Previous Topic: Configuring Negative Country ListNext Topic: Configuring Trusted IP Addresses


Configuring Untrusted IP Addresses

The Untrusted IP address list is a collection of IP addresses that have been the origin of known anonymizer proxies or fraudulent and malicious transactions in the past. This list is the source of the Negative category discussed in the "Configuring Untrusted IP Types" section.

Use the Manage List Data and Category Mappings page to configure the untrusted IP address ranges for your organization.

Adding or Deleting IP Address Ranges

To add or delete untrusted IP addresses and ranges for your organization:

  1. Ensure that you are logged in as a GA.
  2. Activate the Organizations tab.
  3. Under Manage Organizations, click the Search Organization link.
  4. Click the Search button on the Search Organization page to display the list of organizations.
  5. Under Select Organizations to Modify, click the link with the organization’s name to which you want to apply the rule.
  6. Click the RiskFort Configuration tab.
  7. Under the Rules Management section on the side-bar menu, click the Manage List Data and Category Mappings link.

    The Manage List Data and Category Mappings page is displayed.

  8. From the Select Existing Ruleset list, select the ruleset that for which this configuration is applicable.

    The ruleset configuration information is displayed.

  9. Select the Manage List Data option.
  10. From the Select List Type list, select Untrusted IP Lists.
  11. From the Select List drop-down list, select the list identifier that you specified while creating the corresponding list.
  12. In the Upload Untrusted IP Ranges section, select the appropriate mode for writing data:
  13. Click Browse to navigate to the data file that contains the list of entries.
  14. Click Upload to complete the task.
  15. In the Add/Delete Untrusted IP Range section:
    1. Enter the starting IP address in the IP Address field.
    2. Select one of the following options:
      • Subnet Mask: If you want to specify a range of IP addresses based on the subnet mask to be added to the Untrusted IP Address List.
      • End IP Address: If you want to specify a simple range of IP addresses to be added to the Untrusted IP Address List.
    3. Specify the Information Source (or vendor) of the untrusted IP address range.
  16. Click one of the following buttons, as required:

    The appropriate message is displayed.

    The changes are not yet active and are not available to your end users.

  17. To make the changes active, you must migrate them to production.

    See "Migrating to Production" for instructions to do so.