Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


blacklist.ini File


The blacklist.ini configuration file enables and configures blacklist settings. Only one profile can be created for the purposes of blacklisting, and any login attempt that matches that profile is blocked. An authentication request matches the blacklist profile if the attributes in the request match the check list attributes of the profile. The profile can contain multiple attributes, and if any of the attributes match those of the profile, the attempt is rejected.

The blacklist.ini file contains one configuration section called [Settings] (Table 52), which has the following settings:

Table 52: blacklist.ini Syntax




  • If set to 1, blacklisting is enabled.

  • If set to 0, blacklisting is disabled.

Default value is 0.


  • If set to 1, blacklisting is configured to include proxy requests, meaning that it is applied to all authentication requests.

  • If set to 0, blacklisting is configured only to local authentication requests.

Default value is 0.


Specifies the name of the blacklist profile in the Steel-Belted Radius Carrier database.

The following example enables the blacklist feature and specifies Steel-Belted Radius Carrier use the BlockedNumbers profile to filter authentication requests.

The BlockedNumbers profile called by this blacklist.ini file specifies check list attributes Steel-Belted Radius Carrier uses to reject authentication requests. The following entries in the BlockedNumbers profile identify Calling-Station-Id phone numbers used by rogue users you want to block.