Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
Enforcing Allow List for a Policy
To enforce and apply Allow List rules for a policy, complete the following steps:
- In the WebUI, select one of the following options:
- To configure a Branch Gateway group, complete the following steps:
- Set the filter to a group containing at least one Branch Gateway.
The dashboard context for a group is displayed. - Click .
- Click the Branch Gateway group configuration dashboard. icon to view the
- Set the filter to a group containing at least one Branch Gateway.
- To configure a Branch Gateway, complete the following steps:
- Set the filter to Branch Gateway. or a group containing at least one
- Under
A list of gateways is displayed in the List view. , click > . - Click a gateway under
The dashboard context for the gateway is displayed. .
The HPE Aruba Networking gateway (independent or part of a group) that you want to configure must support Gateway IDS/IPS.
- To configure a Branch Gateway group, complete the following steps:
- Under , click > .
- Click the icon to open the configuration page.
- Click the
A consolidated list of policies is displayed in the Policies table with the following details:
Table 1: Policies Panel
Data Pane Content
Description
Name
Displays the name of the policy.
State
Displays the policy state. Enable the toggle to activate a policy. You can enable one policy at a time. Enabling a new policy will disable the currently enabled policy. A policy takes few minutes to enforce.
Mode
Displays the mode of the policy:
IDS Intrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network.: Signifies Intrusion Detection System.
IPS Intrusion Prevention System. The IPS monitors a network for malicious activities such as security threats or policy violations. The main function of an IPS is to identify suspicious activity, log the information, attempt to block the activity, and report it. : Signifies Intrusion Prevention System.
User Profile
Displays the sensitivity of the user profile on which the policy is based.
Security Strategy
Displays the security level of the policy.
Action
The action taken to handle the threat.
tab.