
Configuring Security Features
This section describes the security features of the Security Module, including Eavesdropping Security and Intrusion Detection. Included in this section are the features you must configure to enable security on the module:
❑Define port security type
❑Define port action on intrusion
❑Configure Autolearning Mask
❑Enable ports
❑Configure autolearning
❑Download the Autolearning database
Security configurations from the Security Module are automatically uploaded to a newly elected master management module or installation of a new master management module. This automatic uploading feature ensures that the Security Module configurations are always retained and eliminates the need for you to reconfigure the new master.
Note: If you issue security commands (with the exception of MAC address settings) specifying the 'all' option, all Security Module ports in the concentrator are affected by the command. If you are running an Advanced EMM, all other Ethernet modules in the concentrator that support security are also affected.
Eavesdropping Security
Eavesdropping security is a port jamming feature that prevents users from accessing data transmitted to other users on the network. This type of security:
4 - 4 ONline