EndPoint Whitelist

In ISE v1.1.1, is it possible to create a whitelist of endpoints just for a specific WLAN SSID - i.e. a whitelist that can be associated wih only one SSID?
Many thanks.
Sankung

WIRELESS:
Simply means brining a new device onto the network for the first time. On-boarding can be designed many ways however for this post we will use two SSIDs called Provisioning_Wireless for new devices and Employee_Wireless for existing approved devices.  An accesslist limiting access to ISE, DHCP and DNS will be enabled to prevent devices from staying on the provisioning SSID. 
Go to WLANs > Create New > Go and fill out the profile details. Use NONE for the layer 2 settings so it’s OPEN. For AAA, set the Radius server for ISE. Under advanced, enabled Allow AAA Override and change the NAC state to Radius NAC. Go to Controller > General > Fast SSID change and enabled Fast SSID to help speed up the SSID changing.
i- Join the ISE to an AD system. ii- Define the certificate authentication profile
iii- Define an Identity Source Sequence iv- Configure ISE to act as a Simple Certificate Enrollment proxy server
For this scenario, Configure ISE authentication to use MAB for on-boarding new devices. 
In many cases, ISE will not know the MAC addresses in advance so it must be configured to continue the authentication process via redirection regardless.
This is done in ISE:
Policy > Authentication, choose your MAB wireless policy, click the carrot after allow protocols to show the user options and click the + sign for use.
Select IF USERS NOT FOUND, CONTINUE. As a reminder, ISE Authentication policies are verified top down so make sure your MAB policy used for BYOD is at the top and open for all identity stores. You should lock down the 802.1x wireless to only wireless certificates.
Note: Client provisioning is based on how ISE classifies the client machine. There are customized packages in ISE available that include a software-provisioning wizard, which configures 802.1x settings and ability to obtain digital certificates on the endpoint.
To download wizard packages in ISE
Policy Elements > Results > Client Provisioning > Resources > Add. Common mobile devices such as iOS typically have these settings enabled natively so a wizard is not needed.
To configure client provisioning in ISE:
Policy Elements > Results > Client Provisioning > Resources > Add.
Create a native suppliant profile by giving it a name, selecting the Wireless Checkbox, your on-boarding SSID, WPA2 for security, TLS for allow protocols and key size 2048.
Policy > Client > Provisioning to build your provisioning resources. Create one for native devices and select the mobile profile you just created for the results (example RULE = IOS, Identiy Group = Any, Operating systems MAC IOS ALL and your new mobile profile for results).
Create another that is similar however use Android for the operating systems. Create a third for generic MacOsX devices and use the downloaded wizard. You may also want to create a separate one for Wired and Wireless. The same goes for two more to cover wireless and wired Windows devices. Here is an example of my Client Polices
The final steps are verifying profiling for wireless is working as well as your authorization profiles are setup for redirection, employee and guest access (see previous postings for these configs). These can vary depending on how you want to restrict devices that pass and fail your polices.
For Complete Guide Please visit
http://www.thesecurityblogger.com/?tag=ise-advance-license
Video Link for Configuration of BYOD
http://www.labminutes.com/sec0054_ise_1_1_byod_wireless_onboarding_dual_ssid_testing

Similar Messages

  • Adobe Exchange Panel has a virus...according to symantec endpoint.

    I was trying to down load adobe excange panel from the adobe application Manager and this is what I got in return: 1. A high risk notification from the symantec endpoint cloud scanner. and then the email below. I tried to notify your company directly but found nobody reachable. But thought you would like to Know your program seemed compromised or your platform is being used install a virus some how. Or norton is reporting an innocent act by you wrongly.
    what ever the case is:
    Here is a copy of the e-mail I got from symatec.
    From symantec:
    High-Risk Incident Detected
    Symantec.cloud Alerts [[email protected]] ([email protected])
    Add to contacts
    1:02 AM
    To: [email protected]
    From:
    Symantec.cloud Alerts [[email protected]] ([email protected])
    Sent:
    Sat 3/23/13 1:02 AM
    To:
    [email protected]
    Parts of this message have been blocked for your safety.
    Show content|I trust [email protected] Always show content.
    A high-risk incident was detected on system  on 3/23/2013 12:57:55 AM Central Standard Time.
    Threat Name
    Suspicious.Cloud.7.F
    Threat Type
    Heuristic Virus
    File Name
    c:\program files (x86)\common files\adobe\installers\adobetemp\{41a12ffc-89e9-4743-a51e-00975ca31f40}\_451_c7fde7339cd2 ec874e182b441a0d7786
    Action Required
    Resolved - No Action Required
    Contact method: Default Email Contact Method.
    Click here to change your contact method.
    Ref# 400039
    Copyright © 2013 Symantec Corporation. All Rights Reserved.
    This email has been scanned by the Symantec Email Security.cloud service.
    For more information please visit http://www.symanteccloud.com

    Hi,
    I am Chetan Savade from Symantec Technical Support team.
    If you think it's a false positive alert then pleae get in touch with application vendor to ge white list it.
    Software White-Listing Request can be submit here.
    submit.symantec.com/whitelist
    Check this Symante Blog as well: www-secure.symantec.com/.../software-white-listing-program
    Meanwhile if possible you can also add the centralized exception.
    www.symantec.com/.../TECH104326
    Go throught the follwoing helpful articles:
    Handling and preventing SONAR false positive detections
    www.symantec.com/.../index...
    Monitoring SONAR detection results to check for false positives
    www.symantec.com/.../index...
    Regards,
    Chetan Savade

  • ZMM 2.5 Policy Suite, Application Control, Whitelisting

    Reference: Novell Documentation: ZENworks Mobile Management - Table of Contents
    The ZMM manuals are not quite clear what they mean by "Whitelisting" under the Policy Suite, Application Control sections. I'm assuming ZMM application "whitelisting" means that only listed apps can run or at least only listed apps can be installed and run. Is assumption correct? Has anyone done this successfully on Android devices with the ZMM agent an enrolled Touchdown? If so, could you provide details on how it was done? Ideally we'd like to take an inventory list of a working device set of applications, add them to the whitelist, and force the user to come to the administrator for new applications, regardless of their google play/alternative market access.
    Thoughts?
    Kevin

    Originally Posted by nop1983
    salisburyk wrote:
    >
    > Reference:
    > 'SureLock for Android | Kiosk Mode Lockdown for Tablets, Smartphones &
    > Rugged Devices' (SureLock for Android | Kiosk Mode Lockdown for Tablets, Smartphones & Rugged Devices)
    >
    > Bryce,
    >
    > Another very interesting product is SureLock for Android - we are
    > testing it to see how it compliments Novell ZMM...
    >
    > Kevin
    This looks like a Endpoint security product for Android, right?
    Niels
    Hi Niels,
    Did you happen see the link? No, the SureLock product allows Application Control/Application whitelisting right on the android device with full administrator control. We wrongly thought ZMM could whitelist Android apps (shame on us - we neglected to test that before we purchased. Lessons learned - give yourself time to test everything in your requirements list prior to purchase). Our initial testing of SureLock went very smoothly, it does not interfere with the ZMM agent or Touchdown. The users see only what you want them to see - apparently even without root access on the android device. We are now using it in conjunction with ZMM on our Mobile devices. There are others that offer similar functionality in conjunction with ZMM - take a look at Clutch Mobile App Protector Pro that is coming soon for iOS as well ( https://www.clutchmobile.com/products/appprotector ). We do not have iOS, so SureLock is fine for our needs in conjunction with ZMM...
    Kevin

  • Error while testing the endpoints in Service Registry

    Hi,
    I am getting the following error while testing the endpoint in the Service Registry
    Invalid Response Code: (404) Not Found. The request URL was:"http://<server>:8000/sap/bc/srt/wsdl/bndg_DD73518A3AD471F18558001D0910D3CA/wsdl11/binding/ws_policy/document?sap-client=800". Check, whether the URL is correct, and the Web Service that you are requesting is up and running.
    I have created an Enterprise Service at the backend and have published to the Service Registry of the CE server , but while testing the endpoint in service registry i am getting error.
    Can any one please help me to solve this issue.
    Thanks & Regards,
    Hamsa Shree

    Hi hamsa,
    Have you tested the service? If It works, maybe there's something wrong with your destination configuration.
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/705459a3-bf1c-2b10-8a9d-d300ada5f0fc
    You may find a solution in the above article.
    Good luck!
    Wenhao

  • ISE 1.2 Patch 8 - Endpoints in GUI missing

    I have a customer were we did a upgrade from patch 2 -> patch 8 the other day.
    Now Endpoints and Endpoint Identity Groups are missing from GUI. MAB is still working so Its probably only GUI related.
    This is for both AD users and the admin user.
    We also tried to create an new user with new access and menu policies to force/jump start access to the GUI but with no luck.
    Anyone seen this?

    can you confirm , if you are able to see 'endpoints/ endpoint groups " in the conditions while creating authorization profiles?

  • How difficult would it be to implement an iMessage whitelist..?

    iMessage spam is a really big problem to me and my family members.  And getting worse by the week.
    Blocking individual senders is ludicrously ineffective and Apple seems to be reluctant to allow us to block entire domains (which would really help).
    So how difficult would it be to implement a whitelist?  (For example... I don't want any iMessages from anybody not in my Contacts list!)
    I'm really close to disabling iMessage altogether.  It is barely worth the effort now.

    The difficulty and time to do it depends on the learning
    capability of the new programmer. Patience and a drive to learn is
    what all is needed. Accomplishing one step at a time is probably
    the best approach, whether you're new or well-versed.

  • How to change a Logical Port URL-Destination/Endpoint at Runtime

    Hi,
    i am looking for a way to change the endpoint for a webservice-call without redeploying my application. (I am using a standalone-proxy).
    In the SAP-Help from NetWeaver 2004s I found the following hint:
    http://help.sap.com/saphelp_nw04/helpdata/en/9f/c487d701c7214db8ca7a741ba3c9d0/frameset.htm
    Configuring Logical Ports:
    Logical ports (LPs) contain the configuration of the client-side SOAP runtime, such as the access URL or security settings. These are required if Web service calls are executed using proxies.
    The Web service port is part of the WSDL description. This defines a URL where the service is to be called. As a rule, this URL is generated directly into the proxy object. However, this can cause problems whenever the proxy is transported into a system landscape (for example, from the test system into the productive system). In this case, the proxy would still attempt to call the Web service on the test server although the proxy should point to the productive system. The proxy could be re-generated or the coding could be changed manually. Due to the risk of errors with this method, the configuration data in the SAP Web Service Framework is separated from the implementation. After transport or re-deployment of the proxy, the URL and other important parameters can be adapted using a simple editor. 
    The LPs provided correspond to the Web service configurations created for the Web service.
    My Question:
    Where can I change the URL of the corresponding logical port at runtime?
    I don't want to redeploy my application !!!
    I want to change the endpoint-destination at runtime!!!
    In the Visual Administrator I can see the webservice in the "Web Services Container Service Administration". I also can see the different ports from the WebService-Configuration I made.
    http://help.sap.com/saphelp_nw04/helpdata/en/9f/c487d701c7214db8ca7a741ba3c9d0/frameset.htm
    But it is not possible to change the "target adresses"!
    Can anybody help me finding a solution concerning my question?
    Regards
    Steffen

    You can include below method in your code and call it.
    private void UpdateConfig(string key, string value, string fileName)
    var cFile = ConfigurationManager.OpenExeConfiguration(fileName);
    cFile.AppSettings.Settings[key].Value = value;
    cFile.Save();
    Here fileName is the full path + application name (eg: c:\project\WinApp.exe)
    Adnan Amin MCT, SharePoint Architect | If you find this post useful kindly please mark it as an answer :)

  • No video stream when calling 3rd party endpoint from Jabber client

    I use my own H323 client based on the H323Plus open source. It works very well with VCS and all endpoints we tried (a dozen or so from every vendor). We have a problem with Jabber Video though, across all versions from MOVI to 4.4.3. When my own client calls Jabber everything works as it should. However, when Jabber calls my client then (1) it takes up to a minute for Jabber to display incoming video and (2) Jabber does not create outgoing video stream. This behavior is 100%  reproducible across all PCs we tried. Jabber is registered with either VCS Starter Pack or VCS Control, sofwtare version 6.1 in both cases. We do not use provisioning at this time.
    In Jabber logs there is a unclear hint about insufficient resources (bandwidth?) for the video stream. VCS configuration is fine (it works with all other clients like e20) and I do not see anything useful in VCS logs.
    To narrow the discussion, this is NOT a firewall, client camera or driver, OS misconfiguration or any other external issue. It is Jabber video having problem negotiating capabilities and/or resources but only it initiates the call. Where should I look for a solution?

    I was afraid this will end this way. I hoped you might have had such a case solved already :-).
    Audio works fine, no problem at all. The video packets are not sent from my client to Jabber while in the 1 minute wait; the stream from Jabber  is not even started. I still think I need Wireshark to decode H225 traffic. Good idea with the interworking log - I was too lazy to go the OS layer. As you surely know, only 2 of the VCS logs are available from the Web interface.
    thanks for your help!

  • Ironport Whitelist and related questions

    Hi all,
    I have recently started at a new position for a company that is utilising ironport as the email spam filtering/virus checking appliance.
    Almost immediately after starting in my position issues were being discussed, where the senderbase reputation scoring was marking a sister companies mail as spam - obviously due to a bad reputation.
    It was important that these mails were delivered and the obvious answer seemed to be to whitelist the domains, which was implemented by another support person. After the whitelist setting was applied though the mails were still be rejected due to being suspected spam - there is no quarantine setup.
    Today I logged into the boxes to see if I could syslog the mail logs to a seperate linux server and suddenly got wrapped up in this problem. I had a look and could see the domains in the whitelist section within the HAT, after doing some reading I can confirm the whitelist section was ordered as being number 1 in the list and by looking further it looks like the whitelist domains were via the 'add to sender group' button within the monitoring overview screens (this is assumed as both .sistercompany.com and sistercompany.com were appended to the whitelist).
    After a few hours of reading up I couldn't understand why the whitelist wasn't working, I even did a lookup of the domain in the monitoring overview search section for mail recieved by sistercompany.com and could see that it belonged in the whitelist group. I got further confused when reading the help and support guide - it had screenshots that looked very similar to our setup [within the HAT overview and Mail Policies], however it had an sbrs for the whitelist set between 6 and 10, where as that was blank on our system, nowhere in the document would it describe why this sbrs value was set. Bearing in mind I have only had a few hours of experience with this product, so these maybe silly questions but:
    Why would you add an sbrs value to the whitelist - I would have thought whitelists would ignore any score presented.
    If number 1 has nothing to do with why these domains were still being flagged as spam, has anyone got any suggestions as to what the issue maybe?
    For a small bit of information we have the C660 appliances installed.
    Any help would be much appreciated

    I'm taking a wild guess here since there are a lot of missing details. Forgive me if I'm covering ground you've already trod.
    Remember that the HAT controls how incoming SMTP connections are handled, so entries in the HAT must correspond to the remote SMTP servers that are connecting to you. You don't put the "domain" part of "user@domain" in the HAT ("sistercompany.com" in your case), you put in the the domain names of the actual remote SMTP servers or a wildcard that matches them all. In your case, this might be ".sistercompay.com" (note the leading "." indicating that this will match any domain name ending with ".sistercompany.com"), but only if their SMTP servers have host names in that domain.
    Whitlisting by domain name requires that the IP addresses of those remote SMTP servers have correct rDNS. If they don't, you'll have to list them in the HAT by IP address. FYI, we never put anything in the HAT by IP address unless it is unavoidable. Using domain names and requiring correct rDNS forces good DNS hygiene, and also provides a layer of abstraction. The server's address can change, but so long as the DNS is kept up to date we don't have to change our HAT entries.
    You can see from the mail logs what sender group is being applied on each SMTP connection. Find one of the rejected messages in the log and see what sender group its connection landed in. If it didn't land in the whitelist (which will almost certainly be the case, given that the message was not in fact whitelisted), then you know the HAT entry is wrong. You can also use the log to determine the actual domain name of the remote server, assuming the rDNS for its IP address is correct.
    The example screenshot in the manual showing SBRS between 6 and 10 being whitelisted is demonstrating that you can whitelist by SBRS as well as by explicit listing in the sender group. Your whitelist simply isn't doing this, which is fine. In this age of rampant spamming from stolen accounts on reputable servers, whitelisting by SBRS can let spam in. We raised the lower limit from 6 to 8 several years ago after getting hit in this exact way.
    ++Don

  • BPEL - Handling invocation timeouts and Modifying Partner Link endpoints

    Hi,
    We've built the basic functionality that we need in our BPEL process but are facing 2 specific questions that we are a bit stuck with and would really appreciate some help on..
    1. Our BPEL process calls an external synchronous web service. We have a requirement that if this external web service is unable to respond to our BPEL process within a fixed timespan (say 1 minute), we need to treat this as a timeout and move on. Can anyone suggest what settings are required for this?
    2. The second query is with regards to a likely situation we will face after go-live. If the URL of the external service changes (lets say the service moves from one server to another), ideally we would want to be able to configure this URL change rather than have to modify the WSDL and rebuild the BPEL project in JDev with the new WSDL. Does the BPEL Admin Console provide any such feature? As far as I can recall from a project a couple of years ago, Websphere Process Server did provide such a feature and I'm looking for something similar here but have not found it yet. I am not looking to use dynamic endpoints within our flow - just for an admin feature that would allow me to modify the URL externally via the console.
    Would really appreciate any suggestions on these 2 points..
    Thanks and Regards,
    TB

    In response to your second query -
    a) you don't need to rebuild the BPEL project in Jdev in order to change the wsdl file. If you update the WSDL file with new values for your endpoint simply clear the WSDL cache and the process will pick up the new values in the new instances created from thereon.
    b) or if you dont' want to update the wsdl manually, you can write a piece of java code to change the endpoint URL's for the deployed BPEL processes using the code given here
    hth

  • How do I set up a multipoint TP with Jabber as 1 endpoint?

          I'm trying to set up a multipoint TP where I'll be one of the endpoints - how do I do this?  I tried to set up a scheduled video bridge to get a manual bridge that I can dial into, but it's asking for at least 1 Tandberg endpoint, which I don't have.    I'd seen another thread with a similar question - how to dial into a scheduled TP session from Jabber video - & the answer was that they needed a short document - is that document with instructions now available?
    Thanks in advance.
    Amber       

    Today the jabber.com video addresses do not support multipoint. We are using an external bridge service for these type of calls. The one that seems to work the best for us has been Blue Jeans (http://bluejeans.com/). They recently added SIP URI support so jabber.com clients can connect. This can get expensive when done on an ad-hoc (pay-as-you-go basis) so we only use it when >4 participants are needed. Usually we just multipoint our jabber.com clients in a room based system via VCS. This, of course, assumes you have VCS and a multipoint license on a room based system.

  • How to configure service endpoints of custom webservice in SharePoint 2013?

    Hi,
    I have created a custom webservice in SharePoint 2013. I placed it in a sub folder under the ISAPI folder. I followed the instructions of this article: http://msdn.microsoft.com/en-us/library/office/ff521581(v=office.14).aspx. The webservice works
    great, however when I try to send a large file I get the message "413 Request entity is too large".
    After some searching I found out that you can create a web.config in the subfolder and define the endpoints and bindings, after which I get an error that there is already an endpoint defined for the specified URI. I believe this has something to do with
    the BasicHttpBindingServiceMetadataExchangeEndpointAttribute but I'm not sure.
    Can anyone help me solve this issue?
    Regards,
    Sander

    Hi,
    According to your post, my understanding is that you want to configure service endpoints of custom webservice in SharePoint 2013.
    Per my knowleadge, after you add a reference to Microsoft.SharePoint.Client.ServerRuntime, you can use the BasicHttpBindingServiceMetadataExchangeEndpointAttribute.
    In VS  go to the add reference and paste the following: C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.Client.ServerRuntime.
    In addition, please make sure you create the custom web service correctly.
    For more information, you can refer to:
    SharePoint 2013: Create a Custom WCF REST Service Hosted in SharePoint and Deployed
    in a WSP
    How to create Custom Web Service WCF (REST) in SharePoint 2013
      Adding custom WCF services to a SharePoint 2013 farm solution using Visual Studio 2012
    "BasicHttpBindingServiceMetadataExchangeEndpointAttribute" could not be found
    Best Regards,
    Linda Li
    Linda Li
    TechNet Community Support

  • Wiki whitelist.plist not working here's the script and steps taken

    1. whitelist.plist created according to instructions in wiki admin manual.
    2. file placed in: /Library/Application Support/Apple/WikiServer/
    3. File permissions set to allow _teamsserver access like other files in directory.
    4. Webserver restarted.
    5. Attempt to add <head> tag to wiki fails. Code is stripped out after save.
    6. Has anyone got this working? I can't find any syntax errors in the file and I've tried the suggestion from another post to place the file in: /etc/wikid
    Here's the contents of whitelist.plist
    I don't know what else I can do to make it work. Any help is appreciated.
    I've pasted the code below:
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    <key>protocols</key>
    <array>
    <string>file</string>
    <string>afp</string>
    <string>feed</string>
    <string>feeds</string>
    <string>fax</string>
    <string>ftp</string>
    <string>gopher</string>
    <string>http</string>
    <string>https</string>
    <string>itms</string>
    <string>itpc</string>
    <string>ldap</string>
    <string>mailto</string>
    <string>news</string>
    <string>nfs</string>
    <string>nntp</string>
    <string>rdar</string>
    <string>rtsp</string>
    <string>sip</string>
    <string>sips</string>
    <string>sftp</string>
    <string>smb</string>
    <string>ssh</string>
    <string>svn</string>
    <string>svn+ssh</string>
    <string>tel</string>
    <string>telnet</string>
    <string>vnc</string>
    <string>webcal</string>
    <string>xmpp</string>
    </array>
    <key>styles</key>
    <array>
    <string>font-style</string>
    <string>font-weight</string>
    <string>text-decoration</string>
    </array>
    <key>tags</key>
    <dict>
    <key>all</key>
    <array>
    <string>style</string>
    <string>class</string>
    <string>title</string>
    </array>
    <key>a</key>
    <array>
    <string>href</string>
    <string>name</string>
    <string>rel</string>
    </array>
    <key>blockquote</key>
    <array>
    <string>cite</string>
    </array>
    <key>body</key>
    <array/>
    <key>br</key>
    <array/>
    <key>caption</key>
    <array/>
    <key>dd</key>
    <array/>
    <key>div</key>
    <array/>
    <key>dl</key>
    <array/>
    <key>dt</key>
    <array/>
    <key>em</key>
    <array/>
    <key>h1</key>
    <array/>
    <key>h2</key>
    <array/>
    <key>h3</key>
    <array/>
    <key>h4</key>
    <array/>
    <key>h5</key>
    <array/>
    <key>h6</key>
    <array/>
    <key>head</key>
    <array>
    <string>title</string>
    <string>base</string>
    <string>link</string>
    <string>meta</string>
    </array>
    <key>html</key>
    <array/>
    <key>img</key>
    <array>
    <string>src</string>
    <string>alt</string>
    <string>name</string>
    <string>width</string>
    <string>height</string>
    <string>longdesc</string>
    </array>
    <key>li</key>
    <array/>
    <key>node</key>
    <array/>
    <key>object</key>
    <array>
    <string>classid</string>
    <string>width</string>
    <string>height</string>
    <string>codebase</string>
    </array>
    <key>ol</key>
    <array/>
    <key>p</key>
    <array/>
    <key>param</key>
    <array>
    <string>name</string>
    <string>value</string>
    </array>
    <key>pre</key>
    <array/>
    <key>q</key>
    <array>
    <string>cite</string>
    </array>
    <key>span</key>
    <array/>
    <key>strong</key>
    <array/>
    <key>table</key>
    <array/>
    <key>tbody</key>
    <array/>
    <key>td</key>
    <array>
    <string>colspan</string>
    <string>rowspan</string>
    </array>
    <key>tfoot</key>
    <array/>
    <key>th</key>
    <array>
    <string>colspan</string>
    <string>rowspan</string>
    </array>
    <key>thead</key>
    <array/>
    <key>tr</key>
    <array/>
    <key>ul</key>
    <array/>
    </dict>
    </dict>
    </plist>

    Ok. Found some more stuff. It appears that, as of 10.6.2, you can't have this in your whitelist: :
    <key>protocols</key>
    <key>styles</key>
    What's missing? Even if you have nothing to add to an area you must have the array tags e.g.
    <key>protocols</key>
    <array/>
    <key>styles</key>
    <array/>
    The problem is that the Wiki just fails if there is any problem with your whitelist, with no warning. To see the fault you have to look in the console log. There you will see something like this, which indicates a faulty whitelist file:
    8/01/10 10:34:00 AM com.apple.wikid[4416] Traceback (most recent call last):
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/application/app.py", line 689, in run
    8/01/10 10:34:00 AM com.apple.wikid[4416] config.parseOptions()
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/application/app.py", line 669, in parseOptions
    8/01/10 10:34:00 AM com.apple.wikid[4416] usage.Options.parseOptions(self, options)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/python/usage.py", line 226, in parseOptions
    8/01/10 10:34:00 AM com.apple.wikid[4416] for (cmd, short, parser, doc) in self.subCommands:
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/application/app.py", line 679, in subCommands
    8/01/10 10:34:00 AM com.apple.wikid[4416] for plug in plugins:
    8/01/10 10:34:00 AM com.apple.wikid[4416] --- <exception caught here> ---
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/plugin.py", line 204, in getPlugins
    8/01/10 10:34:00 AM com.apple.wikid[4416] adapted = interface(plugin, None)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/System/Library/Frameworks/Python.framework/Versions/2.6/Extras/lib/python/zop e/interface/interface.py", line 625, in callconform
    8/01/10 10:34:00 AM com.apple.wikid[4416] return conform(self)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/plugin.py", line 68, in _conform_
    8/01/10 10:34:00 AM com.apple.wikid[4416] return self.load()
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/plugin.py", line 63, in load
    8/01/10 10:34:00 AM com.apple.wikid[4416] return namedAny(self.dropin.moduleName + '.' + self.name)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/python/reflect.py", line 462, in namedAny
    8/01/10 10:34:00 AM com.apple.wikid[4416] topLevelPackage = _importAndCheckStack(trialname)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/caldavd/lib/python/twisted/python/reflect.py", line 398, in _importAndCheckStack
    8/01/10 10:34:00 AM com.apple.wikid[4416] return _import_(importName)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/wikid/lib/python/twisted/plugins/wikid.py", line 9, in <module>
    8/01/10 10:34:00 AM com.apple.wikid[4416] from apple_utilities.tap import WikiServiceMaker
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/wikid/lib/python/apple_utilities/tap.py", line 25, in <module>
    8/01/10 10:34:00 AM com.apple.wikid[4416] from apple_utilities import SettingsManager, Authentication
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/wikid/lib/python/apple_utilities/SettingsManager.py", line 916, in <module>
    8/01/10 10:34:00 AM com.apple.wikid[4416] globalSettings = SettingsManager(defaultConfigFilePath)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/wikid/lib/python/apple_utilities/SettingsManager.py", line 151, in _init_
    8/01/10 10:34:00 AM com.apple.wikid[4416] whitelist = WhitelistContentFilter.WhitelistContentFilter(userWhitelistPath, self.data['wiki']['whitelist'])
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/usr/share/wikid/lib/python/apple_wlt/WhitelistContentFilter.py", line 120, in _init_
    8/01/10 10:34:00 AM com.apple.wikid[4416] systemPlist = plistlib.readPlist(systemWhitelistFileLoc)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/System/Library/Frameworks/Python.framework/Versions/2.6/lib/python2.6/plistli b.py", line 78, in readPlist
    8/01/10 10:34:00 AM com.apple.wikid[4416] rootObject = p.parse(pathOrFile)
    8/01/10 10:34:00 AM com.apple.wikid[4416] File "/System/Library/Frameworks/Python.framework/Versions/2.6/lib/python2.6/plistli b.py", line 405, in parse
    8/01/10 10:34:00 AM com.apple.wikid[4416] parser.ParseFile(fileobj)
    Message was edited by: John Holley NZ

  • How do I add a whitelist on AirPort Utility to connect a Kindle Fire?

    All of a sudden my daughter's Kindle Fire says it has no wireless connection even though I have the name and password entered correctly. Is this some type of update on the Kindle side? The Kindle tells me (when I tap on the connected wifi name for my computer) signal strength is excellent, status is connected, shows my security with a WPA and additional codes. I have been reading that there is a whitelist I can add devices too but am so illiterate on my MAC that I cannot find it or where to go...my apologies. What do I/ should I do? I am confused as to why I see the Kindle and my computer are connected to wifi but then I receive an error message. Any help or advice would be greatly appreciated!

    There isn't a whitelist, per se, on the AirPort routers. Instead there is a means to prevent a wireless device from accessing the AirPort by its hardware MAC address. Unless you have enabled this feature, via the AirPort Utility, all wireless devices should be able to connect.
    One area to look at as a possible cause, is the Network Name (aka SSID) that you are using for your AirPort's Wi-Fi network. If it contains special characters or spaces, you may want to consider changing it to something that has neither to see if this helps.

  • Line with endpoints following tracked points

    I have a video with two points that have been motion tracked.
    I want to create a line connecting these two points, with the endpoints of the line moving to match the tracked points as they move.
    Is there an easy way to do this?

    The usual suspects have an excellent tutorial for that:
    http://youtu.be/Kaj969r7t9I
    MacBreak Studio: Episode 238 - Tracking Points in Motion
    The tut is about three points, but I'm sure, it works with two too....

Maybe you are looking for