beautypg.com

Chapter 4 repeater redundancy, Chapter 5 source addressing, Chapter 6 security – Cabletron Systems SEHI-22/24 User Manual

Page 6: Appendix a sehi mib structure, Index

background image

Contents

iv

Viewing and Configuring Link/Seg Traps for Ports ........................................ 3-5

Chapter 4

Repeater Redundancy

Setting Network Circuit Redundancy........................................................................ 4-1

Configuring a Redundant Circuit........................................................................ 4-2

Monitoring Redundancy .............................................................................................. 4-5

Chapter 5

Source Addressing

Displaying the Source Address List............................................................................ 5-1

Setting the Ageing Time ........................................................................................ 5-4

Setting the Hash Type................................................................................................... 5-4
Locking Source Addresses ........................................................................................... 5-5

Source Address Locking on Older Devices ........................................................ 5-6

Configuring Source Address Traps............................................................................. 5-7

Device-level Traps.................................................................................................. 5-8
Module- and Port-level Traps............................................................................... 5-8

Finding a Source Address .......................................................................................... 5-11

Chapter 6

Security

What is LANVIEWsecure?........................................................................................... 6-2

The Newest LANVIEWsecure Features.............................................................. 6-4
Security on Non-LANVIEWsecure Hubs ........................................................... 6-5

Configuring Security..................................................................................................... 6-6

Resetting Learned Addresses ............................................................................. 6-10
Tips for Successfully Implementing Eavesdropper Protection ..................... 6-11

Enabling Security and Traps...................................................................................... 6-12

Repeater-level Security and Traps ..................................................................... 6-13
Hub-level Security and Traps............................................................................. 6-14
Port-level Security and Traps ............................................................................. 6-15

Appendix A SEHI MIB Structure

IETF MIB Support ........................................................................................................A-1
SEHI MIB Structure......................................................................................................A-1

A Brief Word About MIB Components and Community Names ..................A-2

Index

This manual is related to the following products: