You can use CLI-suite to use Network Access Control Lists (Network ACL) to block and unblock IP-addresses or IP-ranges.
Network ACL are one of multiple security measures applied to your infrastructure. They control traffic flow on network layer and allow the application of restrictions to this traffic. Overall there are multiple Network ACLs for each environment. However the one of most concern is the one controlling the traffic flow from the Internet to the infrastructure. This also, is the only one you are allowed to make changes to e.g. by blocking or unblocking IPs or IP-Ranges.
r3 net list shows the whole Network ACL for the public network segment of your infrastructure
The overview includes
the name/identifier of the ACL
a number assigned to the respective entry in the ACL (order is important to evalute deny before allow actions)
the column Ingress describes the direction of the traffic flow. Ingress=True describes a rule is applied to incomming traffic, whilst the opposite indicates rules for traffic leaving your infrastructure
CIDRBlock is the actual IP or IP range of consideration
PortRange specifies the port or port range the rule applies to
The RuleAction specifies how to handle the traffic e.g. deny it or allow it
This examples shows:
the default rule set for the Network ACL root360 GmbH is rolling out
4 block rules (RuleAction = deny, RuleNumbers 996-999) for 2 separate IPs covering incomming traffic for all ports. Thus these rules block HTTP and HTTPS requests for the given IPs including all other connections.