Figure 6-2 – Cabletron Systems SPECTRUM TRMMIM User Manual

Page 106

Advertising
background image

Ring Security Configuration

6-4

Launching the Security Configuration Window

Figure 6-2. The Security Config Window

The Security Config window is where you actually configure security for the
selected ring; it contains the following information:

Allowed Station List

This list box displays the MAC address of each station in the ring security
Allowed List database — that is, those that have security authorization to enter
the selected ring. This database is maintained in the TRMMIM itself.

Note that the current Active Monitor will be indicated by an asterisk (*) next to its
MAC address. The Active Monitor cannot be removed from the Allowed List.

Allowed Count

This field shows the number of stations currently on the Allowed List. The
allowed range is from 1-250 stations.

Disallowed Station List

This list box displays the station MAC address entries in the Disallowed List
database — all those addresses which have been removed from the Allowed List,
plus any additional addresses which have been added manually. This database is
stored on your network management station.

Disallowed Count

This field shows the number of stations currently on the Disallowed List.

Advertising