Configuring Security; Building The Allowed List Automatically; Adding New Stations To The Allowed Or Disallowed Stations List - Cabletron Systems SPECTRUM TRMMIM User Manual

Portable management application
Table of Contents

Advertisement

Configuring Security
Before configuring security, be sure that your network meets the requirements
and conditions specified in your TRMMIM's hardware Installation and User's
Guide.
Your TRMMIM must also be properly configured to send traps to the appropriate
network management station; this will ensure that traps generated by ring
security arrive at the appropriate destination. Refer to the SPMA Tools Guide for
information on using the Trap Table tool.

Building the Allowed List Automatically

When security is set to Warn mode, any station which inserts onto the ring is
automatically added to the Allowed List. You can use this feature to build the
Allowed List automatically, as follows:
1. Click to select the Enable Security-Warn option. The TRMMIM will enable
2. The Allowed Station List display will update to show you new entries.

Adding New Stations to the Allowed or Disallowed Stations List

To add an individual station to the Allowed or Disallowed Stations List:
All entries to the Allowed and Disallowed Lists are verified for proper MAC format and
list duplication. Should you add an entry which already exists in the Allowed or
NOTE
Disallowed List to the other list, the address will be removed from the original list and
added to the new one.
1. Click on
Configuring Security
duplication exist between the lists, the duplicate entries
will be removed from the Disallowed List. There will not
be any alert if this occurs.
Selecting this button closes the Security Config window.
Any sets you have made in the window before closing
will have taken effect.
ring security and automatically generate the Allowed List, adding to it each
station which is currently inserted on the ring. If your network management
station address is entered into the TRMMIM's trap table, you will receive a trap
informing you of each device which is added to the list.
. The Station Addition window
Ring Security Configuration
(Figure
6-3) will appear.
6-7

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SPECTRUM TRMMIM and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF