Figure 6-2 – Cabletron Systems SPECTRUM TRMMIM User Manual
Page 106

Ring Security Configuration
6-4
Launching the Security Configuration Window
Figure 6-2. The Security Config Window
The Security Config window is where you actually configure security for the 
selected ring; it contains the following information:
Allowed Station List
This list box displays the MAC address of each station in the ring security 
Allowed List database — that is, those that have security authorization to enter 
the selected ring. This database is maintained in the TRMMIM itself.
Note that the current Active Monitor will be indicated by an asterisk (*) next to its 
MAC address. The Active Monitor cannot be removed from the Allowed List.
Allowed Count
This field shows the number of stations currently on the Allowed List. The 
allowed range is from 1-250 stations.
Disallowed Station List
This list box displays the station MAC address entries in the Disallowed List 
database — all those addresses which have been removed from the Allowed List, 
plus any additional addresses which have been added manually. This database is 
stored on your network management station.
Disallowed Count
This field shows the number of stations currently on the Disallowed List.
