Switch Security
This chapter describes the security mechanisms available to the switch. This chapter describes the following
security configuration activities:
• Displaying the Main Security Interface
• Access Point Detection
• Wireless Intrusion Detection / Protection
• Configuring Firewalls and Access Control Lists
• Configuring NAT Information
• Configuring IKE Settings
• Configuring IPSec VPN
• Configuring the Radius Server
• Creating Server Certificates
• Configuring Enhanced Beacons and Probes
6.1 Displaying the Main Security Interface
Refer to main Security interface for a high level overview of device intrusion and switch access permission
options.
NOTE: When the switch’s configuration is successfully updated (using the Web UI), the
effected screen is closed without informing the user their change was successful.
However, if an error were to occur, the error displays within the effected screen’s Status
field remains displayed. In the case of file transfer operations, the transfer screen remains
open during the transfer operation and remains open upon completion (with status
displayed within the Status field).