This section describes how to configure a whitelist. Secure packets that match ACL rules can be added to the whitelist and then provided with higher bandwidth.
The ACL bound to the whitelist must be a configured one. You cannot bind a non-existing ACL to the whitelist. When the ACL is bound to the whitelist, all the packets that match the ACL rules are added to the whitelist automatically. The whitelist function must be enabled. Otherwise, the self-defined whitelist does not take effect although you can configure a self-defined whitelist.
The system view is displayed.
The attack defense policy view is displayed.
The whitelist is configured.
The packets generated by Active Link Protection (ALP) is dynamically added to the whitelist.
A self-defined whitelist can be bound to only one ACL. If you bind a self-defined whitelist to several ACLs, only the latest configuration takes effect. An address or port pool can be specified in an ACL rule, and the ACL rule can be delivered.
Some IPv6 packets to be sent to the CPU are matched against the ACL that contains a blacklist, whitelist, or user-defined flow.
The address pool function is enabled for an attack defense policy.
Before enabling the address pool function for an attack defense policy, configure an address pool and bind the address pool to an ACL rule.
The VPN field in the attack defense policy is configured to take effect.
Enable IPv4 MFIB-MISS packets to match against ACLs in the blacklist, whitelist, or user-defined flow.
Enable DHCP-DISCOVER packets to match against ACLs in the blacklist, whitelist, or user-defined flow.
The configuration is committed.