Cisco Cisco Packet Data Gateway (PDG)

Pagina di 1630
crypto whitelist file
Configures a whitelist (access permitted) file to be used by a Wireless Security Gateway (WSG).
Product
All products supporting IPSec whitelisting
This command appears in the CLI for this release. However, it has not been qualified for use with any
current Cisco StarOS gateway products.
Important
Privilege
Security Administrator
Command Modes
Exec > Global Configuration
configure
Entering the above command sequence results in the following prompt:
[local]
host_name
(config)#
Syntax Description
crypto whitelist file pathname [ -noconfirm ]
no crypto whitelist file
no
Removes the blacklist file from the system.
pathname
Specifies the location of the whitelist file as:
• [ file: ]{/flash|/usb1|/hd-raid}[/directory]/<filename>
• tftp://{host[:port#]}[/directory]/<filename>
• [ ftp: | sftp: ]//[username[:password]@] {host}[:port#][/directory]/<filename>
• http://[<username>[:<password>]@]<host>[:<port>][/<directory>]/<filename>
Usage Guidelines
Use this command to configure the location of the white file to be used by a WSG.
A whitelist is a list or register of entities that are being provided a particular privilege, service, mobility, access
or recognition. With whitelisting, no peer is allowed to connect unless it appears in the list.
Command Line Interface Reference, Modes G - H, StarOS Release 19    
199
Global Configuration Mode Commands (A-K)
crypto whitelist file