Installation guide

6-2 Motorola RF Switch System Reference Guide
2. Refer to the following information to discern if configuration changes are warranted:
The Apply and Revert buttons are greyed out within this screen, as there is no data to be configured or saved.
6.2 AP Intrusion Detection
Use the Access Point Detection menu options to view and configure the detection of other Access Points.
The Access Point Detection screen consists of the following tabs:
Rogue AP Intrusion
Detection
Displays the enabled or disabled switch state to detect potentially hostile Access
Ports (the definition of which is defined by you). Once detected, rogue devices can
be added to a list of devices either approved or denied from interoperating within
the switch managed network. For more information, see
AP Intrusion Detection on page 6-2.
Mobile Unit Intrusion
Detection
Displays the state of the switch protecting against threats from MUs trying to find
network vulnerabilities. For more information, see MU Intrusion Detection on page
6-10.
Wireless Filters Displays the state of the filters used to either allow or deny a MAC address (or
groups of MAC addresses) from associating with the switch. For more information,
see Configuring Firewalls and Access Control Lists on page 6-13.
Certificates Displays the number of Server and CA certificates currently used by the switch.
For more information, see Creating Server Certificates on page 6-97.
Trustpoints Displays the number of trustpoints currently in use by this switch. The trustpoint
signing the certificate can be a certificate authority, corporation or an individual.
A trustpoint represents a CA/identity pair and contains the identity of the CA, CA-
specific configuration parameters, and an association with one enrolled identity
certificate. For more information, see
Using Trustpoints to Configure Certificates on page 6-98.
Key Pairs Displays the number of Key Pairs currently used by the switch. For more
information, see Configuring Trustpoint Associated Keys on page 6-106.