Motorola WS5100 manual Wireless Filters on page, Configuring Trustpoint Associated Keys on page

Models: WS5100

1 364
Download 364 pages 29.43 Kb
Page 226
Image 226
6-2WS5100 Series Switch System Reference Guide

6-2WS5100 Series Switch System Reference Guide

To view main menu security information:

1. Select Security from the main menu tree.

2. Refer to the following information to discern if configuration changes are warranted:

Access Port Intrusion

Displays the Enable or Disable state of the switch to detect potentially hostile access ports

Detection

(the definition of which defined by you). Once detected, these devices can be added to a list

 

of devices either approved or denied from interoperating within the switch managed

 

network. For more information, see AP Intrusion Detection on page 6-3.

Mobile Unit Intrusion

Displays the state of the switch protecting against threats from MUs trying to find network

Detection

vulnerabilities. For more information, see MU Intrusion Detection on page 6-9.

Wireless Filters

Displays the state of the current filters used to either allow or deny a MAC address (or groups

 

of MAC addresses) from associating with the switch. For more information, see Configuring

 

Wireless Filters on page 6-12.

Certificates

Displays the number of Server and CA certificates currently used by the switch. For more

 

information, see Creating Server Certificates on page 6-74.

Trustpoints

Displays the number of trustpoints currently in use by this switch. The trustpoint

 

signing the certificate can be a certificate authority, corporation or an individual. A

 

trustpoint represents a CA/identity pair and contains the identity of the CA, CA-

 

specific configuration parameters, and an association with one enrolled identity

 

certificate. For more information, see

 

Using Trustpoints to Configure Certificates on page 6-75.

Key Pairs

Displays the number of Key Pairs currently used by the switch. For more information, see

 

Configuring Trustpoint Associated Keys on page 6-81.

The Apply and Cancel buttons are greyed out within this screen, as there is no data to be configured or saved.

Page 226
Image 226
Motorola WS5100 manual Wireless Filters on page, Configuring Trustpoint Associated Keys on page, Access Port Intrusion