Cisco Catalyst Center Rogue Management and aWIPS Application Quick Start Guide, Release 3.2.x

PDF

About the allowed vendor list

Want to summarize with AI?

Log in

Overview

Introduces the Allowed Vendor List feature, which enables you to reclassify threats from specific vendors as Potential or Informational rather than High. Explains that you can add up to five vendors per workflow and that site-specific vendor rules take precedence over inherited configurations.

The Allowed Vendor List feature lets you determine if APs from specific vendors trigger a specific threat level. You can create a list of allowed vendors, so that threats from these vendors are not marked as High threats. You can decide whether to mark them as Potential or Informational threats. In a given workflow, you can add up to five vendors to the allowed list.

An allowed vendor rule that is mapped at any level takes precedence over the inherited rule. For example, if allowed vendor rule A is mapped to a floor level, vendor rule A takes precedence over allowed vendor rule B that is present at the site, area, or building level.