By default, a device calculates the rates of protocol packets received by all interfaces, and traces the source as well as limits the rate of attack packets. Sometimes, network-side interfaces need to receive a lot of valid protocol packets. You should add these interfaces or network nodes that connect to these interfaces to the whitelist. The device does not trace the source or limit the rate of protocol packets received by the interfaces in the whitelist.
The system view is displayed.
The attack defense policy view is displayed.
The whitelist is configured.
A maximum of 16 whitelists can be configured on the device.
The ACL referenced by a whitelist can be a basic ACL, an advanced ACL, or a Layer 2 ACL. For details about ACL configuration, see ACL Configuration.
For the preceding conditions, the switch supports a maximum of 16 whitelist matching rules based on source IP addresses and interfaces.
All the packets matching an ACL referenced by a whitelist are considered to be valid packets regardless of whether the ACL rule is permit or deny.
If an ACL has no rule, the whitelist that references the ACL does not take effect.