Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
ahmedaburaihan
Explorer
Jump to solution

Best Practice to allow akamaitechnologies IPs/URLs

Hi Mates,

 

What are the preferred Methods or Best-Practices to allow CDNs such as Akamaitechnologies urls. 

For example:

A device connects to internet and the traffic is blocked, FW Logs show me an IP from Akamaitechnologies. 

How can I implement a security policy efficiently to allow all the blocked Traffic to destination Akamai?

 

 

Thank you & regards,

A.

0 Kudos
1 Solution

Accepted Solutions
PhoneBoy
Admin
Admin

We have an Updatable Object specifically for Akamai.
You add it like so:

image.png

image.png

View solution in original post

6 Replies
PhoneBoy
Admin
Admin

We have an Updatable Object specifically for Akamai.
You add it like so:

image.png

image.png

ahmedaburaihan
Explorer

Hey @PhoneBoy 

Thank you very much for speedy response. 

Although i used this object last time and it did not Whitelist all the Akamais, i would still like to implement this one more time
and will update you regarding this. 


Kind regards,

A.

0 Kudos
PhoneBoy
Admin
Admin

The information for all of our Updatable Objects come from the vendor themselves.
The gateways update these objects once an hour, I believe. 

the_rock
MVP Diamond
MVP Diamond

I know this is not the greatest idea, but I always add custom app group and add *akamai* into it and allow that.

Best,
Andy
"Have a great day and if its not, change it"
the_rock
MVP Diamond
MVP Diamond

Her eis what I was referring to.

Screenshot_1.png

Best,
Andy
"Have a great day and if its not, change it"
0 Kudos
the_rock
MVP Diamond
MVP Diamond

FWIW, here is what MS Copilot AI came up with.

*****************

 

Absolutely — but a quick heads‑up: there isn’t one single, static, “complete Akamai IP range list” for the entire Akamai edge network that’s practical to maintain in a firewall, because Akamai operates thousands of prefixes that can change over time. [bgp.he.net], [bigdatacloud.com]

So the right answer depends on what you’re trying to do:

Below I’m giving you (A) the stable Origin IP ACL CIDRs + (B) common Akamai edge FQDN patterns + (C) where to get full dynamic prefix lists.


A) Recommended: Akamai Origin IP ACL CIDRs (small/stable allowlist)

Akamai publishes a supported set of IP blocks specifically for Origin IP ACL (used to restrict who can reach your origin). [techdocs.akamai.com], [techdocs.akamai.com]

Currently supported (Origin IP ACL)

IPv4

 

2.16.0.0/13
23.0.0.0/12
23.192.0.0/11
23.32.0.0/11
95.100.0.0/15
184.24.0.0/13

 

[techdocs.akamai.com], [ipinfo.io], [ipinfo.io], [ipinfo.io], [ipinfo.io], [ipinfo.io]

IPv6

 

2a02:26f0::/32
2600:1400::/24
2405:9600::/32

 

[techdocs.akamai.com], [ipinfo.io], [bgp.tools], [networksdb.io]

⚠️ Important note about “removed” CIDRs (timeline)

Akamai also lists older ACL CIDRs that were removed and notes that as of July 1, 2025 they would be reallocated to other Akamai services (so you should not rely on them for Origin IP ACL). [techdocs.akamai.com]

(If you want, I can paste that “removed list” too — it’s long, but it’s on that same Akamai page and includes items like 104.64.0.0/10, 172.224.0.0/12, etc.) [techdocs.akamai.com], [ipinfo.io], [ipinfo.io]

Where to keep it updated (best practice)

That Akamai Origin IP ACL page provides direct downloads (.txt/.csv) and says changes are announced via Akamai’s Firewall Rules Notification tool. [techdocs.akamai.com]


B) Common Akamai FQDNs / domains you will see (edge hostnames & services)

1) Akamai edge hostname suffixes (most common)

When traffic is onboarded to Akamai, your customer hostname usually CNAMEs to an Akamai “edge hostname” that ends in one of these domains: [techdocs.akamai.com], [registry.t…rraform.io]

Akamai explicitly documents these suffixes in Property Manager/hostnames guidance, and the Akamai Terraform provider docs repeat the same mapping. [techdocs.akamai.com], [registry.t…rraform.io]

Note: edgesuite.net is widely recognized as an Akamai CDN-associated domain and appears on many well-known hostnames. [netify.ai]

2) Reverse DNS / infrastructure-style hostnames (seen in logs)

You may also see Akamai-controlled reverse DNS like:

Example hostnames from Akamai IP space show this pattern. [lookip.net], [abuseipdb.com]

3) If you use Akamai SIA/ETP / Zero Trust (product-specific)

If your goal is firewall allowlisting for Akamai Secure Internet Access (SIA) / ETP / Zero Trust, Akamai provides a separate list of required domains such as:

  • *.akaetp.net
  • *.dialin.go.akamai-access.com
  • and specific clock-*.akamai.com hosts (NTP-related) [techdocs.akamai.com]

(These are not the same thing as CDN edge hostnames; they’re for Akamai security products.) [techdocs.akamai.com]


C) If you truly need “all Akamai IP ranges” (dynamic / large)

If your use case is broad classification or blocking/allowing “Akamai” at scale, the normal method is:

1) Track Akamai by ASN(s)

Two primary Akamai ASNs commonly used for edge delivery are:

AS16625 alone originates ~3,030 IPv4 prefixes (order of magnitude), so enumerating “all IPs” is not firewall-friendly. [bgp.he.net], [bigdatacloud.com]

2) Pull current prefixes from BGP sources

Good public sources for up-to-date prefix lists include:

(If you tell me your preferred format—CIDR text, JSON, etc.—I can point you to the best export source for your workflow.)


 

Best,
Andy
"Have a great day and if its not, change it"
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events