Chapter 3 alarm configuration, Chapter 4 link/seg traps, Chapter 5 repeater redundancy – Cabletron Systems EMM-E6 User Manual
Page 6: Chapter 6 source addressing, Chapter 7 security

Contents
iv
Setting Module Alarms ......................................................................................... 3-6
Setting Port Alarms................................................................................................ 3-8
What is a Segmentation Trap? ..................................................................................... 4-1
What is a Link Trap? ..................................................................................................... 4-2
Enabling and Disabling Link/Seg Traps ................................................................... 4-2
Configuring Link/Seg Traps for the Repeater................................................... 4-4
Viewing and Configuring Link/Seg Traps for Hub Modules ......................... 4-4
Viewing and Configuring Link/Seg Traps for Ports ........................................ 4-6
Setting the Hash Type................................................................................................... 6-4
Locking Source Addresses ........................................................................................... 6-5
Source Address Locking on Older Devices ........................................................ 6-6
Repeater-level Traps .............................................................................................. 6-8
Module- and Port-level Traps............................................................................... 6-9
The Newest LANVIEWsecure Features.............................................................. 7-4
Security on Non-LANVIEWsecure MIMs .......................................................... 7-5
Boards with Multiple Caches ............................................................................. 7-10
Resetting Learned Addresses ............................................................................. 7-11
Tips for Successfully Implementing Eavesdropper Protection ..................... 7-11