Enterasys Networks IRM2 manual Using Port Locking and Unlocking, Source Address Functions

Page 56

Source Address Functions

Figure 4-1. Find Source Address Window

3.Enter the Ethernet address you wish to find in a hex XX-XX-XX-XX-XX-XX format in the text box.

4.Click ; if you entered the MAC address incorrectly, a window will appear indicating that you entered an invalid address.

Enterasys’ management application will check the device’s database of source addresses; if the address is found, the port associated with the address will begin to flash. If the address is not found, a window will appear indicating that fact.

Using Port Locking and Unlocking

The Port Locking feature enables the IRM2 to prevent any new source addresses from accessing the ports connected to the repeater network. When a source address attempts to access a port, the IRM2 will compare that address to those in the Source Address Database for that port. For a station port (one detecting zero or one source addresses at the time locking was enabled), if the address is not found in the table, that port will automatically shut down, no traffic will be allowed through (although other station and trunk ports remain open), and a trap will be sent to the management station (if traps have been enabled). Note that the Device Ageing Time does not apply to station ports when Source Address Locking is enabled, although the snapshot of the Source Address Database provided by the Source Addressing window may show the detected source address ageing out if that address remains inactive, and the appropriate trap will be generated; see Using Source Addressing, page 4-4, for more information.

For a trunk port (one detecting two or more source addresses at the time locking was enabled) there is no port shut-down security feature; if port locking is enabled, all packets will continue to be allowed to pass.

NOTE

Note that when port locking is enabled, each port’s topology status (trunk or station) remains fixed and will not change while locking remains enabled, regardless of any changes in the number of source addresses detected.

4-2

Using Port Locking and Unlocking

Image 56
Contents IRM2 Users Guide Page Virus Disclaimer Page Restricted Rights Notice Page Contents Chapter Trap Selection StatisticsChapter Redundancy IndexContents Viii Using This Manual IntroductionRelated Manuals IntroductionUsing the Mouse Software ConventionsCommon IRM2 Window Fields Device NameUsing Window Buttons Using On-line Help Getting HelpGetting Help from the Enterasys Global Call Center Hours a day, 365 days a yearIntroduction Getting Help IRM2 Chassis View Viewing Chassis Information Front Panel Information Port Locking/UnlockingConnection Status Port StatusBoot Prom Menu StructureFirmware TimeIRM2 Chassis View Menu Structure Device MenuRepeater Menu View MenuPort Status Menu Board Menu Utilities MenuHelp Menu Load MIM Port Status DisplaysPort Menus Port Type StatusErrors Physical Chassis View Port Status Color CodesChassis Manager Window Viewing Hardware Types Device TypeSetting the Device Date and Time Managing the HubResetting Device Counters Restarting the DeviceConfiguring the Front Panel Repeater Port Association Repeater Port AssociationSetting a Board Name Enabling BoardsEnabling and Disabling Ports Viewing I/F Summary InformationIndex TypeDescription Physical StatusRaw Counts Rate Viewing Interface DetailError AddressUnicast Non-UnicastUnknown Protocol Received only Packets Received Received onlyTransmit Queue Size Transmit only Packets Transmitted Transmit onlyTesting and Disabling the Current Interface Using the Applications menuStatistics StatisticsAccessing the Statistics Windows StatisticsPackets Statistics DefinedBytes Using the Total and Delta Radio Buttons Hard ErrorsSoft Errors CollisionsTimer Statistics Accessing the Timer Statistics WindowsTo access the port-level Timer Statistics window Setting the Timer Statistics Interval Summary StatisticsAccessing the Summary Statistics Windows Configuring Summary Statistics Accessing the Performance Graph Windows Performance GraphTotal Errors Configuring the Performance Graph Source Address Functions Find Source AddressUsing Port Locking and Unlocking Source Address FunctionsLock/Unlock Ports Window Using Source Addressing Setting the Device Ageing Time Device Ageing Time Window Alarm Limits Accessing the Alarm Limits WindowsAccessing the Alarm Limits Windows Alarm Limits Collisions Errors of Type Broadcast PacketsWithin Configuring AlarmsSetting the Alarm Limits Time Interval Setting Alarm Limits Alarm Interval WindowAlarm Limits Accessing the Trap Selection Windows Trap SelectionTrap Definitions Link State TrapsSegmentation Traps Source Address TrapsConfiguring Traps Accessing the Redundancy Window RedundancyRedundancy Establishing Redundancy Selecting and Naming a CircuitEntering the Physical Addresses of Devices to be Polled Circuit Name WindowAssigning Backup Ports and Port Priority to the Circuit Setting the Polling Interval and Number of Retries Polling Interval WindowActivating the Circuit Testing the Circuits Reconfiguring a Circuit Test Time of Day WindowChanging Port Status Resetting a Circuit Redundancy Reset Warning WindowRedundancy Index Index-2 Index-3 Index Index-4