Cabletron Systems TRMMIM manual Configuring Security, Building the Allowed List Automatically

Page 109

Ring Security Configuration

duplication exist between the lists, the duplicate entries will be removed from the Disallowed List. There will not be any alert if this occurs.

Selecting this button closes the Security Config window. Any sets you have made in the window before closing will have taken effect.

Configuring Security

Before configuring security, be sure that your network meets the requirements and conditions specified in your TRMMIM’s hardware Installation and User’s Guide.

Your TRMMIM must also be properly configured to send traps to the appropriate network management station; this will ensure that traps generated by ring security arrive at the appropriate destination. Refer to the SPMA Tools Guide for information on using the Trap Table tool.

Building the Allowed List Automatically

When security is set to Warn mode, any station which inserts onto the ring is automatically added to the Allowed List. You can use this feature to build the Allowed List automatically, as follows:

1.Click to select the Enable Security-Warnoption. The TRMMIM will enable ring security and automatically generate the Allowed List, adding to it each station which is currently inserted on the ring. If your network management station address is entered into the TRMMIM’s trap table, you will receive a trap informing you of each device which is added to the list.

2.The Allowed Station List display will update to show you new entries.

Adding New Stations to the Allowed or Disallowed Stations List

To add an individual station to the Allowed or Disallowed Stations List:

NOTE

All entries to the Allowed and Disallowed Lists are verified for proper MAC format and list duplication. Should you add an entry which already exists in the Allowed or Disallowed List to the other list, the address will be removed from the original list and added to the new one.

1. Click on . The Station Addition window (Figure 6-3) will appear.

Configuring Security

6-7

Image 109
Contents Trmmim Page Virus Disclaimer Applicable to licenses to the United States Government only Restricted Rights NoticeContents Chapter Ring Map Chapter Alarm ConfigurationChapter Statistics Appendix a Trmmim MIB Structure Chapter Ring Security ConfigurationContents Trmmim Using the Trmmim User’s GuideIntroduction to Spma for the Trmmim What’s not in the Trmmim GuideScreen Displays ConventionsIntroduction to Spma for the Trmmim Button Using the MouseFTP Getting HelpTrmmim Firmware Introduction to Spma for the Trmmim Trmmim Firmware Using the Hub View Using the Trmmim Hub ViewNavigating Through the Hub View Using the Trmmim Hub ViewTrmmim Hub View Hub View Front PanelTime and Date UptimeDevice Name Device LocationUsing the Trmmim Hub View Using the Mouse in a Hub View Module Module Index FNB Bypass State Port Display Form Hub View Port Color CodesFrames ErrorsTotal Bytes Port TypeFNB Display Monitoring Hub Performance Using the Trmmim Hub View Name and Location Checking Device Status and Updating Front Panel InfoContact Checking Module StatusDate and Time Total RingsSpeed Fault Location Speed FaultModule Name ModuleChecking Port Status Admin StatePort Name Module/PortLink State Time Checking Station StatusInsertion Trap Vendor Station NameUpstream Neighbor/Downstream Neighbor Priority Physical LocationPort Mapping Reverse MACsConfiguring Station Name, Location, or Priority Checking Ring Port StatusMedia Fault Fault State TimeClass Media TypeChecking Statistics Line BytesBurst AbortManaging the Hub at the Device Level Managing the HubFind MAC Address 12. The Find MAC Address Window Setting the Polling IntervalsContact Status 13. Trmmim Polling IntervalsDevice Configuration Device General StatusPort Operational State StatisticsControlling Token Ring FNB Multiplexer Connections Managing the Hub at the Module LevelINS Left Connect BoardRight Connect BypassClearing the Module FNB Configuration Window Selections Controlling Token Ring SpeedEnabling All Ports on Token Ring Modules Controlling Token Ring MIM Management ModeAuto AUT Management MGTConverting a Station Port to a Ring-out Port Managing the Hub at the Port LevelEnabling and Disabling Station and Ring Ports Removing a Station from the Ring Ring Map Launching the Ring Map From the command line stand-alone modeFrom the icon From the Hub ViewRing Name Selecting a Ring to MapRing Map Stations SpeedName UtilizationQuick Info Popup Window Viewing Station-specific InformationDrop Board and PortPerformance and Errors Setting a Station NameViewing Management Station Configuration Setting a Station DropCommands Open Status Error StatusActive Monitor ErrorError Report Timer Setting the Statistics Calculation ModeViewing Ring-level Information Set Calculation Mode Window Viewing the Error TableError Table Window Isolating Errors Total ErrorsNon-Isolating Errors Changing the Station Labels Viewing Device Information Device Information Window Setting the Map Poll IntervalActive Monitor Changes Viewing Beacon HistoryRing Purges Beacon EventsLongest Beacon Last Beacon TypeLast Beacon Beacon Configuration 12. The Beacon Configuration Window Using the Find Options 13. Sample Find Windows Searching by Station Name, MAC Address, Board/Port, or DropFinding the Active Monitor on the Network Finding the Management Station on the Network Frames or Errors measured/Δ Time in seconds 14. Sample Find Highest and Lowest Windows Accessing Other Spma ApplicationsAlarm Configuration Spmarun e5alarms IP address community name Setting and Viewing Ring Alarms Alarm Configuration Setting a Ring Level Alarm Setting and Viewing Station AlarmsAlarm Configuration Alarm Configuration Alarm Configuration Setting a Station Level Alarm Alarm Configuration Setting and Viewing Station Alarms Statistics Using StatisticsSpmarun e5stats IP Address community name Viewing the Ring Station ListStn Name Module and PortUpstream Addr Downstream AddrMonitoring Ring and Station Statistics Using the Reverse MAC ButtonRefreshing the Station List Creating a Pie Chart Creating a Graph or Meter Click mouse button 1 on General Ring and Station VariablesProtocols KBytesLine Errors Isolating ErrorsBurst Error AC ErrorAbort Error Non-Isolating ErrorsInternal Error Frequency Errors Token ErrorsStatistics Ring and Station Variables About Ring Security Ring Security ConfigurationRing Security Configuration Launching the Security Configuration WindowSecurity Configuration Ring Selection window, -1, will appear Allowed Count Allowed Station ListDisallowed Station List Disallowed CountDisable Security Security Mode OptionsEnable Security Allowed/Disallowed List Configuration Buttons Building the Allowed List Automatically Configuring SecurityStation Addition Window Deleting Stations from the Allowed or Disallowed ListsClear List Window Clearing All Entries in the Allowed or Disallowed ListRemove Changing the Ring Security ModeTrmmim MIB Structure Ietf MIB SupportProtocol Stack Chassis MGRSnmp Agent Network One, Network TwoTelnet Brief Word About MIB Components and Community NamesTrmmim MIB Structure Index Index-2 Index-3 Index-4