4 - 18 ONline 10BASE-T Security Module Installation and Operation Guide
A double asterisk (**) marks entries that have exceeded the EMM capacity
of 360 MAC addresses, or the TRMM capacity of 400 MAC addresses.
Entries that exceed the 360 or 400 MAC address maximum (that is, entry
361 and greater or entry 401 or greater) are not downloaded.
If your concentrator is near full capacity, or if you have ports connected to
bridges, you may wish to perform two or more Autolearn Captures, which
may prevent these ports from exceeding the 360 MAC address limit.
For example, to perform two Autolearn Captures:
1. Initiate an Autolearn Capture specifying only some of the modules
and ports.
2. Download this information to the Security Module.
3. Initiate the second Autolearn Capture specifying the remaining
modules and ports.
4. Download this information to the Security Module.
Showing Security Intruder List
The SHOW SECURITY INTRUDER_LIST command is only available with
Advanced EMM Version 4.0. The Security Intruder list contains information
regarding the 10 most recent intrusion attempts for a network. This
information includes:
❑ The MAC address of the intruding station (MAC addresses are
available for all Ethernet modules with the exception of the Security
Module)
❑ The time that has elapsed since the intrusion attempt occurred (in
days, hours, minutes, and seconds)
❑ A notification if the port was automatically disabled
The oldest entry in the Intruder list is removed when the list is full (10
entries) and a new intrusion attempt occurs.