Details
Description
There are tons of situations where it is desirable to allow only specified source addresses (and ranges) rather than allowing all except for those specified (i.e. blacklisted). To require administrators to use a black list when the situation really demands a white list is to encourage security lapses.