Contents
Chapter 3 | Alarm Configuration |
|
| Using Alarm Configuration | |
| Configuring Alarms | |
| Setting Repeater Alarms | |
| Setting and Changing Alarms | |
| Setting Module and Port Alarms | |
| Setting Module Alarms | |
| Setting Port Alarms |
Chapter 4 | Link/Seg Traps |
|
| What is a Segmentation Trap? | |
| What is a Link Trap? | |
| Enabling and Disabling Link/Seg Traps | |
| Configuring Link/Seg Traps for the Repeater | |
| Viewing and Configuring Link/Seg Traps for Hub Modules | |
| Viewing and Configuring Link/Seg Traps for Ports |
Chapter 5 | Repeater Redundancy |
|
| Setting Network Circuit Redundancy | |
| Configuring a Redundant Circuit | |
| Monitoring Redundancy |
Chapter 6 | Source Addressing |
|
| Displaying the Source Address List | |
| Setting the Aging Time | |
| Setting the Hash Type | |
| Locking Source Addresses | |
| Source Address Locking on Older Devices | |
| Configuring Source Address Traps | |
| ||
| Module- and | |
| Finding a Source Address |
Chapter 7 | Security |
|
| What is LANVIEWsecure? | |
| The Newest LANVIEWsecure Features | |
| Security on | |
| Configuring Security | |
| Boards with Multiple Caches | |
| Resetting Learned Addresses | |
| Tips for Successfully Implementing Eavesdropper Protection |
iv