Understanding Address Selections Methods - HP 10Base-T Hub 24M Manual

Hide thumbs Also See for 10Base-T Hub 24M:
Table of Contents

Advertisement

Configuration Reference

Understanding Address Selections Methods

The technique used to control which devices are permitted to communicate
with a port is known as Address Selection. Address Selection is the process
by which the port sets policy for receiving packets. The port performs this
task by comparing addresses in the source header of a packet with preset
address tables that compile lists of acceptable source addresses. The address
tables can be very restrictive in allowing for packet reception or less restric-
tive. Address tables are determined by the Address Selection method you set
for the port. The three address selection methods are:
6-72
Continuous. The hub learns the address of the device attached to the
port and makes it the authorized address. If a different device is later
attached to the port, the new address is learned and becomes the autho-
rized address.
First Heard. The hub learns the address of the device attached to the
port and makes it the authorized address. If a different device is later
attached to the port, the new address is registered as an intruder address.
This indicates a security violation has occurred and the port is automati-
cally disabled.
Assigned. You enter the address of the device that is authorized to be
attached to the port. If a different device is later attached to the port, the
new address is registered as an intruder address. This indicates that a
security violation has occurred and the port is disabled. If you choose
Assigned, you need to go to the Authorized Address box and type in a
specific MAC address of a device authorized to be attached to that port.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

10base-t hub 12m

Table of Contents