Step 2
Click All, and all source hosts IP/MAC are allowed to access all the device ports.
Click Allowlist, and only source hosts whose IP/MAC are in the following list are allowed to
access corresponding ports of the device, and then click Add to add hosts to allowlist.
Click Not in Allowlist, and the listed corresponding source host of IP addresses/MAC is
prohibited from visiting the corresponding ports of the device by network connection, and
then click Add to add hosts to not in allowlist.
Step 3
Click Apply.
6.3.2 Configuring Anti-DoS Attack
Step 1
Select Security > Attack Defense > Anti-DoS Attack.
Step 2
Click
Step 3
Click Save.
Figure 6-5 Add to allowlist
Figure 6-6 Add to not in allowlist
to enable different defense functions as needed.
28