So now that UDT has this White list feature, how should it be used? How is it different from the Watch list? What are the use cases for both?
It looks like a hostname, MAC, or IP can be on the Rogue list (i.e. not on the White list), but may or may not be on the Watch list. Is that correct?
Comments? Thanks you.h