No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

S7700 and S9700 V200R011C10

This document describes the configurations of Security, including ACL, reflective ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring a Whitelist

Configuring a Whitelist

Context

A whitelist is a group of authorized users. The device forwards packets from users in the whitelist. You can apply an ACL to a whitelist.

NOTE:

If a blacklist and a whitelist reference the same ACL, the blacklist takes effect.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run cpu-defend policy policy-name

    The attack defense policy view is displayed.

  3. Run whitelist whitelist-id acl acl-number

    A whitelist is created.

    A maximum of eight whitelists can be configured in an attack defense policy on the device.

    The ACL applied to a whitelist can be a basic ACL, an advanced ACL, or a Layer 2 ACL. For details on how to create an ACL, see ACL Configuration.

    By default, no whitelist is configured on the device.

    NOTE:

    If an ACL applied to a whitelist contains a deny rule, packets matching the ACL are discarded.

    If packets match both a whitelist that references an ACL with a permit rule and a user-defined flow, the user-defined flow does not take effect for the packets. The device limits the rate of these packets using the CPCAR value configured for the corresponding protocol.

    If an ACL has no rule, the whitelist that references the ACL does not take effect.

Translation
Download
Updated: 2019-04-01

Document ID: EDOC1000178319

Views: 137364

Downloads: 78

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next