4 - 4 ONline 10BASE-T Security Module Installation and Operation Guide
Configuring Security Features
This section describes the security features of the Security Module,
including Eavesdropping Security and Intrusion Detection. Included in this
section are the features you must configure to enable security on the
module:
❑ Define port security type
❑ Define port action on intrusion
❑ Configure Autolearning Mask
❑ Enable ports
❑ Configure autolearning
❑ Download the Autolearning database
Security configurations from the Security Module are automatically
uploaded to a newly elected master management module or installation of
a new master management module. This automatic uploading feature
ensures that the Security Module configurations are always retained and
eliminates the need for you to reconfigure the new master.
Note: If you issue security commands (with the exception of MAC
address settings) specifying the 'all' option, all Security
Module ports in the concentrator are affected by the
command. If you are running an Advanced EMM, all other
Ethernet modules in the concentrator that support security
are also affected.
Eavesdropping Security
Eavesdropping security is a port jamming feature that prevents users from
accessing data transmitted to other users on the network. This type of
security: