This chapter describes the security mechanisms available to the switch. This chapter describes the following
security configuration activities:
•
Displaying the Main Security Interface
•
AP Intrusion Detection
•
MU Intrusion Detection
•
Configuring Wireless Filters
•
Configuring Firewalls and Access Control Lists
•
Configuring NAT Information
•
Configuring IKE Settings
•
Configuring IPSec VPN
•
Configuring the Radius Server
•
Creating Server Certificates
•
Configuring Enhanced Beacons and Probes
6.1 Displaying the Main Security Interface
Refer to main
Security
options.
NOTE: When the switch's configuration is successfully updated (using the Web UI), the
effected screen is closed without informing the user their change was successful.
However, if an error were to occur, the error displays within the effected screen's Status
field remains displayed. In the case of file transfer operations, the transfer screen remains
open during the transfer operation and remains open upon completion (with status
displayed within the Status field).
interface for a high level overview of device intrusion and switch access permission
Switch Security