About aWIPS Profiles
aWIPS profile configuration allows you to select the required signatures, configure the threshold values used in the detection of aWIPS denial of service (DoS) attacks, and enable forensic capture at the signature level. Threshold configuration helps to adjust the number of alarms that are generated for a specific duration for each aWIPS signature.
The following table shows the supported devices for aWIPS profile configuration for various versions of Catalyst Center:
Supported Devices |
IOS-XE Version |
Catalyst Center Version |
---|---|---|
|
17.4 to 17.13 |
2.3.7.4 |
17.4 to 17.14 |
2.3.7.5 |
|
17.4 to 17.15 |
2.3.7.6 |
|
17.4 to 17.15 |
2.3.7.7 |
![]() Note |
For SD-Access use cases only, you must enable the wireless module on Cisco Catalyst 9300 Series Switches, Cisco Catalyst 9400 Series Switches, and Cisco Catalyst 9500 Series Switches for aWIPS profiles to work. |
Prerequisites for aWIPS Profile
-
Verify the network connectivity between the Cisco Wireless Controller and Catalyst Center.
-
Make sure that the network device is reachable from Catalyst Center and has downloaded the aWIPS profile configuration from Catalyst Center.
-
For forensic capture to take place make sure that there is network connectivity between APs and Catalyst Center.
-
For forensic capture to take place make sure that the Google Protocol RPC (gRPC) tunnel interface has been established between APs and Catalyst Center. Use the show ap icap connection command to make sure that the status is READY.
-
For forensic capture to take place the required ports must be opened between Catalyst Center and network device links.
-
For forensic capture to take place there should be no time lag between Catalyst Center and access points. To achieve this, include NTP server configuration on AP. For more information, see Configuring an AP profile (GUI) in Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x.