloalto
anddocs-firepower
that contain a source IP within the whitelisted subnets (192.168.1.0/24
or10.0.0.10/32
) wonβt be processed.
Applying the Whitelist on a Per-Blocklist Basis π‘β
This option allows the whitelist to exempt certain blocklists from blocking specific IPs.
Conditions:
- Condition 1: The host sending the alert must contribute to a blocklist included in Applied Blocklists.
- Condition 2: The threat logβs
source_ip
must be within one of the Whitelisted Subnets.
Example: Apply the whitelist to Demo-Blocklist-1
.
Result: Alerts for the
Demo-Blocklist-1
blocklist containing source IPs within whitelisted subnets (192.168.1.0/24
or10.0.0.10/32
) wonβt be processed.
Combined Example: Apply Whitelist to Hosts and Blocklistβ
To ensure both the hosts (docs-paloalto
, docs-firepower
) and the blocklist Demo-Blocklist-1
are exempt from processing alerts triggered by whitelisted IPs:
- Apply the whitelist to the
docs-paloalto
anddocs-firepower
hosts. - Apply the whitelist to the
Demo-Blocklist-1
blocklist. Each blocklist has hosts that contribute alerts to it, and applying the whitelist to a blocklist ensures that whitelisted IPs from any contributing hosts are exempt from this Blocklist.
Result: Any alert originating from
docs-paloalto
ordocs-firepower
, or any host contributing toDemo-Blocklist-1
, will bypass processing if the alert's source IP matches a whitelisted IP or subnet (192.168.1.0/24
or10.0.0.10/32
).
This configuration provides maximum flexibility, ensuring that trusted IPs or subnets can be applied broadly to individual hosts and blocklists that aggregate input from multiple sources.
If you have questions or need further help, our support team is available: Contact Support.