Cabletron Systems SEHI-22/24 Network Hardware User Manual


 
Contents
iv
Viewing and Configuring Link/Seg Traps for Ports ........................................3-5
Chapter 4 Repeater Redundancy
Setting Network Circuit Redundancy........................................................................4-1
Configuring a Redundant Circuit........................................................................4-2
Monitoring Redundancy..............................................................................................4-5
Chapter 5 Source Addressing
Displaying the Source Address List............................................................................5-1
Setting the Ageing Time........................................................................................5-4
Setting the Hash Type...................................................................................................5-4
Locking Source Addresses ...........................................................................................5-5
Source Address Locking on Older Devices........................................................5-6
Configuring Source Address Traps.............................................................................5-7
Device-level Traps..................................................................................................5-8
Module- and Port-level Traps...............................................................................5-8
Finding a Source Address .......................................................................................... 5-11
Chapter 6 Security
What is LANVIEWsecure?...........................................................................................6-2
The Newest LANVIEWsecure Features..............................................................6-4
Security on Non-LANVIEWsecure Hubs...........................................................6-5
Configuring Security.....................................................................................................6-6
Resetting Learned Addresses.............................................................................6-10
Tips for Successfully Implementing Eavesdropper Protection ..................... 6-11
Enabling Security and Traps......................................................................................6-12
Repeater-level Security and Traps.....................................................................6-13
Hub-level Security and Traps.............................................................................6-14
Port-level Security and Traps .............................................................................6-15
Appendix A SEHI MIB Structure
IETF MIB Support ........................................................................................................A-1
SEHI MIB Structure......................................................................................................A-1
A Brief Word About MIB Components and Community Names ..................A-2
Index