Managing the UDT White List
This chapter introduces the UDT White List and explains the process of managing the
list.
The White List enables you to tell UDT which endpoints on your network you consider
safe. Using that list UDT can report a list of endpoints on the network that you do not
consider safe, and these endpoints appear in the Rogue Devices resource.
The White List also enables you to tell UDT which endpoints on your network to
ignore altogether. Any endpoint that you want UDT to ignore becomes completely
invisible to all its resources.
Rules determine how the White List influences UDT's endpoint monitoring behavior.
By default UDT creates and enables three rules in the White List during software
installation: Any Hostname, Any IP Address, and Any MAC Address.
With default rules enabled, all endpoints connected to your monitored UDT devices
are placed on the UDT White List list; and as a result no endpoints appear on the list
in the Rogue Devices resource.
UDT treats an endpoint's MAC address, IP address, and hostname as separate
objects. Depending on white list inclusion rules, one or more of those objects could
possibly appear in the Rogue Devices resource at the same time.
See the following topics:
n
Enabling DNS Resolution for Wireless Nodes
n
Adding Endpoints to the White List
n
Removing Endpoints from the White List
n
Ignoring Endpoints in UDT
n
Deleting White List Rules
52