Motorola RFS7000 Series System Reference Manual page 287

Rf switch
Hide thumbs Also See for RFS7000 Series:
Table of Contents

Advertisement

2. Refer to the following information to discern if configuration changes are warranted:
Access Port Intrusion
Detection
Mobile Unit Intrusion
Violations
Wireless Filters
Certificates
Trustpoints
Key Pairs
The
Apply
and
Revert
or saved.
Displays the Enabled or Disabled state of the switch to detect
potentially hostile access ports (the definition of which defined by
you). Once detected, these devices can be added to a list of devices
either approved or denied from interoperating within the switch
managed network. For more information, see
AP Intrusion Detection on page
Displays the state of the switch protecting against threats from
MUs trying to find network vulnerabilities. For more information,
see
MU Intrusion Detection on page
Displays the state of the current filters used to either allow or deny
a MAC address (or groups of MAC addresses) from associating
with the switch. For more information, see
Configuring Wireless Filters on page
Displays the number of Server and CA certificates currently in use
by this switch. For more information, see
Creating Server Certificates on page 6-86
Displays the number of trustpoints currently in use by this switch.
The trustpoint signing the certificate can be a certificate authority,
corporation or an individual. A trustpoint represents a CA/identity
pair and contains the identity of the CA, CA-specific configuration
parameters, and an association with one enrolled identity
certificate. For more information, see
Configure Certificates on page
Displays the number of key pairs currently in use by this switch. For
more information, see
Configuring Trustpoint Associated Keys on page
buttons are greyed out within this screen, as there is no data to be configured
Switch Security
6-4.
6-10.
6-14.
Using Trustpoints to
6-86.
6-94.
6-3

Advertisement

Table of Contents
loading

Table of Contents