Ring Security Configuration
!
CAUTION
manually (by entering the address of a disallowed station), or by moving an entry from the Allowed List. You can also restore a station from the Disallowed List to the Allowed List, if desired.
Once Security has been configured and enabled, the TRMMIM acts as the Ring Security Monitor and provides security for the entire ring.
The Token Ring Security application is intended to be used by a knowledgeable network administrator. In the hands of an inexperienced user, it could severely impact your network by creating beaconing conditions on the ring. The Security application posts confirmation messages to forestall any indiscriminate actions; however, you should still use care when running the application.
We also recommend that you configure and enable security on only one device per ring, to reduce the possibility of conflicting security information on the network.
Launching the Security Configuration Window
To launch the security application
from the icon:
1.Click on the appropriate TRMMIM icon to display the icon menu.
2.Drag down to Security and release.
from the Hub View:
1.Click on to display the Device menu.
2.Drag down to Security and release.
from the command line (stand-alone mode):
1.From the appropriate directory, type:
spmarun e5sec <IP Address> <community name>
Launching the Security Configuration Window |