The wids-whitelist-profile command creates a WIDS whitelist profile and displays the WIDS whitelist profile view.
The undo wids-whitelist-profile command deletes a WIDS whitelist profile.
By default, the system provides the WIDS whitelist profile default.
wids-whitelist-profile name profile-name
undo wids-whitelist-profile { name profile-name | all }
Parameter |
Description |
Value |
---|---|---|
name profile-name |
Specifies the name of a WIDS whitelist profile. |
The value is a string of 1 to 35 case-insensitive characters. It does not contain question marks (?) or spaces, and cannot start or end with double quotation marks (" "). |
all |
Deletes all WIDS whitelist profiles. |
The default WIDS whitelist profile default can be modified but cannot be deleted. |
Usage Scenario
After WIDS/WIPS is enabled, rogue APs can be detected and countered. However, there may be APs of other vendors or on other networks working in the existing signal coverage areas. If these APs are countered, their services will be affected. To prevent this situation, configure an authorized AP list, including an authorized MAC address list, OUI list, and SSID list. If an unauthorized AP is detected but matches the authorized AP list, the AP is considered an authorized AP and will not be countered. After you create a WIDS whitelist profile using the wids-whitelist-profile command, run the permit-ap command to configure an authorized AP list.
Follow-up Procedure
Run the wids-whitelist-profile (WIDS profile view) command to bind the WIDS whitelist profile to a WIDS profile so that the WIDS whitelist profile can take effect.