You can configure an ECA whitelist to directly forward trusted service traffic on the network without being identified. You can flexibly configure different ECA whitelists using different ACLs.
The system view is displayed.
A specified ACL is added to the ECA whitelist.
By default, no ECA whitelist is configured on a device, and all service traffic is identified after the ECA function is enabled.
An ECA whitelist is configured using advanced ACLs, and only the 5-tuple information (source IP address, destination IP address, source port, destination port, and protocol type) is supported.
When the ECA whitelist is configured, a maximum of 32 ACL rules with small rule numbers take effect.