Motorola WiNG 4.4 Reference Manual page 355

Table of Contents

Advertisement

2. Refer to the following information to discern if configuration changes are warranted:
Access Port
Displays the Enabled or Disabled state of the switch to detect potentially hostile Access Ports (the
Intrusion Detection
definition of which defined by you). Once detected, these devices can be added to a list of devices
either approved or denied from interoperating within the switch managed network. For more
information, see
Wireless IDS/ IPS
Displays the state of the switch protecting against threats from MUs trying to find network
vulnerabilities. For more information, see
Wireless Filters
Displays the state of the filters used to either allow or deny a MAC address (or groups of MAC
addresses) from associating with the switch. For more information, see
Access Control Lists on page
Certificates
Displays the number of Server and CA certificates currently used by the switch. For more
information, see
Trustpoints
Displays the number of trustpoints currently in use by this switch. The trustpoint signing the
certificate can be a certificate authority, corporation or an individual. A trustpoint represents a CA/
identity pair and contains the identity of the CA, CA-specific configuration parameters, and an
association with one enrolled identity certificate. For more information, see
Using Trustpoints to Configure Certificates on page
Key Pairs
Displays the number of Key Pairs currently used by the switch. For more information, see
Configuring Trustpoint Associated Keys on page
The
Apply
and
Revert
buttons are greyed out within this screen, as there is no data to be configured or saved.
Access Point Detection on page
Wireless Intrusion Detection / Protection on page
6-15.
Creating Server Certificates on page
Switch Security
6-4.
Configuring Firewalls and
6-105.
6-105.
6-115.
6 - 3
6-11.

Advertisement

Table of Contents
loading

Table of Contents