Overview
test
This procedure shows how to move rogue AP MAC addresses to the allowed list in bulk. You do not want to report these addresses as high threat in Catalyst Center.
Before you begin
To perform this procedure, you must have SUPER-ADMIN-ROLE or NETWORK-ADMIN-ROLE permissions.
Procedure
| 1. | From the main menu, choose . The Set up Rogue Management and aWIPS window opens. |
|
| 2. | Click Let's Do it. To skip this step in the future, check the Don't show this to me again check box. The Bulk upload allowed access points window opens. |
|
| 3. | Using the Search field, search for the MAC addresses that were already added in the About the allowed list workflow. |
|
| 4. | Click Export to export the allowed list. |
|
| 5. | Click the Download the sample CSV template from here link to download the sample file. Manually add the MAC address, operation, and category to the bulk allowed list template. Hover your cursor over the notification symbol to view the format of allowed MAC addresses, operations, and categories. |
|
| 6. | Either drag and drop the CSV file into the boxed area or click Choose a file and browse to the CSV file on your system. The maximum size of the CSV file should be 1.2 MB.
|
|
| 7. | Click Next. |
|
| 8. | In the Summary window, the Uploaded bulk allowed list MAC addresses table displays the list of allowed MAC addresses in bulk, and the respective operation and action:
|
|
| 9. | Click Continue to allowed list, and, in the dialog box that opens, click Yes. The Done! Allowed List Updated window opens. |
|
| 10. | Click Go to Rogue and aWIPS Home Page. The Rogue and aWIPS dashboard opens. Click the Threats tab to display the Threat table. Catalyst Center now categorizes the specified rogue AP MAC addresses as Allowed List under the Type column. |
|
| 11. | To add or delete a rogue AP MAC address individually, click the rogue MAC address listed under the Threat MAC address column. The Threat 360 window opens. |
|
| 12. | From the Action drop-down list, select Add to Allowed list. To remove a rogue AP MAC address from the allowed list individually, from the Action drop-down list, select Remove from Allowed list. |