6-2 WS5100 Series Switch System Reference Guide
To view main menu security information:
1. Select Security from the main menu tree.
2. Refer to the following information to discern if configuration changes are warranted:
Access Port Intrusion | Displays the Enable or Disable state of the switch to detect potentially hostile access ports |
Detection | (the definition of which defined by you). Once detected, these devices can be added to a list |
| of devices either approved or denied from interoperating within the switch managed |
| network. For more information, see AP Intrusion Detection on page |
Mobile Unit Intrusion | Displays the state of the switch protecting against threats from MUs trying to find network |
Detection | vulnerabilities. For more information, see MU Intrusion Detection on page |
Wireless Filters | Displays the state of the current filters used to either allow or deny a MAC address (or groups |
| of MAC addresses) from associating with the switch. For more information, see Configuring |
| Wireless Filters on page |
Certificates | Displays the number of Server and CA certificates currently used by the switch. For more |
| information, see Creating Server Certificates on page |
Trustpoints | Displays the number of trustpoints currently in use by this switch. The trustpoint |
| signing the certificate can be a certificate authority, corporation or an individual. A |
| trustpoint represents a CA/identity pair and contains the identity of the CA, CA- |
| specific configuration parameters, and an association with one enrolled identity |
| certificate. For more information, see |
| Using Trustpoints to Configure Certificates on page |
Key Pairs | Displays the number of Key Pairs currently used by the switch. For more information, see |
| Configuring Trustpoint Associated Keys on page |
The Apply and Cancel buttons are greyed out within this screen, as there is no data to be configured or saved.