Locking source addresses, Locking source addresses -5, E information, see – Cabletron Systems SEHI-22/24 User Manual

Page 55

Advertising
background image

Locking Source Addresses

5-5

Source Addressing

2.

Click mouse button 1 on

; the Channel X Source Address List

window,

Figure 5-2

(

page 5-3

), will appear.

3.

In the Hash Type field, click mouse button 1 on the appropriate selection to
apply Dec or nonDec hashing to all ports on the selected repeater channel.

4.

Click mouse button 1 on

to save your changes; click on

to exit the window.

Locking Source Addresses

When Source Address Locking is enabled, it puts into place a number of security
measures designed to protect your Stack from unauthorized access. Depending
on the revision of firmware installed on your SEHI and the kinds of Modules in
the STACK, locking ports can provide a number of different protections,
including secure address assignment, trunk port locking, configurable violation
response, both eavesdrop and intruder protection, multi-level locking modes, and
new definitions for station and trunk ports: station ports are those detecting zero,
one, or two source addresses; trunk ports are those detecting three or more.

Enabling port locking from the Source Address List window activates all
applicable security protections, as configured via the Security application
(described in Chapter 5 of this guide).

To enable or disable Source Address Locking:

1.

Click mouse button 1 on the appropriate option in the Source Address Lock
field.

2.

Click mouse button 1 on

to set your new lock status.

NOTE

If your SEHI firmware does not support the Hash Type feature, this field will be
unavailable.

NOTE

Since the multi-level locking feature cannot be implemented from the Source Address List
window, locking ports from this window will apply Full lock status by default to any
ports which are currently unlocked. Any ports which are already in Continuous lock
mode, however, will remain so. For more information on these lock modes and other
security features, see Chapter 5, Security.

Advertising
This manual is related to the following products: