Cabletron Systems TRMMIM Launching the Security Configuration Window, Ring Security Configuration

Page 104

Ring Security Configuration

!

CAUTION

manually (by entering the address of a disallowed station), or by moving an entry from the Allowed List. You can also restore a station from the Disallowed List to the Allowed List, if desired.

Once Security has been configured and enabled, the TRMMIM acts as the Ring Security Monitor and provides security for the entire ring.

The Token Ring Security application is intended to be used by a knowledgeable network administrator. In the hands of an inexperienced user, it could severely impact your network by creating beaconing conditions on the ring. The Security application posts confirmation messages to forestall any indiscriminate actions; however, you should still use care when running the application.

We also recommend that you configure and enable security on only one device per ring, to reduce the possibility of conflicting security information on the network.

Launching the Security Configuration Window

To launch the security application

from the icon:

1.Click on the appropriate TRMMIM icon to display the icon menu.

2.Drag down to Security and release.

from the Hub View:

1.Click on to display the Device menu.

2.Drag down to Security and release.

from the command line (stand-alone mode):

1.From the appropriate directory, type:

spmarun e5sec <IP Address> <community name>

6-2

Launching the Security Configuration Window

Image 104
Contents Trmmim Page Virus Disclaimer Restricted Rights Notice Applicable to licenses to the United States Government onlyContents Chapter Statistics Chapter Alarm ConfigurationChapter Ring Map Chapter Ring Security Configuration Appendix a Trmmim MIB StructureContents Using the Trmmim User’s Guide TrmmimWhat’s not in the Trmmim Guide Introduction to Spma for the TrmmimConventions Screen DisplaysIntroduction to Spma for the Trmmim Using the Mouse ButtonGetting Help FTPTrmmim Firmware Introduction to Spma for the Trmmim Trmmim Firmware Using the Trmmim Hub View Using the Hub ViewUsing the Trmmim Hub View Navigating Through the Hub ViewHub View Front Panel Trmmim Hub ViewUptime Time and DateDevice Name Device LocationUsing the Trmmim Hub View Using the Mouse in a Hub View Module Module Index FNB Bypass State Hub View Port Color Codes Port Display FormErrors FramesTotal Bytes Port TypeFNB Display Monitoring Hub Performance Using the Trmmim Hub View Checking Device Status and Updating Front Panel Info Name and LocationChecking Module Status ContactDate and Time Total RingsSpeed Fault Speed Fault LocationModule Name ModuleAdmin State Checking Port StatusPort Name Module/PortInsertion Trap Checking Station StatusLink State Time Upstream Neighbor/Downstream Neighbor Station NameVendor Physical Location PriorityPort Mapping Reverse MACsChecking Ring Port Status Configuring Station Name, Location, or PriorityFault State Time Media FaultClass Media TypeChecking Statistics Bytes LineBurst AbortFind MAC Address Managing the HubManaging the Hub at the Device Level Setting the Polling Intervals 12. The Find MAC Address Window13. Trmmim Polling Intervals Contact StatusDevice General Status Device ConfigurationPort Operational State StatisticsManaging the Hub at the Module Level Controlling Token Ring FNB Multiplexer ConnectionsINS Board Left ConnectRight Connect BypassControlling Token Ring Speed Clearing the Module FNB Configuration Window SelectionsControlling Token Ring MIM Management Mode Enabling All Ports on Token Ring ModulesAuto AUT Management MGTEnabling and Disabling Station and Ring Ports Managing the Hub at the Port LevelConverting a Station Port to a Ring-out Port Removing a Station from the Ring Ring Map From the command line stand-alone mode Launching the Ring MapFrom the icon From the Hub ViewSelecting a Ring to Map Ring NameRing Map Speed StationsName UtilizationViewing Station-specific Information Quick Info Popup WindowBoard and Port DropSetting a Station Name Performance and ErrorsSetting a Station Drop Viewing Management Station ConfigurationCommands Error Status Open StatusError Active MonitorViewing Ring-level Information Setting the Statistics Calculation ModeError Report Timer Viewing the Error Table Set Calculation Mode WindowError Table Window Total Errors Isolating ErrorsNon-Isolating Errors Changing the Station Labels Viewing Device Information Setting the Map Poll Interval Device Information WindowViewing Beacon History Active Monitor ChangesRing Purges Beacon EventsLast Beacon Last Beacon TypeLongest Beacon Beacon Configuration 12. The Beacon Configuration Window Using the Find Options Searching by Station Name, MAC Address, Board/Port, or Drop 13. Sample Find WindowsFinding the Active Monitor on the Network Finding the Management Station on the Network Frames or Errors measured/Δ Time in seconds Accessing Other Spma Applications 14. Sample Find Highest and Lowest WindowsAlarm Configuration Spmarun e5alarms IP address community name Setting and Viewing Ring Alarms Alarm Configuration Setting and Viewing Station Alarms Setting a Ring Level AlarmAlarm Configuration Alarm Configuration Alarm Configuration Setting a Station Level Alarm Alarm Configuration Setting and Viewing Station Alarms Using Statistics StatisticsViewing the Ring Station List Spmarun e5stats IP Address community nameModule and Port Stn NameUpstream Addr Downstream AddrRefreshing the Station List Using the Reverse MAC ButtonMonitoring Ring and Station Statistics Creating a Pie Chart Creating a Graph or Meter Click mouse button 1 on Ring and Station Variables GeneralProtocols KBytesIsolating Errors Line ErrorsBurst Error AC ErrorInternal Error Non-Isolating ErrorsAbort Error Token Errors Frequency ErrorsStatistics Ring and Station Variables Ring Security Configuration About Ring SecurityLaunching the Security Configuration Window Ring Security ConfigurationSecurity Configuration Ring Selection window, -1, will appear Allowed Station List Allowed CountDisallowed Station List Disallowed CountEnable Security Security Mode OptionsDisable Security Allowed/Disallowed List Configuration Buttons Configuring Security Building the Allowed List AutomaticallyDeleting Stations from the Allowed or Disallowed Lists Station Addition WindowClearing All Entries in the Allowed or Disallowed List Clear List WindowChanging the Ring Security Mode RemoveIetf MIB Support Trmmim MIB StructureChassis MGR Protocol StackSnmp Agent Network One, Network TwoBrief Word About MIB Components and Community Names TelnetTrmmim MIB Structure Index Index-2 Index-3 Index-4