Brocade Mobility RFS7000-GR Controller System Reference Guide (Supporting software release 4.1.0.0-040GR and later) User Manual

Page 322

Advertising
background image

308

Brocade Mobility RFS7000-GR Controller System Reference Guide

53-1001944-01

Displaying the main security interface

6

1. Select Security from the main menu tree.

2. Refer to the following information to discern if configuration changes are warranted:

The Apply and Revert buttons are greyed out within this screen, as there is no data to be
configured or saved.

Access Port Intrusion
Detection

Displays the Enabled or Disabled state of the switch to detect potentially hostile
Access Ports (the definition of which defined by you). Once detected, these devices
can be added to a list of devices either approved or denied from interoperating
within the switch managed network. For more information, see

“AP intrusion

detection”

on page 309.

Mobile Unit Intrusion
Detection

Displays the state of the switch protecting against threats from MUs trying to find
network vulnerabilities. For more information, see

“MU intrusion detection”

on

page 318.

Wireless Filters

Displays the state of the filters used to either allow or deny a MAC address (or
groups of MAC addresses) from associating with the switch. For more information,
see

“Configuring firewalls and access control lists”

on page 321.

Certificates

Displays the number of Server and CA certificates currently used by the switch. For
more information, see

“Creating server certificates”

on page 418.

Trustpoints

Displays the number of trustpoints currently in use by this switch. The trustpoint
signing the certificate can be a certificate authority, corporation or an individual. A
trustpoint represents a CA/identity pair and contains the identity of the CA,
CA-specific configuration parameters, and an association with one enrolled identity
certificate. For more information, see

“Using trustpoints to configure certificates”

on page 418.

Key Pairs

Displays the number of Key Pairs currently used by the switch. For more
information, see

“Configuring trustpoint associated keys”

on page 429.

Advertising