No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


CLI-based Configuration Guide - Security

AR100, AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R010

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the network management feature supported by the device.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


IP addresses in the whitelist will not be added to the blacklist statically or dynamically. An entry in the whitelist is represented by a source VPN and a source IP address, and must be manually configured.

If valid service packets sent from some devices are similar to IP sweeping attack or port scanning attack packets, you can add these devices to the whitelist so that packets sent from the devices will not be discarded by the firewall.

Functions of Whitelist

If you add the VPN or IP address of a host to the whitelist, the firewall does not check packets sent from the host for IP sweeping or port scanning attack, and does not add the IP address of the host to the blacklist.

Whitelist Features Supported by the Device

After receiving a packet, the device checks whether the packet is sent from an IP address in the whitelist. If the packet is sent from an IP address in the whitelist, the device does not check the packet for IP sweeping or port scanning attack, or add the IP address to the blacklist. However, the device still performs other security checks, such as ACL-based packet filtering, ASPF, and traffic statistics and monitoring, to ensure network security.

You can set an aging time for whitelist entries.

You can export whitelist entries to a file or import entries to a whitelist from a file.

Updated: 2019-08-07

Document ID: EDOC1100034077

Views: 126353

Downloads: 231

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next