Summit WM3000 Series Controller System Reference Guide
309
7
Controller Security
This chapter describes the security mechanisms available to the controller. This chapter describes the
following security configuration activities:
●
Displaying the Main Security Interface on page 309
●
AP Intrusion Detection on page 310
●
Configuring Firewalls and Access Control Lists on page 319
●
Configuring NAT Information on page 356
●
Configuring IKE Settings on page 366
●
Configuring IPSec VPN on page 374
●
Configuring the Radius Server on page 396
●
Creating Server Certificates on page 411
Displaying the Main Security Interface
Refer to main
Security
interface for a high level overview of device intrusion and controller access
permission options.
NOTE
When the controller’s configuration is successfully updated (using the Web UI), the affected screen is closed without
informing the user their change was successful. However, if an error were to occur, the error displays within the
affected screen’s Status field remains displayed. In the case of file transfer operations, the transfer screen remains
open during the transfer operation and remains open upon completion (with status displayed within the Status field).
To view main menu security information:
Summary of Contents for Summit WM3000 Series
Page 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Page 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Page 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Page 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Page 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Page 513: ......