Overview
For a rogue AP with wireless containment status as Partial, an i icon appears adjacent to Partial state under the Containment column in the Threat 360 window. Hover your cursor over the i icon to view the current wireless containment status of the Rogue SSIDs.
You can create a list of allowed vendors. Vendors on this list are not marked as High threats.
You can add five vendors in a single workflow for a set of sites.
Procedure
| 1. | From the main menu, choose . You can also create a list of allowed vendors by clicking the menu icon and choosing . |
|
| 2. | In the Create Allowed Vendor List window, click Let's Do it. To skip this window in the future, check the Don't show this to me again check box. The Create Allowed Vendor List window opens. |
|
| 3. | From the Selection Criteria drop-down list, select a criterion (Exactly Matches or Contains) for the vendor name. |
|
| 4. | In the Vendor Name field, enter the vendor name. Vendor name matching is case sensitive. |
|
| 5. | Click Per workflow, you can add a maximum of five vendors to the allowed list. |
|
| 6. | In the Site Selection window, check the check box next to the site to which you want to apply your allowed vendor list. Site inheritance applies the vendor rule to all floors of a site. The rule maps to the area, site, or building level. |
|
| 7. | Click Next. |
|
| 8. | In the Summary window, view the details about the allowed vendor and site selection. |
|
| 9. | Click Done. The Allowed Vendor List Created window opens. |
|
| 10. | (Optional) To create another allowed vendor list, click Create New Allowed Vendor List and repeat Step 3 to Step 8. |
|
| 11. | (Optional) To view the created vendor lists, click View all allowed Lists. |